random: sshd: uninitialized urandom read (32 bytes read, 117 bits of entropy available) random: sshd: uninitialized urandom read (32 bytes read, 119 bits of entropy available) IPVS: Creating netns size=2552 id=1 ================================================================== BUG: KASAN: slab-out-of-bounds in pfkey_msg2xfrm_state net/key/af_key.c:1188 [inline] BUG: KASAN: slab-out-of-bounds in pfkey_add+0x270e/0x3490 net/key/af_key.c:1506 Read of size 4096 at addr ffff8801c5286540 by task syz-executor0/3800 CPU: 1 PID: 3800 Comm: syz-executor0 Not tainted 4.4.120-gd63fdf6 #29 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 02e6116245fdcda7 ffff8801c5b176f8 ffffffff81d0408d ffffea000714a180 ffff8801c5286540 0000000000000000 ffff8801c5286700 ffff8801c5b17938 ffff8801c5b17730 ffffffff814fe143 ffff8801c5286540 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] print_address_description+0x73/0x260 mm/kasan/report.c:252 [] kasan_report_error mm/kasan/report.c:351 [inline] [] kasan_report+0x285/0x370 mm/kasan/report.c:408 [] check_memory_region_inline mm/kasan/kasan.c:325 [inline] [] check_memory_region+0x137/0x190 mm/kasan/kasan.c:332 [] memcpy+0x23/0x50 mm/kasan/kasan.c:367 [] pfkey_msg2xfrm_state net/key/af_key.c:1188 [inline] [] pfkey_add+0x270e/0x3490 net/key/af_key.c:1506 [] pfkey_process+0x68b/0x750 net/key/af_key.c:2834 [] pfkey_sendmsg+0x3a9/0x760 net/key/af_key.c:3678 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:635 [] ___sys_sendmsg+0x6c1/0x7c0 net/socket.c:1962 [] __sys_sendmsg+0xd3/0x190 net/socket.c:1996 [] C_SYSC_sendmsg net/compat.c:720 [inline] [] compat_SyS_sendmsg+0x2a/0x40 net/compat.c:718 [] do_syscall_32_irqs_on arch/x86/entry/common.c:392 [inline] [] do_fast_syscall_32+0x321/0x8a0 arch/x86/entry/common.c:459 [] sysenter_flags_fixed+0xd/0x17 Allocated by task 3800: [] save_stack_trace+0x26/0x50 arch/x86/kernel/stacktrace.c:63 [] save_stack+0x43/0xd0 mm/kasan/kasan.c:512 [] set_track mm/kasan/kasan.c:524 [inline] [] kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:616 [] kasan_krealloc+0x64/0x80 mm/kasan/kasan.c:654 [] ksize+0x92/0xf0 mm/slub.c:3727 [] __alloc_skb+0x132/0x600 net/core/skbuff.c:237 [] alloc_skb include/linux/skbuff.h:815 [inline] [] pfkey_sendmsg+0x135/0x760 net/key/af_key.c:3665 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:635 [] ___sys_sendmsg+0x6c1/0x7c0 net/socket.c:1962 [] __sys_sendmsg+0xd3/0x190 net/socket.c:1996 [] C_SYSC_sendmsg net/compat.c:720 [inline] [] compat_SyS_sendmsg+0x2a/0x40 net/compat.c:718 [] do_syscall_32_irqs_on arch/x86/entry/common.c:392 [inline] [] do_fast_syscall_32+0x321/0x8a0 arch/x86/entry/common.c:459 [] sysenter_flags_fixed+0xd/0x17 Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff8801c5286500 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 64 bytes inside of 512-byte region [ffff8801c5286500, ffff8801c5286700) The buggy address belongs to the page: BUG: unable to handle kernel NULL pointer dereference at 0000000000000062 IP: [] str__compaction__trace_system_name+0x56b/0xfa0 PGD 80000000afaaf067 PUD afa15067 PMD 0 Oops: 0002 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.4.120-gd63fdf6 #29 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffffffff84217840 task.stack: ffffffff84200000 RIP: 0010:[] [] str__compaction__trace_system_name+0x56b/0xfa0 RSP: 0018:ffff8801db207d18 EFLAGS: 00010206 RAX: ffffffff838a9060 RBX: ffff8801db207d68 RCX: ffffffff812a0eeb RDX: 0000000000000100 RSI: ffffffff842bdb60 RDI: ffffffff812a0efb RBP: ffff8801db207df0 R08: 0000000000000001 R09: ffffffff850e4930 R10: 0000000000000000 R11: 1ffff1003b640f70 R12: 1ffff1003b640fa9 R13: ffff8801c51d85e8 R14: 0000000000000101 R15: ffff8801db207df0 FS: 0000000000000000(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000062 CR3: 00000000b2324000 CR4: 0000000000160670 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffffffff838a9060 ffffffff812a0e4c 0000000000000000 ffffffff842c35a0 0000000000000000 ffffffff838a9060 0000000041b58ab3 ffffffff83faab59 ffffffff812a0d70 ffffffff84218110 ffff8801db207d68 ffffffff851bf390 Call Trace: [] __run_timers kernel/time/timer.c:1261 [inline] [] run_timer_softirq+0x604/0xbb0 kernel/time/timer.c:1444 [] __do_softirq+0x227/0xa38 kernel/softirq.c:273 [] invoke_softirq kernel/softirq.c:350 [inline] [] irq_exit+0x119/0x140 kernel/softirq.c:391 [] exiting_irq arch/x86/include/asm/apic.h:653 [inline] [] smp_apic_timer_interrupt+0x7b/0xa0 arch/x86/kernel/apic/apic.c:926 [] apic_timer_interrupt+0xa0/0xb0 arch/x86/entry/entry_64.S:737 [] arch_safe_halt arch/x86/include/asm/paravirt.h:117 [inline] [] default_idle+0x55/0x3c0 arch/x86/kernel/process.c:290 [] arch_cpu_idle+0xa/0x10 arch/x86/kernel/process.c:281 [] default_idle_call+0x48/0x70 kernel/sched/idle.c:93 [] cpuidle_idle_call kernel/sched/idle.c:157 [inline] [] cpu_idle_loop kernel/sched/idle.c:253 [inline] [] cpu_startup_entry+0x5fd/0x8f0 kernel/sched/idle.c:301 [] rest_init+0x189/0x190 init/main.c:410 [] start_kernel+0x6b9/0x6ee init/main.c:682 [] x86_64_start_reservations+0x2a/0x2c arch/x86/kernel/head64.c:196 [] x86_64_start_kernel+0x140/0x163 arch/x86/kernel/head64.c:185 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 56 4d 5f 42 55 47 5f 4f 4e 5f 50 <41> 47 45 28 50 61 67 65 53 6c 61 62 28 70 61 67 65 29 29 00 00 RIP [] str__compaction__trace_system_name+0x56b/0xfa0 RSP CR2: 0000000000000062 ---[ end trace c7394356da621878 ]---