usercopy: kernel memory exposure attempt detected from 000000000368f486 (kmalloc-1024) (1024 bytes) ------------[ cut here ]------------ kernel BUG at mm/usercopy.c:72! invalid opcode: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 10079 Comm: syz-executor0 Not tainted 4.15.0-rc2+ #151 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:report_usercopy mm/usercopy.c:64 [inline] RIP: 0010:__check_object_size+0x3a2/0x4f0 mm/usercopy.c:264 RSP: 0000:ffff8801cd337858 EFLAGS: 00010286 RAX: 0000000000000063 RBX: ffffffff85328dc0 RCX: 0000000000000000 sctp: [Deprecated]: syz-executor3 (pid 10120) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead RDX: 0000000000000063 RSI: ffffc900021a4000 RDI: ffffed0039a66eff RBP: ffff8801cd337948 R08: 1ffff10039a66e8d R09: 0000000000000000 R10: 000000000d653152 R11: 0000000000000000 R12: ffffffff85328d80 R13: ffff8801d7974950 R14: 0000000000000400 R15: ffffea00075e5d00 FS: 00007f5d20541700(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd2d79191c4 CR3: 00000001d843e000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: check_object_size include/linux/thread_info.h:112 [inline] check_copy_size include/linux/thread_info.h:143 [inline] copy_to_user include/linux/uaccess.h:154 [inline] old_dev_ioctl.isra.1+0x1085/0x1fd0 net/bridge/br_ioctl.c:178 sctp: [Deprecated]: syz-executor3 (pid 10141) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead br_dev_ioctl+0x44/0xc0 net/bridge/br_ioctl.c:392 dev_ifsioc+0x333/0x9b0 net/core/dev_ioctl.c:354 dev_ioctl+0xa64/0xf90 net/core/dev_ioctl.c:589 sock_ioctl+0x1da/0x440 net/socket.c:998 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1530 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007f5d20540c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00000000007580d8 RCX: 0000000000452a39 RDX: 00000000205d0000 RSI: 00000000000089f0 RDI: 0000000000000019 RBP: 0000000000000569 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f6278 R13: 00000000ffffffff R14: 00007f5d205416d4 R15: 0000000000000001 Code: 48 0f 44 da e8 e0 6e c2 ff 48 8b 85 28 ff ff ff 4d 89 f1 4c 89 e9 4c 89 e2 48 89 de 48 c7 c7 00 8e 32 85 49 89 c0 e8 e6 2c ac ff <0f> 0b 48 c7 c0 c0 8b 32 85 eb 96 48 c7 c0 00 8c 32 85 eb 8d 48 RIP: report_usercopy mm/usercopy.c:64 [inline] RSP: ffff8801cd337858 RIP: __check_object_size+0x3a2/0x4f0 mm/usercopy.c:264 RSP: ffff8801cd337858 ---[ end trace 0f0e8c0630d9b062 ]---