[ 55.601267][ T26] audit: type=1800 audit(1571289605.547:25): pid=8571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 55.641049][ T26] audit: type=1800 audit(1571289605.547:26): pid=8571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 55.682017][ T26] audit: type=1800 audit(1571289605.547:27): pid=8571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 56.251973][ T8634] sshd (8634) used greatest stack depth: 22856 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.49' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 67.114619][ T8732] ================================================================== [ 67.122862][ T8732] BUG: KASAN: null-ptr-deref in llcp_sock_getname+0x358/0x460 [ 67.130322][ T8732] Read of size 1 at addr 0000000000000000 by task syz-executor808/8732 [ 67.138557][ T8732] [ 67.140898][ T8732] CPU: 1 PID: 8732 Comm: syz-executor808 Not tainted 5.4.0-rc1+ #0 [ 67.148786][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.158845][ T8732] Call Trace: executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 67.162146][ T8732] dump_stack+0x172/0x1f0 [ 67.166495][ T8732] ? llcp_sock_getname+0x358/0x460 [ 67.171702][ T8732] ? llcp_sock_getname+0x358/0x460 [ 67.176823][ T8732] __kasan_report.cold+0x5/0x41 [ 67.181687][ T8732] ? llcp_sock_getname+0x358/0x460 [ 67.186811][ T8732] kasan_report+0x12/0x20 [ 67.191150][ T8732] check_memory_region+0x134/0x1a0 [ 67.196267][ T8732] memcpy+0x24/0x50 [ 67.200086][ T8732] llcp_sock_getname+0x358/0x460 [ 67.205035][ T8732] __sys_getpeername+0x12b/0x290 [ 67.209989][ T8732] ? __ia32_sys_getsockname+0xb0/0xb0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 67.215412][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 67.220879][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 67.226345][ T8732] ? do_syscall_64+0x26/0x760 [ 67.231038][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 67.237309][ T8732] ? do_syscall_64+0x26/0x760 [ 67.242087][ T8732] __x64_sys_getpeername+0x73/0xb0 [ 67.247215][ T8732] do_syscall_64+0xfa/0x760 [ 67.251733][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 67.257647][ T8732] RIP: 0033:0x4412b9 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 67.261547][ T8732] Code: e8 ac e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 67.281158][ T8732] RSP: 002b:00007ffec6cef178 EFLAGS: 00000246 ORIG_RAX: 0000000000000034 [ 67.289587][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004412b9 [ 67.297569][ T8732] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 67.305588][ T8732] RBP: 00000000006cb018 R08: 00000000004002c8 R09: 00000000004002c8 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 67.313572][ T8732] R10: 00000000004002c8 R11: 0000000000000246 R12: 0000000000402030 [ 67.321553][ T8732] R13: 00000000004020c0 R14: 0000000000000000 R15: 0000000000000000 [ 67.329812][ T8732] ================================================================== [ 67.337967][ T8732] Disabling lock debugging due to kernel taint [ 67.348082][ T8753] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 67.355905][ T8753] #PF: supervisor read access in kernel mode [ 67.361866][ T8753] #PF: error_code(0x0000) - not-present page [ 67.367818][ T8753] PGD 9124e067 P4D 9124e067 PUD a0a85067 PMD 0 [ 67.374050][ T8753] Oops: 0000 [#1] PREEMPT SMP KASAN [ 67.379235][ T8753] CPU: 1 PID: 8753 Comm: syz-executor808 Tainted: G B 5.4.0-rc1+ #0 [ 67.388488][ T8753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.398545][ T8753] RIP: 0010:memcpy_erms+0x6/0x10 [ 67.403487][ T8753] Code: 90 90 90 90 eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 67.423084][ T8753] RSP: 0018:ffff88808ddffd50 EFLAGS: 00010246 [ 67.429150][ T8753] RAX: ffff88808ddffe12 RBX: ffff88808ddffe00 RCX: 0000000000000001 [ 67.437121][ T8753] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff88808ddffe12 [ 67.445073][ T8753] RBP: ffff88808ddffd70 R08: 1ffff11011bbffc2 R09: ffffed1011bbffc3 [ 67.453024][ T8753] R10: ffffed1011bbffc2 R11: ffff88808ddffe12 R12: 0000000000000001 [ 67.460974][ T8753] R13: ffff88808ddffe12 R14: 0000000000000000 R15: ffffffff886622e0 [ 67.468938][ T8753] FS: 0000000000760880(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 67.477867][ T8753] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 67.484464][ T8753] CR2: 0000000000000000 CR3: 00000000924ba000 CR4: 00000000001406e0 [ 67.492435][ T8753] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 67.500392][ T8753] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 67.508342][ T8753] Call Trace: [ 67.511619][ T8753] ? memcpy+0x46/0x50 [ 67.515615][ T8753] llcp_sock_getname+0x358/0x460 [ 67.520538][ T8753] __sys_getpeername+0x12b/0x290 [ 67.525461][ T8753] ? __ia32_sys_getsockname+0xb0/0xb0 [ 67.530833][ T8753] ? up_read+0x1d2/0x810 [ 67.535062][ T8753] ? __kasan_check_write+0x14/0x20 [ 67.540240][ T8753] ? switch_fpu_return+0x1fa/0x4f0 [ 67.545347][ T8753] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 67.551396][ T8753] __x64_sys_getpeername+0x73/0xb0 [ 67.556489][ T8753] do_syscall_64+0xfa/0x760 [ 67.560975][ T8753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 67.566843][ T8753] RIP: 0033:0x4412b9 [ 67.570722][ T8753] Code: e8 ac e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 67.590317][ T8753] RSP: 002b:00007ffec6cef178 EFLAGS: 00000246 ORIG_RAX: 0000000000000034 [ 67.598710][ T8753] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004412b9 [ 67.606672][ T8753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 executing program [ 67.615669][ T8753] RBP: 000000000001064f R08: 00000000004002c8 R09: 00000000004002c8 [ 67.623620][ T8753] R10: 00000000004002c8 R11: 0000000000000246 R12: 0000000000402030 [ 67.631573][ T8753] R13: 00000000004020c0 R14: 0000000000000000 R15: 0000000000000000 [ 67.639527][ T8753] Modules linked in: [ 67.643413][ T8753] CR2: 0000000000000000 [ 67.647559][ T8800] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 67.655369][ T8800] #PF: supervisor read access in kernel mode [ 67.661416][ T8800] #PF: error_code(0x0000) - not-present page [ 67.667372][ T8800] PGD 9ac92067 P4D 9ac92067 PUD a85ce067 PMD 0 [ 67.673603][ T8800] Oops: 0000 [#2] PREEMPT SMP KASAN [ 67.678785][ T8800] CPU: 0 PID: 8800 Comm: syz-executor808 Tainted: G B D 5.4.0-rc1+ #0 [ 67.688037][ T8800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.698085][ T8800] RIP: 0010:memcpy_erms+0x6/0x10 [ 67.703007][ T8800] Code: 90 90 90 90 eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 67.722607][ T8800] RSP: 0018:ffff88808d097d50 EFLAGS: 00010246 [ 67.729436][ T8800] RAX: ffff88808d097e12 RBX: ffff88808d097e00 RCX: 0000000000000001 [ 67.737397][ T8800] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff88808d097e12 [ 67.745350][ T8800] RBP: ffff88808d097d70 R08: 1ffff11011a12fc2 R09: ffffed1011a12fc3 [ 67.754302][ T8800] R10: ffffed1011a12fc2 R11: ffff88808d097e12 R12: 0000000000000001 [ 67.762277][ T8800] R13: ffff88808d097e12 R14: 0000000000000000 R15: ffffffff886622e0 [ 67.770232][ T8800] FS: 0000000000760880(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 67.779140][ T8800] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 67.785719][ T8800] CR2: 0000000000000000 CR3: 00000000a3e40000 CR4: 00000000001406f0 [ 67.793675][ T8800] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 67.801626][ T8800] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 67.809590][ T8800] Call Trace: [ 67.812875][ T8800] ? memcpy+0x46/0x50 [ 67.816842][ T8800] llcp_sock_getname+0x358/0x460 [ 67.821762][ T8800] __sys_getpeername+0x12b/0x290 [ 67.826682][ T8800] ? __ia32_sys_getsockname+0xb0/0xb0 [ 67.832035][ T8800] ? up_read+0x1d2/0x810 [ 67.836263][ T8800] ? __kasan_check_write+0x14/0x20 [ 67.841367][ T8800] ? switch_fpu_return+0x1fa/0x4f0 [ 67.846462][ T8800] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 67.852511][ T8800] __x64_sys_getpeername+0x73/0xb0 [ 67.857617][ T8800] do_syscall_64+0xfa/0x760 [ 67.862115][ T8800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 67.867984][ T8800] RIP: 0033:0x4412b9 [ 67.871862][ T8800] Code: e8 ac e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 67.891529][ T8800] RSP: 002b:00007ffec6cef178 EFLAGS: 00000246 ORIG_RAX: 0000000000000034 [ 67.899926][ T8800] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004412b9 [ 67.907896][ T8800] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 executing program executing program executing program [ 67.915864][ T8800] RBP: 00000000000106f6 R08: 00000000004002c8 R09: 00000000004002c8 [ 67.923814][ T8800] R10: 00000000004002c8 R11: 0000000000000246 R12: 0000000000402030 [ 67.931765][ T8800] R13: 00000000004020c0 R14: 0000000000000000 R15: 0000000000000000 [ 67.939733][ T8800] Modules linked in: [ 67.943610][ T8800] CR2: 0000000000000000 [ 67.947753][ T8798] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 67.954985][ T8800] ---[ end trace 06beea077c471909 ]--- [ 67.955556][ T8798] #PF: supervisor read access in kernel mode executing program executing program executing program [ 67.955563][ T8798] #PF: error_code(0x0000) - not-present page [ 67.955568][ T8798] PGD 9cf75067 P4D 9cf75067 PUD a7839067 PMD 0 [ 67.964011][ T8800] RIP: 0010:memcpy_erms+0x6/0x10 [ 67.966979][ T8798] Oops: 0000 [#3] PREEMPT SMP KASAN [ 67.966994][ T8798] CPU: 1 PID: 8798 Comm: syz-executor808 Tainted: G B D 5.4.0-rc1+ #0 [ 67.967007][ T8798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 executing program executing program executing program [ 67.976002][ T8800] Code: 90 90 90 90 eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 67.979195][ T8798] RIP: 0010:memcpy_erms+0x6/0x10 [ 67.979205][ T8798] Code: 90 90 90 90 eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 67.979217][ T8798] RSP: 0018:ffff888086bd7d50 EFLAGS: 00010246 [ 67.987290][ T8800] RSP: 0018:ffff88808ddffd50 EFLAGS: 00010246 executing program executing program executing program [ 67.989422][ T8798] RAX: ffff888086bd7e12 RBX: ffff888086bd7e00 RCX: 0000000000000001 [ 67.989430][ T8798] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff888086bd7e12 [ 67.989439][ T8798] RBP: ffff888086bd7d70 R08: 1ffff11010d7afc2 R09: ffffed1010d7afc3 [ 67.989445][ T8798] R10: ffffed1010d7afc2 R11: ffff888086bd7e12 R12: 0000000000000001 [ 67.989458][ T8798] R13: ffff888086bd7e12 R14: 0000000000000000 R15: ffffffff886622e0 [ 68.001882][ T8800] RAX: ffff88808ddffe12 RBX: ffff88808ddffe00 RCX: 0000000000000001 executing program [ 68.008759][ T8798] FS: 0000000000760880(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 68.008768][ T8798] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 68.008775][ T8798] CR2: 0000000000000000 CR3: 00000000917de000 CR4: 00000000001406e0 [ 68.008788][ T8798] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 68.032711][ T8800] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff88808ddffe12 [ 68.034257][ T8798] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 68.034262][ T8798] Call Trace: [ 68.034279][ T8798] ? memcpy+0x46/0x50 [ 68.034300][ T8798] llcp_sock_getname+0x358/0x460 [ 68.057233][ T8800] RBP: ffff88808ddffd70 R08: 1ffff11011bbffc2 R09: ffffed1011bbffc3 [ 68.059951][ T8798] __sys_getpeername+0x12b/0x290 [ 68.059971][ T8798] ? __ia32_sys_getsockname+0xb0/0xb0 [ 68.069279][ T8800] R10: ffffed1011bbffc2 R11: ffff88808ddffe12 R12: 0000000000000001 [ 68.073975][ T8798] ? up_read+0x1d2/0x810 [ 68.073995][ T8798] ? __kasan_check_write+0x14/0x20 [ 68.074008][ T8798] ? switch_fpu_return+0x1fa/0x4f0 [ 68.074023][ T8798] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 68.074043][ T8798] __x64_sys_getpeername+0x73/0xb0 [ 68.085237][ T8800] R13: ffff88808ddffe12 R14: 0000000000000000 R15: ffffffff886622e0 [ 68.089982][ T8798] do_syscall_64+0xfa/0x760 [ 68.090005][ T8798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 68.101111][ T8800] FS: 0000000000760880(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 68.105925][ T8798] RIP: 0033:0x4412b9 [ 68.105939][ T8798] Code: e8 ac e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 68.105951][ T8798] RSP: 002b:00007ffec6cef178 EFLAGS: 00000246 ORIG_RAX: 0000000000000034 [ 68.117328][ T8800] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 68.122841][ T8798] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004412b9 [ 68.122847][ T8798] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 68.122855][ T8798] RBP: 0000000000010610 R08: 00000000004002c8 R09: 00000000004002c8 [ 68.122862][ T8798] R10: 00000000004002c8 R11: 0000000000000246 R12: 0000000000402030 [ 68.122868][ T8798] R13: 00000000004020c0 R14: 0000000000000000 R15: 0000000000000000 [ 68.122879][ T8798] Modules linked in: [ 68.122902][ T8798] CR2: 0000000000000000 [ 68.126231][ T8732] Kernel panic - not syncing: panic_on_warn set ... [ 68.134701][ T8800] CR2: 00000000004bf7c8 CR3: 00000000a3e40000 CR4: 00000000001406f0 [ 68.138770][ T8732] Kernel Offset: disabled [ 68.360972][ T8732] Rebooting in 86400 seconds..