[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 19.309299] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 20.686180] random: sshd: uninitialized urandom read (32 bytes read) [ 20.939416] random: sshd: uninitialized urandom read (32 bytes read) [ 21.808525] random: sshd: uninitialized urandom read (32 bytes read) [ 47.102253] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.39' (ECDSA) to the list of known hosts. [ 52.547796] random: sshd: uninitialized urandom read (32 bytes read) executing program executing program executing program [ 52.642168] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 52.672307] ================================================================== [ 52.679775] BUG: KASAN: slab-out-of-bounds in pdu_read+0x90/0xd0 [ 52.685911] Read of size 17044 at addr ffff8801c2d705ed by task syz-executor999/4571 [ 52.693786] [ 52.695421] CPU: 1 PID: 4571 Comm: syz-executor999 Not tainted 4.18.0-rc3+ #137 [ 52.702844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 52.712184] Call Trace: [ 52.714766] dump_stack+0x1c9/0x2b4 [ 52.718374] ? dump_stack_print_info.cold.2+0x52/0x52 [ 52.723543] ? printk+0xa7/0xcf [ 52.726811] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 52.731549] ? pdu_read+0x90/0xd0 [ 52.734987] print_address_description+0x6c/0x20b [ 52.739812] ? pdu_read+0x90/0xd0 [ 52.743245] kasan_report.cold.7+0x242/0x2fe [ 52.747650] check_memory_region+0x13e/0x1b0 [ 52.752043] memcpy+0x23/0x50 [ 52.755131] pdu_read+0x90/0xd0 [ 52.758396] p9pdu_readf+0x579/0x2170 [ 52.762183] ? p9pdu_writef+0xe0/0xe0 [ 52.765968] ? __fget+0x414/0x670 [ 52.769423] ? rcu_is_watching+0x61/0x150 [ 52.773556] ? expand_files.part.8+0x9c0/0x9c0 [ 52.778126] ? rcu_read_lock_sched_held+0x108/0x120 [ 52.783138] ? p9_fd_show_options+0x1c0/0x1c0 [ 52.787620] p9_client_create+0xde0/0x16c9 [ 52.791855] ? p9_client_read+0xc60/0xc60 [ 52.795996] ? find_held_lock+0x36/0x1c0 [ 52.800048] ? __lockdep_init_map+0x105/0x590 [ 52.804529] ? kasan_check_write+0x14/0x20 [ 52.808747] ? __init_rwsem+0x1cc/0x2a0 [ 52.812712] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 52.817715] ? rcu_read_lock_sched_held+0x108/0x120 [ 52.822720] ? __kmalloc_track_caller+0x5f5/0x760 [ 52.827554] ? save_stack+0xa9/0xd0 [ 52.831168] ? save_stack+0x43/0xd0 [ 52.834783] ? kasan_kmalloc+0xc4/0xe0 [ 52.838662] ? kmem_cache_alloc_trace+0x152/0x780 [ 52.843760] ? memcpy+0x45/0x50 [ 52.847027] v9fs_session_init+0x21a/0x1a80 [ 52.851332] ? find_held_lock+0x36/0x1c0 [ 52.855381] ? v9fs_show_options+0x7e0/0x7e0 [ 52.859786] ? kasan_check_read+0x11/0x20 [ 52.863920] ? rcu_is_watching+0x8c/0x150 [ 52.868052] ? rcu_pm_notify+0xc0/0xc0 [ 52.871938] ? v9fs_mount+0x61/0x900 [ 52.875648] ? rcu_read_lock_sched_held+0x108/0x120 [ 52.880665] ? kmem_cache_alloc_trace+0x616/0x780 [ 52.885496] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 52.891023] v9fs_mount+0x7c/0x900 [ 52.894556] mount_fs+0xae/0x328 [ 52.897916] vfs_kern_mount.part.34+0xdc/0x4e0 [ 52.902478] ? may_umount+0xb0/0xb0 [ 52.906091] ? _raw_read_unlock+0x22/0x30 [ 52.910225] ? __get_fs_type+0x97/0xc0 [ 52.914104] do_mount+0x581/0x30e0 [ 52.917735] ? copy_mount_string+0x40/0x40 [ 52.921953] ? copy_mount_options+0x5f/0x380 [ 52.926345] ? rcu_read_lock_sched_held+0x108/0x120 [ 52.931345] ? kmem_cache_alloc_trace+0x616/0x780 [ 52.936175] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 52.941694] ? _copy_from_user+0xdf/0x150 [ 52.945828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 52.951347] ? copy_mount_options+0x285/0x380 [ 52.955832] ksys_mount+0x12d/0x140 [ 52.959444] __x64_sys_mount+0xbe/0x150 [ 52.963418] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 52.968422] do_syscall_64+0x1b9/0x820 [ 52.972303] ? syscall_return_slowpath+0x5e0/0x5e0 [ 52.977225] ? syscall_return_slowpath+0x31d/0x5e0 [ 52.982151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 52.987759] ? retint_user+0x18/0x18 [ 52.991808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 52.996636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.001805] RIP: 0033:0x440979 [ 53.004973] Code: e8 8c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 53.024262] RSP: 002b:00007ffd4d3788b8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 53.031955] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440979 [ 53.039219] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 53.046472] RBP: 0000000000000000 R08: 0000000020000180 R09: 00000000004002c8 [ 53.053724] R10: 0000000000000000 R11: 0000000000000206 R12: 000000000000cdb9 [ 53.060990] R13: 0000000000401ed0 R14: 0000000000000000 R15: 0000000000000000 [ 53.068249] [ 53.069865] Allocated by task 4571: [ 53.073474] save_stack+0x43/0xd0 [ 53.077957] kasan_kmalloc+0xc4/0xe0 [ 53.081649] __kmalloc+0x14e/0x760 [ 53.085180] p9_fcall_alloc+0x1e/0x90 [ 53.088960] p9_client_prepare_req.part.8+0x754/0xcd0 [ 53.094131] p9_client_rpc+0x1bd/0x1400 [ 53.098093] p9_client_create+0xd09/0x16c9 [ 53.102530] v9fs_session_init+0x21a/0x1a80 [ 53.106836] v9fs_mount+0x7c/0x900 [ 53.110374] mount_fs+0xae/0x328 [ 53.113735] vfs_kern_mount.part.34+0xdc/0x4e0 [ 53.118301] do_mount+0x581/0x30e0 [ 53.121824] ksys_mount+0x12d/0x140 [ 53.126181] __x64_sys_mount+0xbe/0x150 [ 53.130388] do_syscall_64+0x1b9/0x820 [ 53.134296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.139466] [ 53.141077] Freed by task 0: [ 53.144071] (stack is not available) [ 53.147762] [ 53.149369] The buggy address belongs to the object at ffff8801c2d705c0 [ 53.149369] which belongs to the cache kmalloc-16384 of size 16384 [ 53.162356] The buggy address is located 45 bytes inside of [ 53.162356] 16384-byte region [ffff8801c2d705c0, ffff8801c2d745c0) [ 53.174300] The buggy address belongs to the page: [ 53.179213] page:ffffea00070b5c00 count:1 mapcount:0 mapping:ffff8801da802200 index:0x0 compound_mapcount: 0 [ 53.189175] flags: 0x2fffc0000008100(slab|head) [ 53.193826] raw: 02fffc0000008100 ffffea0006b29608 ffff8801da801c48 ffff8801da802200 [ 53.201690] raw: 0000000000000000 ffff8801c2d705c0 0000000100000001 0000000000000000 [ 53.209554] page dumped because: kasan: bad access detected [ 53.215247] [ 53.216850] Memory state around the buggy address: [ 53.221771] ffff8801c2d72480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 53.229489] ffff8801c2d72500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 53.236830] >ffff8801c2d72580: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 53.244167] ^ [ 53.250639] ffff8801c2d72600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.257993] ffff8801c2d72680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.265329] ================================================================== [ 53.272664] Disabling lock debugging due to kernel taint [ 53.278199] Kernel panic - not syncing: panic_on_warn set ... [ 53.278199] [ 53.285555] CPU: 1 PID: 4571 Comm: syz-executor999 Tainted: G B 4.18.0-rc3+ #137 [ 53.294370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 53.303702] Call Trace: [ 53.306277] dump_stack+0x1c9/0x2b4 [ 53.309884] ? dump_stack_print_info.cold.2+0x52/0x52 [ 53.315055] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 53.319792] panic+0x238/0x4e7 [ 53.322965] ? add_taint.cold.5+0x16/0x16 [ 53.327093] ? do_raw_spin_unlock+0xa7/0x2f0 [ 53.331482] ? pdu_read+0x90/0xd0 [ 53.334923] kasan_end_report+0x47/0x4f [ 53.338886] kasan_report.cold.7+0x76/0x2fe [ 53.343186] check_memory_region+0x13e/0x1b0 [ 53.348963] memcpy+0x23/0x50 [ 53.352056] pdu_read+0x90/0xd0 [ 53.355319] p9pdu_readf+0x579/0x2170 [ 53.359097] ? p9pdu_writef+0xe0/0xe0 [ 53.362964] ? __fget+0x414/0x670 [ 53.366396] ? rcu_is_watching+0x61/0x150 [ 53.370523] ? expand_files.part.8+0x9c0/0x9c0 [ 53.375099] ? rcu_read_lock_sched_held+0x108/0x120 [ 53.380099] ? p9_fd_show_options+0x1c0/0x1c0 [ 53.384577] p9_client_create+0xde0/0x16c9 [ 53.388802] ? p9_client_read+0xc60/0xc60 [ 53.392929] ? find_held_lock+0x36/0x1c0 [ 53.396971] ? __lockdep_init_map+0x105/0x590 [ 53.401536] ? kasan_check_write+0x14/0x20 [ 53.405846] ? __init_rwsem+0x1cc/0x2a0 [ 53.409900] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 53.414918] ? rcu_read_lock_sched_held+0x108/0x120 [ 53.419929] ? __kmalloc_track_caller+0x5f5/0x760 [ 53.424759] ? save_stack+0xa9/0xd0 [ 53.428365] ? save_stack+0x43/0xd0 [ 53.431977] ? kasan_kmalloc+0xc4/0xe0 [ 53.435845] ? kmem_cache_alloc_trace+0x152/0x780 [ 53.440668] ? memcpy+0x45/0x50 [ 53.443930] v9fs_session_init+0x21a/0x1a80 [ 53.448234] ? find_held_lock+0x36/0x1c0 [ 53.452275] ? v9fs_show_options+0x7e0/0x7e0 [ 53.456665] ? kasan_check_read+0x11/0x20 [ 53.460789] ? rcu_is_watching+0x8c/0x150 [ 53.464919] ? rcu_pm_notify+0xc0/0xc0 [ 53.468798] ? v9fs_mount+0x61/0x900 [ 53.472503] ? rcu_read_lock_sched_held+0x108/0x120 [ 53.477506] ? kmem_cache_alloc_trace+0x616/0x780 [ 53.482331] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 53.487869] v9fs_mount+0x7c/0x900 [ 53.491391] mount_fs+0xae/0x328 [ 53.494741] vfs_kern_mount.part.34+0xdc/0x4e0 [ 53.499312] ? may_umount+0xb0/0xb0 [ 53.502920] ? _raw_read_unlock+0x22/0x30 [ 53.507046] ? __get_fs_type+0x97/0xc0 [ 53.510912] do_mount+0x581/0x30e0 [ 53.514440] ? copy_mount_string+0x40/0x40 [ 53.518662] ? copy_mount_options+0x5f/0x380 [ 53.523068] ? rcu_read_lock_sched_held+0x108/0x120 [ 53.528064] ? kmem_cache_alloc_trace+0x616/0x780 [ 53.532889] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 53.538410] ? _copy_from_user+0xdf/0x150 [ 53.542541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.548068] ? copy_mount_options+0x285/0x380 [ 53.552541] ksys_mount+0x12d/0x140 [ 53.556145] __x64_sys_mount+0xbe/0x150 [ 53.560106] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 53.565110] do_syscall_64+0x1b9/0x820 [ 53.568996] ? syscall_return_slowpath+0x5e0/0x5e0 [ 53.573909] ? syscall_return_slowpath+0x31d/0x5e0 [ 53.578828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.584345] ? retint_user+0x18/0x18 [ 53.588039] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 53.592864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.598031] RIP: 0033:0x440979 [ 53.601220] Code: e8 8c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 53.620397] RSP: 002b:00007ffd4d3788b8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 53.628083] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440979 [ 53.635332] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 53.642578] RBP: 0000000000000000 R08: 0000000020000180 R09: 00000000004002c8 [ 53.649831] R10: 0000000000000000 R11: 0000000000000206 R12: 000000000000cdb9 [ 53.657091] R13: 0000000000401ed0 R14: 0000000000000000 R15: 0000000000000000 [ 53.664776] Dumping ftrace buffer: [ 53.668292] (ftrace buffer empty) [ 53.671989] Kernel Offset: disabled [ 53.675596] Rebooting in 86400 seconds..