[ 54.767268] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.22' (ECDSA) to the list of known hosts. [ 60.306908] random: sshd: uninitialized urandom read (32 bytes read) executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 60.424333] audit: type=1400 audit(1564674979.239:36): avc: denied { map } for pid=7119 comm="syz-executor249" path="/root/syz-executor249710787" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 60.430500] md: md0 stopped. executing program executing program executing program [ 60.520633] md: md0 stopped. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 60.575129] md: md0 stopped. [ 60.581294] md: md0 stopped. [ 60.587843] md: md0 stopped. executing program executing program executing program executing program executing program [ 60.624048] md: md0 stopped. [ 60.627469] ================================================================== [ 60.634315] md: md0 stopped. [ 60.635076] BUG: KASAN: use-after-free in disk_unblock_events+0x55/0x60 [ 60.635082] Read of size 8 at addr ffff8880949b4b08 by task syz-executor249/7173 [ 60.635083] [ 60.635090] CPU: 0 PID: 7173 Comm: syz-executor249 Not tainted 4.14.135 #31 [ 60.635093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 executing program executing program executing program executing program executing program executing program [ 60.635098] Call Trace: [ 60.642742] md: md0 stopped. [ 60.645441] dump_stack+0x138/0x19c [ 60.645449] ? disk_unblock_events+0x55/0x60 [ 60.645462] print_address_description.cold+0x7c/0x1dc [ 60.645470] ? disk_unblock_events+0x55/0x60 [ 60.657495] md: md0 stopped. [ 60.662700] kasan_report.cold+0xa9/0x2af [ 60.662709] __asan_report_load8_noabort+0x14/0x20 [ 60.662714] disk_unblock_events+0x55/0x60 [ 60.662720] __blkdev_get+0x7d6/0x1120 [ 60.662728] ? __blkdev_put+0x7f0/0x7f0 [ 60.662732] ? bd_acquire+0x178/0x2c0 [ 60.662740] ? find_held_lock+0x35/0x130 [ 60.662745] blkdev_get+0xa8/0x8e0 [ 60.662753] ? bd_may_claim+0xd0/0xd0 [ 60.677721] md: md0 stopped. [ 60.678169] ? _raw_spin_unlock+0x2d/0x50 [ 60.678177] blkdev_open+0x1d1/0x260 [ 60.678184] ? security_file_open+0x89/0x190 [ 60.678193] do_dentry_open+0x73b/0xeb0 [ 60.686568] md: md0 stopped. [ 60.686733] ? bd_acquire+0x2c0/0x2c0 [ 60.696991] md: md0 stopped. [ 60.699568] vfs_open+0x105/0x220 [ 60.699579] path_openat+0x8bd/0x3f70 [ 60.699585] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 60.699596] ? trace_hardirqs_on+0x10/0x10 [ 60.708364] md: md0 stopped. [ 60.709121] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 60.709128] ? __lock_is_held+0xb6/0x140 [ 60.709133] ? save_trace+0x290/0x290 [ 60.709143] ? __alloc_fd+0x1d4/0x4a0 [ 60.717976] md: md0 stopped. [ 60.721748] do_filp_open+0x18e/0x250 [ 60.721754] ? __alloc_fd+0x1d4/0x4a0 [ 60.721763] ? may_open_dev+0xe0/0xe0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 60.721778] ? _raw_spin_unlock+0x2d/0x50 [ 60.721782] ? __alloc_fd+0x1d4/0x4a0 [ 60.721794] do_sys_open+0x2c5/0x430 [ 60.727406] md: md0 stopped. [ 60.730266] ? filp_open+0x70/0x70 [ 60.730272] ? up_read+0x1a/0x40 [ 60.730280] SyS_openat+0x30/0x40 [ 60.730284] ? SyS_open+0x40/0x40 [ 60.730292] do_syscall_64+0x1e8/0x640 [ 60.730296] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 60.730304] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 60.730310] RIP: 0033:0x441289 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 60.730317] RSP: 002b:00007ffdb3cbc9d8 EFLAGS: 00000246 [ 60.738721] md: md0 stopped. [ 60.741922] ORIG_RAX: 0000000000000101 [ 60.741927] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441289 [ 60.741930] RDX: 0000000000000000 RSI: 0000000020000240 RDI: ffffffffffffff9c [ 60.741932] RBP: 000000000000eca8 R08: 00000000004002c8 R09: 00000000004002c8 [ 60.741935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000402000 [ 60.741938] R13: 0000000000402090 R14: 0000000000000000 R15: 0000000000000000 [ 60.741948] executing program executing program executing program executing program executing program executing program [ 60.741952] Allocated by task 7148: [ 60.741962] save_stack_trace+0x16/0x20 [ 60.741967] save_stack+0x45/0xd0 [ 60.741971] kasan_kmalloc+0xce/0xf0 [ 60.741982] kmem_cache_alloc_node_trace+0x153/0x770 [ 60.749786] md: md0 stopped. [ 60.749978] alloc_disk_node+0x64/0x3e0 [ 60.749983] alloc_disk+0x1b/0x20 [ 60.749989] md_alloc+0x219/0x840 [ 60.749993] md_probe+0x31/0x40 [ 60.750003] kobj_lookup+0x21c/0x400 [ 60.758642] md: md0 stopped. [ 60.761757] get_gendisk+0x3b/0x240 executing program executing program executing program executing program executing program executing program [ 60.761764] __blkdev_get+0x3af/0x1120 [ 60.761767] blkdev_get+0xa8/0x8e0 [ 60.761771] blkdev_open+0x1d1/0x260 [ 60.761776] do_dentry_open+0x73b/0xeb0 [ 60.761779] vfs_open+0x105/0x220 [ 60.761785] path_openat+0x8bd/0x3f70 [ 60.761792] do_filp_open+0x18e/0x250 [ 60.767466] md: md0 stopped. [ 60.768601] do_sys_open+0x2c5/0x430 [ 60.768605] SyS_openat+0x30/0x40 [ 60.768612] do_syscall_64+0x1e8/0x640 [ 60.768618] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 60.768620] [ 60.768623] Freed by task 7173: [ 60.768629] save_stack_trace+0x16/0x20 [ 60.768638] save_stack+0x45/0xd0 [ 60.776088] md: md0 stopped. [ 60.776131] kasan_slab_free+0x75/0xc0 [ 60.786436] md: md0 stopped. [ 60.786716] kfree+0xcc/0x270 [ 60.794112] md: md0 stopped. [ 60.794556] disk_release+0x24b/0x2d0 [ 60.794564] device_release+0xf6/0x1a0 [ 60.794575] kobject_put.cold+0x269/0x2f9 [ 60.803063] md: md0 stopped. [ 60.803284] put_disk+0x23/0x30 [ 60.803290] __blkdev_get+0x73c/0x1120 [ 60.803293] blkdev_get+0xa8/0x8e0 [ 60.803297] blkdev_open+0x1d1/0x260 [ 60.803305] do_dentry_open+0x73b/0xeb0 [ 60.811136] md: md0 stopped. [ 60.814617] vfs_open+0x105/0x220 [ 60.814624] path_openat+0x8bd/0x3f70 [ 60.814628] do_filp_open+0x18e/0x250 [ 60.814632] do_sys_open+0x2c5/0x430 [ 60.814635] SyS_openat+0x30/0x40 [ 60.814642] do_syscall_64+0x1e8/0x640 [ 60.814651] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 60.822497] md: md0 stopped. [ 60.826538] [ 60.826546] The buggy address belongs to the object at ffff8880949b4580 [ 60.826546] which belongs to the cache kmalloc-2048 of size 2048 [ 60.826550] The buggy address is located 1416 bytes inside of [ 60.826550] 2048-byte region [ffff8880949b4580, ffff8880949b4d80) [ 60.826552] The buggy address belongs to the page: [ 60.826557] page:ffffea0002526d00 count:1 mapcount:0 mapping:ffff8880949b4580 index:0x0 compound_mapcount: 0 [ 60.826565] flags: 0x1fffc0000008100(slab|head) [ 60.826573] raw: 01fffc0000008100 ffff8880949b4580 0000000000000000 0000000100000003 [ 60.834557] md: md0 stopped. [ 60.837497] raw: ffffea0002940220 ffffea0002950f20 ffff8880aa800c40 0000000000000000 [ 60.837500] page dumped because: kasan: bad access detected [ 60.837502] [ 60.837504] Memory state around the buggy address: [ 60.837509] ffff8880949b4a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.837512] ffff8880949b4a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.837515] >ffff8880949b4b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.837517] ^ [ 60.837521] ffff8880949b4b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.837527] ffff8880949b4c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.845813] md: md0 stopped. [ 60.848554] ================================================================== [ 60.848558] Disabling lock debugging due to kernel taint [ 60.903931] Kernel panic - not syncing: panic_on_warn set ... [ 60.903931] [ 60.911013] md: md0 stopped. [ 60.913841] CPU: 0 PID: 7173 Comm: syz-executor249 Tainted: G B 4.14.135 #31 [ 60.913844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.913847] Call Trace: [ 60.913861] dump_stack+0x138/0x19c [ 60.923380] md: md0 stopped. [ 60.927415] ? disk_unblock_events+0x55/0x60 [ 60.927425] panic+0x1f2/0x426 [ 60.933845] md: md0 stopped. [ 60.935688] ? add_taint.cold+0x16/0x16 [ 60.935696] ? ___preempt_schedule+0x16/0x18 [ 60.935707] kasan_end_report+0x47/0x4f [ 60.942100] md: md0 stopped. [ 60.946057] kasan_report.cold+0x130/0x2af [ 60.946067] __asan_report_load8_noabort+0x14/0x20 [ 60.951726] md: md0 stopped. [ 60.953334] disk_unblock_events+0x55/0x60 [ 60.953339] __blkdev_get+0x7d6/0x1120 [ 60.953345] ? __blkdev_put+0x7f0/0x7f0 [ 60.953353] ? bd_acquire+0x178/0x2c0 [ 60.958915] md: md0 stopped. [ 60.960419] ? find_held_lock+0x35/0x130 [ 60.960425] blkdev_get+0xa8/0x8e0 [ 60.960430] ? bd_may_claim+0xd0/0xd0 [ 60.960438] ? _raw_spin_unlock+0x2d/0x50 [ 60.960445] blkdev_open+0x1d1/0x260 [ 60.966086] md: md0 stopped. [ 60.967624] ? security_file_open+0x89/0x190 [ 60.967631] do_dentry_open+0x73b/0xeb0 [ 60.967635] ? bd_acquire+0x2c0/0x2c0 [ 60.967643] vfs_open+0x105/0x220 [ 60.972773] md: md0 stopped. [ 60.974275] path_openat+0x8bd/0x3f70 [ 60.974280] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 60.974286] ? trace_hardirqs_on+0x10/0x10 [ 60.974294] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 60.980823] md: md0 stopped. [ 60.982253] ? __lock_is_held+0xb6/0x140 [ 60.982260] ? save_trace+0x290/0x290 [ 60.982270] ? __alloc_fd+0x1d4/0x4a0 [ 60.988610] md: md0 stopped. [ 60.990466] do_filp_open+0x18e/0x250 [ 60.990471] ? __alloc_fd+0x1d4/0x4a0 [ 60.990475] ? may_open_dev+0xe0/0xe0 [ 60.990483] ? _raw_spin_unlock+0x2d/0x50 [ 60.990486] ? __alloc_fd+0x1d4/0x4a0 [ 60.990494] do_sys_open+0x2c5/0x430 [ 60.990501] ? filp_open+0x70/0x70 [ 60.996398] md: md0 stopped. [ 60.998195] ? up_read+0x1a/0x40 [ 60.998205] SyS_openat+0x30/0x40 [ 60.998208] ? SyS_open+0x40/0x40 [ 60.998216] do_syscall_64+0x1e8/0x640 [ 60.998223] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 61.004828] md: md0 stopped. [ 61.005138] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 61.011159] md: md0 stopped. [ 61.012439] RIP: 0033:0x441289 [ 61.012442] RSP: 002b:00007ffdb3cbc9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 61.012448] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441289 [ 61.012450] RDX: 0000000000000000 RSI: 0000000020000240 RDI: ffffffffffffff9c [ 61.012457] RBP: 000000000000eca8 R08: 00000000004002c8 R09: 00000000004002c8 [ 61.018804] md: md0 stopped. [ 61.021894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000402000 [ 61.021897] R13: 0000000000402090 R14: 0000000000000000 R15: 0000000000000000 [ 61.023093] Kernel Offset: disabled [ 61.546369] Rebooting in 86400 seconds..