[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 16.556174] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 21.014260] random: sshd: uninitialized urandom read (32 bytes read) [ 21.377333] random: sshd: uninitialized urandom read (32 bytes read) [ 22.086608] random: sshd: uninitialized urandom read (32 bytes read) [ 22.222060] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.27' (ECDSA) to the list of known hosts. [ 27.790640] random: sshd: uninitialized urandom read (32 bytes read) executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 27.874231] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. executing program [ 27.939530] ================================================================== [ 27.947085] BUG: KASAN: slab-out-of-bounds in pdu_read+0x90/0xd0 [ 27.953229] Read of size 52508 at addr ffff8801c19d0c6d by task syz-executor490/4486 [ 27.961113] [ 27.962729] CPU: 1 PID: 4486 Comm: syz-executor490 Not tainted 4.18.0-rc4-next-20180710+ #3 [ 27.971198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 27.980551] Call Trace: [ 27.983130] dump_stack+0x1c9/0x2b4 [ 27.986738] ? dump_stack_print_info.cold.2+0x52/0x52 [ 27.991915] ? printk+0xa7/0xcf [ 27.995183] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 27.999925] ? pdu_read+0x90/0xd0 [ 28.003378] print_address_description+0x6c/0x20b [ 28.008215] ? pdu_read+0x90/0xd0 [ 28.011647] kasan_report.cold.7+0x242/0x30d [ 28.016038] check_memory_region+0x13e/0x1b0 [ 28.020428] memcpy+0x23/0x50 [ 28.023516] pdu_read+0x90/0xd0 [ 28.026776] p9pdu_readf+0x579/0x2170 [ 28.030558] ? p9pdu_writef+0xe0/0xe0 [ 28.034345] ? ksys_dup3+0x690/0x690 [ 28.038043] ? check_same_owner+0x340/0x340 [ 28.042361] ? p9_fd_poll+0x2b0/0x2b0 [ 28.046154] ? kasan_kmalloc+0xc4/0xe0 [ 28.050043] ? kasan_unpoison_shadow+0x35/0x50 [ 28.054619] ? p9_fd_show_options+0x1c0/0x1c0 [ 28.059102] ? __raw_spin_lock_init+0x2d/0x100 [ 28.063668] p9_client_create+0xde0/0x16c9 [ 28.067885] ? p9_client_read+0xc60/0xc60 [ 28.072033] ? kasan_check_read+0x11/0x20 [ 28.076169] ? lock_acquire+0x1e4/0x540 [ 28.080125] ? fs_reclaim_acquire+0x20/0x20 [ 28.084431] ? lock_release+0xa30/0xa30 [ 28.088386] ? __lockdep_init_map+0x105/0x590 [ 28.092867] ? kasan_check_write+0x14/0x20 [ 28.097086] ? __init_rwsem+0x1cc/0x2a0 [ 28.101041] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 28.106051] ? __kmalloc_track_caller+0x311/0x760 [ 28.110875] ? save_stack+0xa9/0xd0 [ 28.114486] ? save_stack+0x43/0xd0 [ 28.118109] ? kasan_kmalloc+0xc4/0xe0 [ 28.121980] ? kmem_cache_alloc_trace+0x152/0x780 [ 28.126804] ? memcpy+0x45/0x50 [ 28.130458] v9fs_session_init+0x21a/0x1a80 [ 28.134778] ? rcu_note_context_switch+0x730/0x730 [ 28.139712] ? do_mount+0x69e/0x1fb0 [ 28.143415] ? lock_acquire+0x1e4/0x540 [ 28.147376] ? v9fs_show_options+0x7e0/0x7e0 [ 28.151773] ? lock_release+0xa30/0xa30 [ 28.155737] ? check_same_owner+0x340/0x340 [ 28.160046] ? kasan_unpoison_shadow+0x35/0x50 [ 28.164613] ? kasan_kmalloc+0xc4/0xe0 [ 28.168497] ? kmem_cache_alloc_trace+0x318/0x780 [ 28.173320] ? kasan_unpoison_shadow+0x35/0x50 [ 28.177880] ? kasan_kmalloc+0xc4/0xe0 [ 28.181753] v9fs_mount+0x7c/0x900 [ 28.185273] ? v9fs_drop_inode+0x150/0x150 [ 28.189491] legacy_get_tree+0x118/0x440 [ 28.193551] vfs_get_tree+0x1cb/0x5c0 [ 28.197336] do_mount+0x6c1/0x1fb0 [ 28.200859] ? kasan_check_write+0x14/0x20 [ 28.205076] ? copy_mount_string+0x40/0x40 [ 28.209287] ? kasan_kmalloc+0xc4/0xe0 [ 28.213158] ? kmem_cache_alloc_trace+0x318/0x780 [ 28.217983] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 28.223504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 28.229027] ? copy_mount_options+0x285/0x380 [ 28.233516] ksys_mount+0x12d/0x140 [ 28.237134] __x64_sys_mount+0xbe/0x150 [ 28.241113] do_syscall_64+0x1b9/0x820 [ 28.244979] ? syscall_return_slowpath+0x5e0/0x5e0 [ 28.249912] ? syscall_return_slowpath+0x31d/0x5e0 [ 28.254874] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 28.259886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 28.265409] ? prepare_exit_to_usermode+0x291/0x3b0 [ 28.270410] ? perf_trace_sys_enter+0xb10/0xb10 [ 28.275147] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 28.279983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 28.285150] RIP: 0033:0x440979 [ 28.288315] Code: e8 8c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 28.307431] RSP: 002b:00007fff13df7a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 28.315119] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440979 [ 28.322370] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 28.329632] RBP: 0000000000000000 R08: 0000000020000180 R09: 00000000004002c8 [ 28.336880] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000006d1e [ 28.344147] R13: 0000000000401ed0 R14: 0000000000000000 R15: 0000000000000000 [ 28.351588] [ 28.353194] Allocated by task 4486: [ 28.357089] save_stack+0x43/0xd0 [ 28.360528] kasan_kmalloc+0xc4/0xe0 [ 28.364218] __kmalloc+0x14e/0x760 [ 28.367751] p9_fcall_alloc+0x1e/0x90 [ 28.371541] p9_client_prepare_req.part.9+0x754/0xcd0 [ 28.376717] p9_client_rpc+0x1bd/0x1400 [ 28.380668] p9_client_create+0xd09/0x16c9 [ 28.384901] v9fs_session_init+0x21a/0x1a80 [ 28.389213] v9fs_mount+0x7c/0x900 [ 28.392764] legacy_get_tree+0x118/0x440 [ 28.396813] vfs_get_tree+0x1cb/0x5c0 [ 28.400685] do_mount+0x6c1/0x1fb0 [ 28.404205] ksys_mount+0x12d/0x140 [ 28.407819] __x64_sys_mount+0xbe/0x150 [ 28.411778] do_syscall_64+0x1b9/0x820 [ 28.415646] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 28.420807] [ 28.422417] Freed by task 0: [ 28.425412] (stack is not available) [ 28.429099] [ 28.430712] The buggy address belongs to the object at ffff8801c19d0c40 [ 28.430712] which belongs to the cache kmalloc-16384 of size 16384 [ 28.443719] The buggy address is located 45 bytes inside of [ 28.443719] 16384-byte region [ffff8801c19d0c40, ffff8801c19d4c40) [ 28.455665] The buggy address belongs to the page: [ 28.460755] page:ffffea0007067400 count:1 mapcount:0 mapping:ffff8801da802200 index:0x0 compound_mapcount: 0 [ 28.470701] flags: 0x2fffc0000008100(slab|head) [ 28.475361] raw: 02fffc0000008100 ffffea0006f63608 ffff8801da801c48 ffff8801da802200 [ 28.483260] raw: 0000000000000000 ffff8801c19d0c40 0000000100000001 0000000000000000 [ 28.491128] page dumped because: kasan: bad access detected [ 28.496817] [ 28.498427] Memory state around the buggy address: [ 28.503335] ffff8801c19d2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.510680] ffff8801c19d2b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.518030] >ffff8801c19d2c00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 28.525372] ^ [ 28.531862] ffff8801c19d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.539232] ffff8801c19d2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.546592] ================================================================== [ 28.554197] Kernel panic - not syncing: panic_on_warn set ... [ 28.554197] [ 28.561589] CPU: 1 PID: 4486 Comm: syz-executor490 Tainted: G B 4.18.0-rc4-next-20180710+ #3 [ 28.571453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 28.580800] Call Trace: [ 28.583377] dump_stack+0x1c9/0x2b4 [ 28.587011] ? dump_stack_print_info.cold.2+0x52/0x52 [ 28.592201] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 28.596968] panic+0x238/0x4e7 [ 28.600156] ? add_taint.cold.5+0x16/0x16 [ 28.604308] ? do_raw_spin_unlock+0xa7/0x2f0 [ 28.608699] ? pdu_read+0x90/0xd0 [ 28.612131] kasan_end_report+0x47/0x4f [ 28.616087] kasan_report.cold.7+0x76/0x30d [ 28.620402] check_memory_region+0x13e/0x1b0 [ 28.624790] memcpy+0x23/0x50 [ 28.627876] pdu_read+0x90/0xd0 [ 28.631135] p9pdu_readf+0x579/0x2170 [ 28.634916] ? p9pdu_writef+0xe0/0xe0 [ 28.638699] ? ksys_dup3+0x690/0x690 [ 28.642395] ? check_same_owner+0x340/0x340 [ 28.646697] ? p9_fd_poll+0x2b0/0x2b0 [ 28.650479] ? kasan_kmalloc+0xc4/0xe0 [ 28.654356] ? kasan_unpoison_shadow+0x35/0x50 [ 28.658920] ? p9_fd_show_options+0x1c0/0x1c0 [ 28.663406] ? __raw_spin_lock_init+0x2d/0x100 [ 28.667983] p9_client_create+0xde0/0x16c9 [ 28.672235] ? p9_client_read+0xc60/0xc60 [ 28.676631] ? kasan_check_read+0x11/0x20 [ 28.680768] ? lock_acquire+0x1e4/0x540 [ 28.684735] ? fs_reclaim_acquire+0x20/0x20 [ 28.689063] ? lock_release+0xa30/0xa30 [ 28.693018] ? __lockdep_init_map+0x105/0x590 [ 28.697601] ? kasan_check_write+0x14/0x20 [ 28.701821] ? __init_rwsem+0x1cc/0x2a0 [ 28.705772] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 28.710769] ? __kmalloc_track_caller+0x311/0x760 [ 28.715595] ? save_stack+0xa9/0xd0 [ 28.719209] ? save_stack+0x43/0xd0 [ 28.722830] ? kasan_kmalloc+0xc4/0xe0 [ 28.726702] ? kmem_cache_alloc_trace+0x152/0x780 [ 28.731522] ? memcpy+0x45/0x50 [ 28.734793] v9fs_session_init+0x21a/0x1a80 [ 28.739095] ? rcu_note_context_switch+0x730/0x730 [ 28.744002] ? do_mount+0x69e/0x1fb0 [ 28.747705] ? lock_acquire+0x1e4/0x540 [ 28.751677] ? v9fs_show_options+0x7e0/0x7e0 [ 28.756070] ? lock_release+0xa30/0xa30 [ 28.760028] ? check_same_owner+0x340/0x340 [ 28.764344] ? kasan_unpoison_shadow+0x35/0x50 [ 28.769092] ? kasan_kmalloc+0xc4/0xe0 [ 28.772964] ? kmem_cache_alloc_trace+0x318/0x780 [ 28.777791] ? kasan_unpoison_shadow+0x35/0x50 [ 28.782379] ? kasan_kmalloc+0xc4/0xe0 [ 28.786253] v9fs_mount+0x7c/0x900 [ 28.789782] ? v9fs_drop_inode+0x150/0x150 [ 28.794008] legacy_get_tree+0x118/0x440 [ 28.798054] vfs_get_tree+0x1cb/0x5c0 [ 28.801841] do_mount+0x6c1/0x1fb0 [ 28.805474] ? kasan_check_write+0x14/0x20 [ 28.809689] ? copy_mount_string+0x40/0x40 [ 28.813914] ? kasan_kmalloc+0xc4/0xe0 [ 28.817802] ? kmem_cache_alloc_trace+0x318/0x780 [ 28.822630] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 28.828149] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 28.833683] ? copy_mount_options+0x285/0x380 [ 28.838157] ksys_mount+0x12d/0x140 [ 28.841776] __x64_sys_mount+0xbe/0x150 [ 28.845733] do_syscall_64+0x1b9/0x820 [ 28.849608] ? syscall_return_slowpath+0x5e0/0x5e0 [ 28.854518] ? syscall_return_slowpath+0x31d/0x5e0 [ 28.859427] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 28.864422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 28.869941] ? prepare_exit_to_usermode+0x291/0x3b0 [ 28.874936] ? perf_trace_sys_enter+0xb10/0xb10 [ 28.879583] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 28.884410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 28.889578] RIP: 0033:0x440979 [ 28.892756] Code: e8 8c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 28.911872] RSP: 002b:00007fff13df7a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 28.919572] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440979 [ 28.926827] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 28.934074] RBP: 0000000000000000 R08: 0000000020000180 R09: 00000000004002c8 [ 28.941331] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000006d1e [ 28.948584] R13: 0000000000401ed0 R14: 0000000000000000 R15: 0000000000000000 [ 28.956328] Dumping ftrace buffer: [ 28.959951] (ftrace buffer empty) [ 28.963649] Kernel Offset: disabled [ 28.967281] Rebooting in 86400 seconds..