[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 19.789269] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 23.830272] random: sshd: uninitialized urandom read (32 bytes read) [ 24.377578] random: sshd: uninitialized urandom read (32 bytes read) [ 25.221339] random: sshd: uninitialized urandom read (32 bytes read) [ 25.382194] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.60' (ECDSA) to the list of known hosts. [ 30.806195] random: sshd: uninitialized urandom read (32 bytes read) executing program executing program executing program executing program executing program executing program executing program [ 30.903172] ================================================================== [ 30.910651] BUG: KASAN: slab-out-of-bounds in pdu_read+0x90/0xd0 [ 30.916794] Read of size 32583 at addr ffff8801b63988ad by task syz-executor523/4561 [ 30.924656] [ 30.926285] CPU: 1 PID: 4561 Comm: syz-executor523 Not tainted 4.18.0-rc4+ #140 [ 30.933725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.943073] Call Trace: [ 30.945663] dump_stack+0x1c9/0x2b4 [ 30.949295] ? dump_stack_print_info.cold.2+0x52/0x52 [ 30.954469] ? printk+0xa7/0xcf [ 30.957740] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 30.962569] ? pdu_read+0x90/0xd0 [ 30.966016] print_address_description+0x6c/0x20b [ 30.970856] ? pdu_read+0x90/0xd0 [ 30.974293] kasan_report.cold.7+0x242/0x2fe [ 30.978698] check_memory_region+0x13e/0x1b0 [ 30.983091] memcpy+0x23/0x50 [ 30.986181] pdu_read+0x90/0xd0 [ 30.989449] p9pdu_readf+0x579/0x2170 [ 30.993236] ? p9pdu_writef+0xe0/0xe0 [ 30.997020] ? __fget+0x414/0x670 [ 31.000462] ? rcu_is_watching+0x61/0x150 [ 31.004591] ? expand_files.part.8+0x9c0/0x9c0 [ 31.009161] ? rcu_read_lock_sched_held+0x108/0x120 [ 31.014170] ? p9_fd_show_options+0x1c0/0x1c0 [ 31.018652] p9_client_create+0xde0/0x16c9 [ 31.022895] ? p9_client_read+0xc60/0xc60 [ 31.027029] ? find_held_lock+0x36/0x1c0 [ 31.031083] ? __lockdep_init_map+0x105/0x590 [ 31.035585] ? kasan_check_write+0x14/0x20 [ 31.039819] ? __init_rwsem+0x1cc/0x2a0 [ 31.043788] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 31.048809] ? rcu_read_lock_sched_held+0x108/0x120 [ 31.053824] ? __kmalloc_track_caller+0x5f5/0x760 [ 31.058662] ? save_stack+0xa9/0xd0 [ 31.062271] ? save_stack+0x43/0xd0 [ 31.065880] ? kasan_kmalloc+0xc4/0xe0 [ 31.069765] ? kmem_cache_alloc_trace+0x152/0x780 [ 31.074600] ? memcpy+0x45/0x50 [ 31.077875] v9fs_session_init+0x21a/0x1a80 [ 31.082182] ? find_held_lock+0x36/0x1c0 [ 31.086234] ? v9fs_show_options+0x7e0/0x7e0 [ 31.090632] ? kasan_check_read+0x11/0x20 [ 31.094769] ? rcu_is_watching+0x8c/0x150 [ 31.098909] ? rcu_pm_notify+0xc0/0xc0 [ 31.102791] ? v9fs_mount+0x61/0x900 [ 31.106496] ? rcu_read_lock_sched_held+0x108/0x120 [ 31.111514] ? kmem_cache_alloc_trace+0x616/0x780 [ 31.116349] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 31.121894] v9fs_mount+0x7c/0x900 [ 31.125424] mount_fs+0xae/0x328 [ 31.128791] vfs_kern_mount.part.34+0xdc/0x4e0 [ 31.133362] ? may_umount+0xb0/0xb0 [ 31.136975] ? _raw_read_unlock+0x22/0x30 [ 31.141110] ? __get_fs_type+0x97/0xc0 [ 31.144985] do_mount+0x581/0x30e0 [ 31.148512] ? copy_mount_string+0x40/0x40 [ 31.152756] ? copy_mount_options+0x5f/0x380 [ 31.157152] ? rcu_read_lock_sched_held+0x108/0x120 [ 31.162156] ? kmem_cache_alloc_trace+0x616/0x780 [ 31.167005] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 31.172549] ? _copy_from_user+0xdf/0x150 [ 31.176689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 31.182213] ? copy_mount_options+0x285/0x380 [ 31.186721] ksys_mount+0x12d/0x140 [ 31.190595] __x64_sys_mount+0xbe/0x150 [ 31.194592] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 31.199616] do_syscall_64+0x1b9/0x820 [ 31.203496] ? syscall_return_slowpath+0x5e0/0x5e0 [ 31.208438] ? syscall_return_slowpath+0x31d/0x5e0 [ 31.213367] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 31.218734] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 31.223564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 31.228739] RIP: 0033:0x4401a9 [ 31.231907] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 31.251089] RSP: 002b:00007fff3e60d4e8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 31.258810] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004401a9 [ 31.266064] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 31.273318] RBP: 0030656c69662f2e R08: 00000000200002c0 R09: 0000000000000001 [ 31.280573] R10: 0000000000000000 R11: 0000000000000206 R12: 64663d736e617274 [ 31.287830] R13: 0000040000000002 R14: 0000000000000000 R15: 0000000000000000 [ 31.295093] [ 31.296702] Allocated by task 4561: [ 31.300324] save_stack+0x43/0xd0 [ 31.303775] kasan_kmalloc+0xc4/0xe0 [ 31.307469] __kmalloc+0x14e/0x760 [ 31.311009] p9_fcall_alloc+0x1e/0x90 [ 31.314807] p9_client_prepare_req.part.8+0x754/0xcd0 [ 31.320006] p9_client_rpc+0x1bd/0x1400 [ 31.323985] p9_client_create+0xd09/0x16c9 [ 31.328220] v9fs_session_init+0x21a/0x1a80 [ 31.332529] v9fs_mount+0x7c/0x900 [ 31.336053] mount_fs+0xae/0x328 [ 31.339412] vfs_kern_mount.part.34+0xdc/0x4e0 [ 31.343990] do_mount+0x581/0x30e0 [ 31.347518] ksys_mount+0x12d/0x140 [ 31.351143] __x64_sys_mount+0xbe/0x150 [ 31.355116] do_syscall_64+0x1b9/0x820 [ 31.359000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 31.364172] [ 31.365783] Freed by task 0: [ 31.368790] (stack is not available) [ 31.372503] [ 31.374115] The buggy address belongs to the object at ffff8801b6398880 [ 31.374115] which belongs to the cache kmalloc-16384 of size 16384 [ 31.387258] The buggy address is located 45 bytes inside of [ 31.387258] 16384-byte region [ffff8801b6398880, ffff8801b639c880) [ 31.399213] The buggy address belongs to the page: [ 31.404148] page:ffffea0006d8e600 count:1 mapcount:0 mapping:ffff8801da802200 index:0x0 compound_mapcount: 0 [ 31.414104] flags: 0x2fffc0000008100(slab|head) [ 31.418758] raw: 02fffc0000008100 ffffea0006d88c08 ffff8801da801c48 ffff8801da802200 [ 31.426641] raw: 0000000000000000 ffff8801b6398880 0000000100000001 0000000000000000 [ 31.434507] page dumped because: kasan: bad access detected [ 31.440195] [ 31.441812] Memory state around the buggy address: [ 31.446727] ffff8801b639a780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.454081] ffff8801b639a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.461455] >ffff8801b639a880: 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc [ 31.468820] ^ [ 31.473215] ffff8801b639a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.480558] ffff8801b639a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.487906] ================================================================== [ 31.495246] Disabling lock debugging due to kernel taint [ 31.500785] Kernel panic - not syncing: panic_on_warn set ... [ 31.500785] [ 31.508144] CPU: 1 PID: 4561 Comm: syz-executor523 Tainted: G B 4.18.0-rc4+ #140 [ 31.516968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 31.526307] Call Trace: [ 31.528891] dump_stack+0x1c9/0x2b4 [ 31.532514] ? dump_stack_print_info.cold.2+0x52/0x52 [ 31.537690] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 31.542447] panic+0x238/0x4e7 [ 31.545620] ? add_taint.cold.5+0x16/0x16 [ 31.549751] ? do_raw_spin_unlock+0xa7/0x2f0 [ 31.554149] ? pdu_read+0x90/0xd0 [ 31.558118] kasan_end_report+0x47/0x4f [ 31.562097] kasan_report.cold.7+0x76/0x2fe [ 31.566401] check_memory_region+0x13e/0x1b0 [ 31.570804] memcpy+0x23/0x50 [ 31.573906] pdu_read+0x90/0xd0 [ 31.577182] p9pdu_readf+0x579/0x2170 [ 31.580972] ? p9pdu_writef+0xe0/0xe0 [ 31.584771] ? __fget+0x414/0x670 [ 31.588209] ? rcu_is_watching+0x61/0x150 [ 31.592349] ? expand_files.part.8+0x9c0/0x9c0 [ 31.596916] ? rcu_read_lock_sched_held+0x108/0x120 [ 31.601917] ? p9_fd_show_options+0x1c0/0x1c0 [ 31.606431] p9_client_create+0xde0/0x16c9 [ 31.610669] ? p9_client_read+0xc60/0xc60 [ 31.614814] ? find_held_lock+0x36/0x1c0 [ 31.618871] ? __lockdep_init_map+0x105/0x590 [ 31.623359] ? kasan_check_write+0x14/0x20 [ 31.627586] ? __init_rwsem+0x1cc/0x2a0 [ 31.631541] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 31.636548] ? rcu_read_lock_sched_held+0x108/0x120 [ 31.641547] ? __kmalloc_track_caller+0x5f5/0x760 [ 31.646371] ? save_stack+0xa9/0xd0 [ 31.649987] ? save_stack+0x43/0xd0 [ 31.653637] ? kasan_kmalloc+0xc4/0xe0 [ 31.657777] ? kmem_cache_alloc_trace+0x152/0x780 [ 31.662601] ? memcpy+0x45/0x50 [ 31.665871] v9fs_session_init+0x21a/0x1a80 [ 31.670182] ? find_held_lock+0x36/0x1c0 [ 31.674231] ? v9fs_show_options+0x7e0/0x7e0 [ 31.678630] ? kasan_check_read+0x11/0x20 [ 31.682767] ? rcu_is_watching+0x8c/0x150 [ 31.686895] ? rcu_pm_notify+0xc0/0xc0 [ 31.690773] ? v9fs_mount+0x61/0x900 [ 31.694486] ? rcu_read_lock_sched_held+0x108/0x120 [ 31.699486] ? kmem_cache_alloc_trace+0x616/0x780 [ 31.704310] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 31.709836] v9fs_mount+0x7c/0x900 [ 31.713365] mount_fs+0xae/0x328 [ 31.716713] vfs_kern_mount.part.34+0xdc/0x4e0 [ 31.721282] ? may_umount+0xb0/0xb0 [ 31.724907] ? _raw_read_unlock+0x22/0x30 [ 31.729041] ? __get_fs_type+0x97/0xc0 [ 31.732926] do_mount+0x581/0x30e0 [ 31.736462] ? copy_mount_string+0x40/0x40 [ 31.740697] ? copy_mount_options+0x5f/0x380 [ 31.745093] ? rcu_read_lock_sched_held+0x108/0x120 [ 31.750095] ? kmem_cache_alloc_trace+0x616/0x780 [ 31.754954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 31.760486] ? _copy_from_user+0xdf/0x150 [ 31.764622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 31.770146] ? copy_mount_options+0x285/0x380 [ 31.774640] ksys_mount+0x12d/0x140 [ 31.778267] __x64_sys_mount+0xbe/0x150 [ 31.782226] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 31.787242] do_syscall_64+0x1b9/0x820 [ 31.791115] ? syscall_return_slowpath+0x5e0/0x5e0 [ 31.796029] ? syscall_return_slowpath+0x31d/0x5e0 [ 31.800963] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 31.806310] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 31.811134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 31.816307] RIP: 0033:0x4401a9 [ 31.819473] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 31.838600] RSP: 002b:00007fff3e60d4e8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 31.846302] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004401a9 [ 31.853561] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 31.860816] RBP: 0030656c69662f2e R08: 00000000200002c0 R09: 0000000000000001 [ 31.868072] R10: 0000000000000000 R11: 0000000000000206 R12: 64663d736e617274 [ 31.875351] R13: 0000040000000002 R14: 0000000000000000 R15: 0000000000000000 [ 31.883114] Dumping ftrace buffer: [ 31.886639] (ftrace buffer empty) [ 31.890352] Kernel Offset: disabled [ 31.893980] Rebooting in 86400 seconds..