[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 16.451711] random: sshd: uninitialized urandom read (32 bytes read, 33 bits of entropy available) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 20.464567] random: sshd: uninitialized urandom read (32 bytes read, 38 bits of entropy available) [ 20.781201] random: sshd: uninitialized urandom read (32 bytes read, 38 bits of entropy available) [ 21.520710] random: sshd: uninitialized urandom read (32 bytes read, 85 bits of entropy available) [ 21.690694] random: sshd: uninitialized urandom read (32 bytes read, 90 bits of entropy available) Warning: Permanently added 'ci-android-44-kasan-gce-386-0,10.128.0.14' (ECDSA) to the list of known hosts. [ 27.079515] random: sshd: uninitialized urandom read (32 bytes read, 95 bits of entropy available) executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 27.258999] ================================================================== [ 27.260623] kasan: CONFIG_KASAN_INLINE enabled [ 27.260630] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 27.260634] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 27.260638] Dumping ftrace buffer: [ 27.260641] (ftrace buffer empty) [ 27.260644] Modules linked in: [ 27.260651] CPU: 1 PID: 3377 Comm: syzkaller685434 Not tainted 4.4.107-g610c835 #4 [ 27.260654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 27.260658] task: ffff8800b823c740 task.stack: ffff8801d94c8000 [ 27.260671] RIP: 0010:[] [] __lock_acquire+0x61f/0x4b50 [ 27.260675] RSP: 0018:ffff8801d94cf880 EFLAGS: 00010086 [ 27.260678] RAX: dffffc0000000000 RBX: dead4ead00000000 RCX: ffffffff81237ade [ 27.260682] RDX: 1ffff1003a313890 RSI: 0000000000000008 RDI: ffff8801d189c480 [ 27.260685] RBP: ffff8801d94cfa20 R08: 0000000000000001 R09: 0000000000000001 [ 27.260688] R10: 0000000000000001 R11: 1ffff1003b299f22 R12: 0000000000000000 [ 27.260692] R13: ffff8800b823c740 R14: ffff8801d189c478 R15: 0000000000000000 [ 27.260697] FS: 0000000000000000(0000) GS:ffff8801db300000(0063) knlGS:00000000f47d3b40 [ 27.260701] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 27.260704] CR2: 00000000206f6000 CR3: 00000001d0a15000 CR4: 00000000001406e0 [ 27.260713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 27.260717] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 27.260718] Stack: [ 27.260725] ffff8801d0ee0818 ffff8800b4b59d90 ffff8801d94cfa00 ffffffff8149e232 [ 27.260733] ffff8801d94cf8b0 ffffffff00000000 ffff8800b823c740 ffff8800b823cfb0 [ 27.260739] 0000000000000288 ffff8800b823c740 0000000000000002 0000000000000002 [ 27.260741] Call Trace: [ 27.260751] [] ? handle_mm_fault+0x3f2/0x3190 [ 27.260758] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 27.260764] [] ? vmacache_update+0xfe/0x130 [ 27.260772] [] ? __do_page_fault+0x380/0xa00 [ 27.260778] [] lock_acquire+0x15e/0x460 [ 27.260787] [] ? sg_remove_request+0x69/0x110 [ 27.260794] [] _raw_write_lock_irqsave+0x4e/0x70 [ 27.260800] [] ? sg_remove_request+0x69/0x110 [ 27.260806] [] sg_remove_request+0x69/0x110 [ 27.260813] [] sg_finish_rem_req+0x295/0x340 [ 27.260819] [] sg_read+0xa21/0x1490 [ 27.260825] [] ? sg_proc_seq_show_debug+0xd30/0xd30 [ 27.260832] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 27.260838] [] ? sg_proc_seq_show_debug+0xd30/0xd30 [ 27.260845] [] __vfs_read+0x103/0x440 [ 27.260851] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 27.260857] [] ? vfs_iter_write+0x2d0/0x2d0 [ 27.260863] [] ? fsnotify+0x5ad/0xee0 [ 27.260868] [] ? fsnotify+0xee0/0xee0 [ 27.260877] [] ? avc_policy_seqno+0x9/0x20 [ 27.260883] [] ? selinux_file_permission+0x348/0x460 [ 27.260890] [] ? security_file_permission+0x89/0x1e0 [ 27.260896] [] ? rw_verify_area+0x100/0x2f0 [ 27.260902] [] vfs_read+0x123/0x3a0 [ 27.260909] [] SyS_read+0xd9/0x1b0 [ 27.260915] [] ? do_sendfile+0xd30/0xd30 [ 27.260922] [] ? do_fast_syscall_32+0xd7/0x890 [ 27.260928] [] ? do_sendfile+0xd30/0xd30 [ 27.260933] [] do_fast_syscall_32+0x314/0x890 [ 27.260940] [] sysenter_flags_fixed+0xd/0x17 [ 27.261026] Code: 00 fc ff df 44 89 e3 49 8d 7c de 08 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b6 37 00 00 49 8b 5c de 08 48 85 db 0f 84 28 fb ff ff ff 83 98 01 00 00 49 8d 85 68 08 00 00 48 89 c2 48 89 44 24 [ 27.261032] RIP [] __lock_acquire+0x61f/0x4b50 [ 27.261034] RSP [ 27.261040] ---[ end trace ba8c3c110e6701ba ]--- [ 27.261043] Kernel panic - not syncing: Fatal exception [ 27.650745] BUG: KASAN: slab-out-of-bounds in __lock_acquire+0x387e/0x4b50 [ 27.657721] Read of size 8 at addr ffff8801d189c378 by task syzkaller685434/3379 [ 27.665214] [ 27.666811] CPU: 0 PID: 3379 Comm: syzkaller685434 Tainted: G D 4.4.107-g610c835 #4 [ 27.675703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 27.685030] 0000000000000000 5f95027bfc99f209 ffff8801cd1bf7e0 ffffffff81d0457d [ 27.692973] ffffea0007462700 ffff8801d189c378 0000000000000000 ffff8801d189c378 [ 27.700915] 0000000000000000 ffff8801cd1bf818 ffffffff814fbb23 ffff8801d189c378 [ 27.708870] Call Trace: [ 27.711426] [] dump_stack+0xc1/0x124 [ 27.716754] [] print_address_description+0x73/0x260 [ 27.723382] [] kasan_report+0x285/0x370 [ 27.728973] [] ? __lock_acquire+0x387e/0x4b50 [ 27.735079] [] __asan_report_load8_noabort+0x14/0x20 [ 27.741793] [] __lock_acquire+0x387e/0x4b50 [ 27.747728] [] ? handle_mm_fault+0x3f2/0x3190 [ 27.753835] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 27.760821] [] ? vmacache_update+0xfe/0x130 [ 27.766756] [] ? __do_page_fault+0x380/0xa00 [ 27.772776] [] lock_acquire+0x15e/0x460 [ 27.778376] [] ? sg_remove_request+0x69/0x110 [ 27.784489] [] _raw_write_lock_irqsave+0x4e/0x70 [ 27.790856] [] ? sg_remove_request+0x69/0x110 [ 27.796962] [] sg_remove_request+0x69/0x110 [ 27.802894] [] sg_finish_rem_req+0x295/0x340 [ 27.808914] [] sg_read+0xa21/0x1490 [ 27.814155] [] ? sg_proc_seq_show_debug+0xd30/0xd30 [ 27.820782] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 27.827756] [] ? sg_proc_seq_show_debug+0xd30/0xd30 [ 27.834387] [] __vfs_read+0x103/0x440 [ 27.839799] [] ? vfs_iter_write+0x2d0/0x2d0 [ 27.845733] [] ? fsnotify+0x5ad/0xee0 [ 27.851144] [] ? fsnotify+0xee0/0xee0 [ 27.856564] [] ? avc_policy_seqno+0x9/0x20 [ 27.862414] [] ? selinux_file_permission+0x348/0x460 [ 27.869129] [] ? security_file_permission+0x89/0x1e0 [ 27.875847] [] ? rw_verify_area+0x100/0x2f0 [ 27.881779] [] vfs_read+0x123/0x3a0 [ 27.887019] [] SyS_read+0xd9/0x1b0 [ 27.892170] [] ? do_sendfile+0xd30/0xd30 [ 27.897846] [] ? do_fast_syscall_32+0xd7/0x890 [ 27.904039] [] ? do_sendfile+0xd30/0xd30 [ 27.909712] [] do_fast_syscall_32+0x314/0x890 [ 27.915820] [] sysenter_flags_fixed+0xd/0x17 [ 27.921838] [ 27.923430] Allocated by task 3384: [ 27.927017] [] save_stack_trace+0x26/0x50 [ 27.932895] [] save_stack+0x43/0xd0 [ 27.938247] [] kasan_kmalloc+0xad/0xe0 [ 27.943860] [] kasan_slab_alloc+0x12/0x20 [ 27.949740] [] kmem_cache_alloc+0xba/0x290 [ 27.955698] [] fasync_helper+0x37/0xb0 [ 27.961311] [] sg_fasync+0x86/0xb0 [ 27.966576] [] SyS_fcntl+0x64f/0xc40 [ 27.972012] [] compat_SyS_fcntl64+0xce/0x4f0 [ 27.978146] [] do_fast_syscall_32+0x314/0x890 [ 27.984373] [] sysenter_flags_fixed+0xd/0x17 [ 27.990516] [ 27.992108] Freed by task 0: [ 27.995085] (stack is not available) [ 27.998758] [ 28.000351] The buggy address belongs to the object at ffff8801d189c300 [ 28.000351] which belongs to the cache fasync_cache of size 96 [ 28.012968] The buggy address is located 24 bytes to the right of [ 28.012968] 96-byte region [ffff8801d189c300, ffff8801d189c360) [ 28.025150] The buggy address belongs to the page: [ 28.327280] Shutting down cpus with NMI [ 28.331949] Dumping ftrace buffer: [ 28.335457] (ftrace buffer empty) [ 28.339132] Kernel Offset: disabled [ 28.342723] Rebooting in 86400 seconds..