[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 15.913828] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 16.592988] random: sshd: uninitialized urandom read (32 bytes read) [ 16.813632] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 17.521459] random: sshd: uninitialized urandom read (32 bytes read) [ 17.658505] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.38' (ECDSA) to the list of known hosts. [ 23.101574] random: sshd: uninitialized urandom read (32 bytes read) executing program executing program executing program executing program executing program [ 23.183473] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 23.215948] ================================================================== [ 23.223439] BUG: KASAN: slab-out-of-bounds in pdu_read+0x90/0xd0 [ 23.229563] Read of size 29264 at addr ffff8801ac5406ed by task syz-executor935/4463 [ 23.237426] [ 23.239037] CPU: 1 PID: 4463 Comm: syz-executor935 Not tainted 4.18.0-rc3-next-20180709+ #2 [ 23.247500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 23.256828] Call Trace: [ 23.259402] dump_stack+0x1c9/0x2b4 [ 23.263016] ? dump_stack_print_info.cold.2+0x52/0x52 [ 23.268200] ? printk+0xa7/0xcf [ 23.271463] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 23.276202] ? pdu_read+0x90/0xd0 [ 23.279639] print_address_description+0x6c/0x20b [ 23.284460] ? pdu_read+0x90/0xd0 [ 23.287903] kasan_report.cold.7+0x242/0x30d [ 23.292309] check_memory_region+0x13e/0x1b0 [ 23.296702] memcpy+0x23/0x50 [ 23.299787] pdu_read+0x90/0xd0 [ 23.303044] p9pdu_readf+0x579/0x2170 [ 23.306823] ? p9pdu_writef+0xe0/0xe0 [ 23.310604] ? ksys_dup3+0x690/0x690 [ 23.314301] ? do_raw_spin_lock+0xc1/0x200 [ 23.318517] ? kasan_kmalloc+0xc4/0xe0 [ 23.322386] ? kasan_unpoison_shadow+0x35/0x50 [ 23.326952] ? p9_fd_show_options+0x1c0/0x1c0 [ 23.331428] ? __raw_spin_lock_init+0x2d/0x100 [ 23.335993] p9_client_create+0xde0/0x16c9 [ 23.340215] ? p9_client_read+0xc60/0xc60 [ 23.344344] ? kasan_check_read+0x11/0x20 [ 23.348474] ? lock_acquire+0x1e4/0x540 [ 23.352434] ? fs_reclaim_acquire+0x20/0x20 [ 23.356744] ? lock_release+0xa30/0xa30 [ 23.360704] ? __lockdep_init_map+0x105/0x590 [ 23.365198] ? kasan_check_write+0x14/0x20 [ 23.369418] ? __init_rwsem+0x1cc/0x2a0 [ 23.373379] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 23.378376] ? __kmalloc_track_caller+0x311/0x760 [ 23.383206] ? save_stack+0xa9/0xd0 [ 23.386814] ? save_stack+0x43/0xd0 [ 23.390425] ? kasan_kmalloc+0xc4/0xe0 [ 23.394300] ? kmem_cache_alloc_trace+0x152/0x780 [ 23.399153] ? memcpy+0x45/0x50 [ 23.402422] v9fs_session_init+0x21a/0x1a80 [ 23.406735] ? rcu_note_context_switch+0x730/0x730 [ 23.411643] ? do_mount+0x69e/0x1fb0 [ 23.415341] ? lock_acquire+0x1e4/0x540 [ 23.419298] ? v9fs_show_options+0x7e0/0x7e0 [ 23.423692] ? lock_release+0xa30/0xa30 [ 23.427648] ? check_same_owner+0x340/0x340 [ 23.431957] ? kasan_unpoison_shadow+0x35/0x50 [ 23.436527] ? kasan_kmalloc+0xc4/0xe0 [ 23.440394] ? kmem_cache_alloc_trace+0x318/0x780 [ 23.445219] ? kasan_unpoison_shadow+0x35/0x50 [ 23.449791] ? kasan_kmalloc+0xc4/0xe0 [ 23.453678] v9fs_mount+0x7c/0x900 [ 23.457201] ? v9fs_drop_inode+0x150/0x150 [ 23.461423] legacy_get_tree+0x118/0x440 [ 23.465469] vfs_get_tree+0x1cb/0x5c0 [ 23.469260] do_mount+0x6c1/0x1fb0 [ 23.472780] ? kasan_check_write+0x14/0x20 [ 23.476996] ? copy_mount_string+0x40/0x40 [ 23.481216] ? kasan_kmalloc+0xc4/0xe0 [ 23.485084] ? kmem_cache_alloc_trace+0x318/0x780 [ 23.489907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 23.495425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 23.500954] ? copy_mount_options+0x285/0x380 [ 23.505443] ksys_mount+0x12d/0x140 [ 23.509052] __x64_sys_mount+0xbe/0x150 [ 23.513012] do_syscall_64+0x1b9/0x820 [ 23.516882] ? syscall_return_slowpath+0x5e0/0x5e0 [ 23.521791] ? syscall_return_slowpath+0x31d/0x5e0 [ 23.526702] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 23.531697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 23.537218] ? prepare_exit_to_usermode+0x291/0x3b0 [ 23.542213] ? perf_trace_sys_enter+0xb10/0xb10 [ 23.546862] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 23.551691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 23.556861] RIP: 0033:0x440959 [ 23.560028] Code: e8 8c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 23.579175] RSP: 002b:00007ffec11dec08 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 23.586864] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440959 [ 23.594114] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 23.601361] RBP: 0000000000000000 R08: 0000000020000180 R09: 00000000004002c8 [ 23.608608] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000005aaa [ 23.615858] R13: 0000000000401eb0 R14: 0000000000000000 R15: 0000000000000000 [ 23.623108] [ 23.624714] Allocated by task 4463: [ 23.628327] save_stack+0x43/0xd0 [ 23.631761] kasan_kmalloc+0xc4/0xe0 [ 23.635451] __kmalloc+0x14e/0x760 [ 23.638972] p9_fcall_alloc+0x1e/0x90 [ 23.642760] p9_client_prepare_req.part.9+0x754/0xcd0 [ 23.647930] p9_client_rpc+0x1bd/0x1400 [ 23.651886] p9_client_create+0xd09/0x16c9 [ 23.656100] v9fs_session_init+0x21a/0x1a80 [ 23.660398] v9fs_mount+0x7c/0x900 [ 23.663923] legacy_get_tree+0x118/0x440 [ 23.667964] vfs_get_tree+0x1cb/0x5c0 [ 23.671749] do_mount+0x6c1/0x1fb0 [ 23.675267] ksys_mount+0x12d/0x140 [ 23.678874] __x64_sys_mount+0xbe/0x150 [ 23.682835] do_syscall_64+0x1b9/0x820 [ 23.686708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 23.691869] [ 23.693471] Freed by task 0: [ 23.696469] (stack is not available) [ 23.700157] [ 23.701771] The buggy address belongs to the object at ffff8801ac5406c0 [ 23.701771] which belongs to the cache kmalloc-16384 of size 16384 [ 23.714754] The buggy address is located 45 bytes inside of [ 23.714754] 16384-byte region [ffff8801ac5406c0, ffff8801ac5446c0) [ 23.726699] The buggy address belongs to the page: [ 23.731611] page:ffffea0006b15000 count:1 mapcount:0 mapping:ffff8801da802200 index:0x0 compound_mapcount: 0 [ 23.741566] flags: 0x2fffc0000008100(slab|head) [ 23.746226] raw: 02fffc0000008100 ffffea0006b17808 ffff8801da801c48 ffff8801da802200 [ 23.754098] raw: 0000000000000000 ffff8801ac5406c0 0000000100000001 0000000000000000 [ 23.762052] page dumped because: kasan: bad access detected [ 23.767739] [ 23.769344] Memory state around the buggy address: [ 23.774254] ffff8801ac542580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.781602] ffff8801ac542600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.788958] >ffff8801ac542680: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 23.796299] ^ [ 23.802779] ffff8801ac542700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.810128] ffff8801ac542780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.817477] ================================================================== [ 23.825009] Kernel panic - not syncing: panic_on_warn set ... [ 23.825009] [ 23.832381] CPU: 1 PID: 4463 Comm: syz-executor935 Tainted: G B 4.18.0-rc3-next-20180709+ #2 [ 23.842250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 23.851596] Call Trace: [ 23.854180] dump_stack+0x1c9/0x2b4 [ 23.857809] ? dump_stack_print_info.cold.2+0x52/0x52 [ 23.862992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 23.867760] panic+0x238/0x4e7 [ 23.870947] ? add_taint.cold.5+0x16/0x16 [ 23.875088] ? do_raw_spin_unlock+0xa7/0x2f0 [ 23.879486] ? pdu_read+0x90/0xd0 [ 23.882932] kasan_end_report+0x47/0x4f [ 23.886896] kasan_report.cold.7+0x76/0x30d [ 23.891216] check_memory_region+0x13e/0x1b0 [ 23.895633] memcpy+0x23/0x50 [ 23.898737] pdu_read+0x90/0xd0 [ 23.902006] p9pdu_readf+0x579/0x2170 [ 23.905806] ? p9pdu_writef+0xe0/0xe0 [ 23.909606] ? ksys_dup3+0x690/0x690 [ 23.913327] ? do_raw_spin_lock+0xc1/0x200 [ 23.917558] ? kasan_kmalloc+0xc4/0xe0 [ 23.921438] ? kasan_unpoison_shadow+0x35/0x50 [ 23.926014] ? p9_fd_show_options+0x1c0/0x1c0 [ 23.930530] ? __raw_spin_lock_init+0x2d/0x100 [ 23.935104] p9_client_create+0xde0/0x16c9 [ 23.939337] ? p9_client_read+0xc60/0xc60 [ 23.943481] ? kasan_check_read+0x11/0x20 [ 23.947644] ? lock_acquire+0x1e4/0x540 [ 23.951605] ? fs_reclaim_acquire+0x20/0x20 [ 23.955916] ? lock_release+0xa30/0xa30 [ 23.959881] ? __lockdep_init_map+0x105/0x590 [ 23.964374] ? kasan_check_write+0x14/0x20 [ 23.968599] ? __init_rwsem+0x1cc/0x2a0 [ 23.972563] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 23.977567] ? __kmalloc_track_caller+0x311/0x760 [ 23.982393] ? save_stack+0xa9/0xd0 [ 23.986001] ? save_stack+0x43/0xd0 [ 23.989618] ? kasan_kmalloc+0xc4/0xe0 [ 23.993484] ? kmem_cache_alloc_trace+0x152/0x780 [ 23.998308] ? memcpy+0x45/0x50 [ 24.001575] v9fs_session_init+0x21a/0x1a80 [ 24.005892] ? rcu_note_context_switch+0x730/0x730 [ 24.010808] ? do_mount+0x69e/0x1fb0 [ 24.014513] ? lock_acquire+0x1e4/0x540 [ 24.018469] ? v9fs_show_options+0x7e0/0x7e0 [ 24.022870] ? lock_release+0xa30/0xa30 [ 24.026828] ? check_same_owner+0x340/0x340 [ 24.031148] ? kasan_unpoison_shadow+0x35/0x50 [ 24.035713] ? kasan_kmalloc+0xc4/0xe0 [ 24.039594] ? kmem_cache_alloc_trace+0x318/0x780 [ 24.044426] ? kasan_unpoison_shadow+0x35/0x50 [ 24.048989] ? kasan_kmalloc+0xc4/0xe0 [ 24.052862] v9fs_mount+0x7c/0x900 [ 24.056383] ? v9fs_drop_inode+0x150/0x150 [ 24.060599] legacy_get_tree+0x118/0x440 [ 24.064648] vfs_get_tree+0x1cb/0x5c0 [ 24.068430] do_mount+0x6c1/0x1fb0 [ 24.071951] ? kasan_check_write+0x14/0x20 [ 24.076166] ? copy_mount_string+0x40/0x40 [ 24.080403] ? kasan_kmalloc+0xc4/0xe0 [ 24.084290] ? kmem_cache_alloc_trace+0x318/0x780 [ 24.089117] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 24.094645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 24.100166] ? copy_mount_options+0x285/0x380 [ 24.104652] ksys_mount+0x12d/0x140 [ 24.108262] __x64_sys_mount+0xbe/0x150 [ 24.112221] do_syscall_64+0x1b9/0x820 [ 24.116100] ? syscall_return_slowpath+0x5e0/0x5e0 [ 24.121013] ? syscall_return_slowpath+0x31d/0x5e0 [ 24.125936] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 24.130933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 24.136453] ? prepare_exit_to_usermode+0x291/0x3b0 [ 24.141458] ? perf_trace_sys_enter+0xb10/0xb10 [ 24.146120] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 24.150955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 24.156126] RIP: 0033:0x440959 [ 24.159291] Code: e8 8c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 24.178417] RSP: 002b:00007ffec11dec08 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 24.186136] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440959 [ 24.193389] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 24.200658] RBP: 0000000000000000 R08: 0000000020000180 R09: 00000000004002c8 [ 24.207908] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000005aaa [ 24.215159] R13: 0000000000401eb0 R14: 0000000000000000 R15: 0000000000000000 [ 24.222938] Dumping ftrace buffer: [ 24.226467] (ftrace buffer empty) [ 24.230154] Kernel Offset: disabled [ 24.233760] Rebooting in 86400 seconds..