[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 14.921051] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 17.283779] random: sshd: uninitialized urandom read (32 bytes read) [ 17.598527] random: sshd: uninitialized urandom read (32 bytes read) [ 18.292477] random: sshd: uninitialized urandom read (32 bytes read) [ 29.401666] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.35' (ECDSA) to the list of known hosts. [ 34.793168] random: sshd: uninitialized urandom read (32 bytes read) executing program [ 34.872026] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 34.890518] ================================================================== [ 34.897885] BUG: KASAN: slab-out-of-bounds in pdu_read+0x90/0xd0 [ 34.904010] Read of size 25196 at addr ffff8801ad1f03ad by task syz-executor492/4459 [ 34.911862] [ 34.913476] CPU: 1 PID: 4459 Comm: syz-executor492 Not tainted 4.18.0-rc3-next-20180709+ #2 [ 34.921939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.931267] Call Trace: [ 34.933846] dump_stack+0x1c9/0x2b4 [ 34.937453] ? dump_stack_print_info.cold.2+0x52/0x52 [ 34.942620] ? printk+0xa7/0xcf [ 34.945902] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 34.950633] ? pdu_read+0x90/0xd0 [ 34.954065] print_address_description+0x6c/0x20b [ 34.958883] ? pdu_read+0x90/0xd0 [ 34.962314] kasan_report.cold.7+0x242/0x30d [ 34.966715] check_memory_region+0x13e/0x1b0 [ 34.971102] memcpy+0x23/0x50 [ 34.974188] pdu_read+0x90/0xd0 [ 34.977452] p9pdu_readf+0x579/0x2170 [ 34.981237] ? p9pdu_writef+0xe0/0xe0 [ 34.985016] ? ksys_dup3+0x690/0x690 [ 34.988707] ? check_same_owner+0x340/0x340 [ 34.993006] ? p9_fd_poll+0x2b0/0x2b0 [ 34.996800] ? kasan_kmalloc+0xc4/0xe0 [ 35.000669] ? kasan_unpoison_shadow+0x35/0x50 [ 35.005233] ? p9_fd_show_options+0x1c0/0x1c0 [ 35.009713] ? __raw_spin_lock_init+0x2d/0x100 [ 35.014287] p9_client_create+0xde0/0x16c9 [ 35.018504] ? p9_client_read+0xc60/0xc60 [ 35.022633] ? lock_acquire+0x1e4/0x540 [ 35.026586] ? lock_acquire+0x1e4/0x540 [ 35.030540] ? fs_reclaim_acquire+0x20/0x20 [ 35.034842] ? lock_release+0xa30/0xa30 [ 35.038795] ? __lockdep_init_map+0x105/0x590 [ 35.043272] ? kasan_check_write+0x14/0x20 [ 35.047484] ? __init_rwsem+0x1cc/0x2a0 [ 35.051437] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 35.056436] ? __kmalloc_track_caller+0x311/0x760 [ 35.061257] ? save_stack+0xa9/0xd0 [ 35.064863] ? save_stack+0x43/0xd0 [ 35.068472] ? kasan_kmalloc+0xc4/0xe0 [ 35.072336] ? kmem_cache_alloc_trace+0x152/0x780 [ 35.077164] ? memcpy+0x45/0x50 [ 35.080427] v9fs_session_init+0x21a/0x1a80 [ 35.084726] ? rcu_note_context_switch+0x730/0x730 [ 35.089651] ? do_mount+0x69e/0x1fb0 [ 35.093347] ? lock_acquire+0x1e4/0x540 [ 35.097300] ? v9fs_show_options+0x7e0/0x7e0 [ 35.101685] ? lock_release+0xa30/0xa30 [ 35.105639] ? check_same_owner+0x340/0x340 [ 35.109939] ? lock_downgrade+0x8f0/0x8f0 [ 35.114067] ? kasan_unpoison_shadow+0x35/0x50 [ 35.118629] ? kasan_kmalloc+0xc4/0xe0 [ 35.122494] ? kmem_cache_alloc_trace+0x318/0x780 [ 35.127314] ? kasan_unpoison_shadow+0x35/0x50 [ 35.131876] ? kasan_kmalloc+0xc4/0xe0 [ 35.135742] v9fs_mount+0x7c/0x900 [ 35.139261] ? v9fs_drop_inode+0x150/0x150 [ 35.143476] legacy_get_tree+0x118/0x440 [ 35.147517] vfs_get_tree+0x1cb/0x5c0 [ 35.151298] do_mount+0x6c1/0x1fb0 [ 35.154815] ? kasan_check_read+0x11/0x20 [ 35.158940] ? do_raw_spin_unlock+0xa7/0x2f0 [ 35.163333] ? copy_mount_string+0x40/0x40 [ 35.167545] ? kasan_kmalloc+0xc4/0xe0 [ 35.171412] ? kmem_cache_alloc_trace+0x318/0x780 [ 35.176238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 35.181770] ? copy_mount_options+0x285/0x380 [ 35.186245] ksys_mount+0x12d/0x140 [ 35.189853] __x64_sys_mount+0xbe/0x150 [ 35.193811] do_syscall_64+0x1b9/0x820 [ 35.197678] ? syscall_return_slowpath+0x5e0/0x5e0 [ 35.202584] ? syscall_return_slowpath+0x31d/0x5e0 [ 35.207494] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 35.212493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 35.218011] ? prepare_exit_to_usermode+0x291/0x3b0 [ 35.223010] ? perf_trace_sys_enter+0xb10/0xb10 [ 35.227656] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 35.232479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.237645] RIP: 0033:0x440209 [ 35.240807] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 35.259936] RSP: 002b:00007ffea3e12918 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 35.267634] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000440209 [ 35.274884] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 35.282142] RBP: 0030656c69662f2e R08: 0000000020000180 R09: 00000000004002c8 [ 35.289399] R10: 0000000000000000 R11: 0000000000000206 R12: 64663d736e617274 [ 35.296663] R13: 0000000000401b20 R14: 0000000000000000 R15: 0000000000000000 [ 35.303915] [ 35.305521] Allocated by task 4459: [ 35.309139] save_stack+0x43/0xd0 [ 35.312570] kasan_kmalloc+0xc4/0xe0 [ 35.316269] __kmalloc+0x14e/0x760 [ 35.319785] p9_fcall_alloc+0x1e/0x90 [ 35.323561] p9_client_prepare_req.part.9+0x754/0xcd0 [ 35.328728] p9_client_rpc+0x1bd/0x1400 [ 35.332689] p9_client_create+0xd09/0x16c9 [ 35.336912] v9fs_session_init+0x21a/0x1a80 [ 35.341211] v9fs_mount+0x7c/0x900 [ 35.344728] legacy_get_tree+0x118/0x440 [ 35.348764] vfs_get_tree+0x1cb/0x5c0 [ 35.352540] do_mount+0x6c1/0x1fb0 [ 35.356057] ksys_mount+0x12d/0x140 [ 35.359661] __x64_sys_mount+0xbe/0x150 [ 35.363612] do_syscall_64+0x1b9/0x820 [ 35.367478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.372637] [ 35.374238] Freed by task 0: [ 35.377229] (stack is not available) [ 35.380915] [ 35.382518] The buggy address belongs to the object at ffff8801ad1f0380 [ 35.382518] which belongs to the cache kmalloc-16384 of size 16384 [ 35.395497] The buggy address is located 45 bytes inside of [ 35.395497] 16384-byte region [ffff8801ad1f0380, ffff8801ad1f4380) [ 35.407432] The buggy address belongs to the page: [ 35.412338] page:ffffea0006b47c00 count:1 mapcount:0 mapping:ffff8801da802200 index:0x0 compound_mapcount: 0 [ 35.422283] flags: 0x2fffc0000008100(slab|head) [ 35.426931] raw: 02fffc0000008100 ffffea0006b1e808 ffff8801da801c48 ffff8801da802200 [ 35.434791] raw: 0000000000000000 ffff8801ad1f0380 0000000100000001 0000000000000000 [ 35.442655] page dumped because: kasan: bad access detected [ 35.448337] [ 35.449940] Memory state around the buggy address: [ 35.454844] ffff8801ad1f2280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.462181] ffff8801ad1f2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.469529] >ffff8801ad1f2380: 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc [ 35.476871] ^ [ 35.481264] ffff8801ad1f2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.488609] ffff8801ad1f2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.495942] ================================================================== [ 35.503538] Kernel panic - not syncing: panic_on_warn set ... [ 35.503538] [ 35.510893] CPU: 1 PID: 4459 Comm: syz-executor492 Tainted: G B 4.18.0-rc3-next-20180709+ #2 [ 35.520746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.530080] Call Trace: [ 35.533796] dump_stack+0x1c9/0x2b4 [ 35.537401] ? dump_stack_print_info.cold.2+0x52/0x52 [ 35.542570] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 35.547306] panic+0x238/0x4e7 [ 35.550478] ? add_taint.cold.5+0x16/0x16 [ 35.554605] ? do_raw_spin_unlock+0xa7/0x2f0 [ 35.558992] ? pdu_read+0x90/0xd0 [ 35.562424] kasan_end_report+0x47/0x4f [ 35.566375] kasan_report.cold.7+0x76/0x30d [ 35.570678] check_memory_region+0x13e/0x1b0 [ 35.575069] memcpy+0x23/0x50 [ 35.578154] pdu_read+0x90/0xd0 [ 35.581410] p9pdu_readf+0x579/0x2170 [ 35.585193] ? p9pdu_writef+0xe0/0xe0 [ 35.588975] ? ksys_dup3+0x690/0x690 [ 35.592667] ? check_same_owner+0x340/0x340 [ 35.596968] ? p9_fd_poll+0x2b0/0x2b0 [ 35.600751] ? kasan_kmalloc+0xc4/0xe0 [ 35.604619] ? kasan_unpoison_shadow+0x35/0x50 [ 35.609182] ? p9_fd_show_options+0x1c0/0x1c0 [ 35.613668] ? __raw_spin_lock_init+0x2d/0x100 [ 35.618238] p9_client_create+0xde0/0x16c9 [ 35.622454] ? p9_client_read+0xc60/0xc60 [ 35.626584] ? lock_acquire+0x1e4/0x540 [ 35.630537] ? lock_acquire+0x1e4/0x540 [ 35.634492] ? fs_reclaim_acquire+0x20/0x20 [ 35.638795] ? lock_release+0xa30/0xa30 [ 35.642761] ? __lockdep_init_map+0x105/0x590 [ 35.647239] ? kasan_check_write+0x14/0x20 [ 35.651452] ? __init_rwsem+0x1cc/0x2a0 [ 35.655404] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 35.660399] ? __kmalloc_track_caller+0x311/0x760 [ 35.665221] ? save_stack+0xa9/0xd0 [ 35.668835] ? save_stack+0x43/0xd0 [ 35.672447] ? kasan_kmalloc+0xc4/0xe0 [ 35.676312] ? kmem_cache_alloc_trace+0x152/0x780 [ 35.681133] ? memcpy+0x45/0x50 [ 35.684398] v9fs_session_init+0x21a/0x1a80 [ 35.688700] ? rcu_note_context_switch+0x730/0x730 [ 35.693610] ? do_mount+0x69e/0x1fb0 [ 35.697307] ? lock_acquire+0x1e4/0x540 [ 35.701265] ? v9fs_show_options+0x7e0/0x7e0 [ 35.705652] ? lock_release+0xa30/0xa30 [ 35.709605] ? check_same_owner+0x340/0x340 [ 35.713904] ? lock_downgrade+0x8f0/0x8f0 [ 35.718055] ? kasan_unpoison_shadow+0x35/0x50 [ 35.722617] ? kasan_kmalloc+0xc4/0xe0 [ 35.726484] ? kmem_cache_alloc_trace+0x318/0x780 [ 35.731306] ? kasan_unpoison_shadow+0x35/0x50 [ 35.735866] ? kasan_kmalloc+0xc4/0xe0 [ 35.739734] v9fs_mount+0x7c/0x900 [ 35.743254] ? v9fs_drop_inode+0x150/0x150 [ 35.747554] legacy_get_tree+0x118/0x440 [ 35.751618] vfs_get_tree+0x1cb/0x5c0 [ 35.755399] do_mount+0x6c1/0x1fb0 [ 35.758918] ? kasan_check_read+0x11/0x20 [ 35.763046] ? do_raw_spin_unlock+0xa7/0x2f0 [ 35.767432] ? copy_mount_string+0x40/0x40 [ 35.771645] ? kasan_kmalloc+0xc4/0xe0 [ 35.775512] ? kmem_cache_alloc_trace+0x318/0x780 [ 35.780337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 35.785865] ? copy_mount_options+0x285/0x380 [ 35.790342] ksys_mount+0x12d/0x140 [ 35.793952] __x64_sys_mount+0xbe/0x150 [ 35.797906] do_syscall_64+0x1b9/0x820 [ 35.801772] ? syscall_return_slowpath+0x5e0/0x5e0 [ 35.806680] ? syscall_return_slowpath+0x31d/0x5e0 [ 35.811588] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 35.816587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 35.822104] ? prepare_exit_to_usermode+0x291/0x3b0 [ 35.827104] ? perf_trace_sys_enter+0xb10/0xb10 [ 35.831754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 35.836580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.841748] RIP: 0033:0x440209 [ 35.844914] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 35.864049] RSP: 002b:00007ffea3e12918 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 35.871740] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000440209 [ 35.878996] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 35.886251] RBP: 0030656c69662f2e R08: 0000000020000180 R09: 00000000004002c8 [ 35.893508] R10: 0000000000000000 R11: 0000000000000206 R12: 64663d736e617274 [ 35.900760] R13: 0000000000401b20 R14: 0000000000000000 R15: 0000000000000000 [ 35.908426] Dumping ftrace buffer: [ 35.911940] (ftrace buffer empty) [ 35.915627] Kernel Offset: disabled [ 35.919231] Rebooting in 86400 seconds..