restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.269919] random: sshd: uninitialized urandom read (32 bytes read) [ 33.571668] audit: type=1400 audit(1578400534.866:35): avc: denied { map } for pid=7179 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 33.621169] random: sshd: uninitialized urandom read (32 bytes read) [ 34.342179] random: sshd: uninitialized urandom read (32 bytes read) [ 34.527628] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.48' (ECDSA) to the list of known hosts. [ 40.132828] random: sshd: uninitialized urandom read (32 bytes read) executing program [ 40.251800] audit: type=1400 audit(1578400541.546:36): avc: denied { map } for pid=7192 comm="syz-executor822" path="/root/syz-executor822599282" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 40.349995] ================================================================== [ 40.350020] BUG: KASAN: slab-out-of-bounds in soft_cursor+0x43d/0xa50 [ 40.350025] Read of size 16 at addr ffff8880948f1440 by task syz-executor822/7192 [ 40.350026] [ 40.350032] CPU: 1 PID: 7192 Comm: syz-executor822 Not tainted 4.14.162-syzkaller #0 [ 40.350036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 40.350038] Call Trace: [ 40.350045] dump_stack+0x142/0x197 [ 40.350050] ? soft_cursor+0x43d/0xa50 [ 40.350057] print_address_description.cold+0x7c/0x1dc [ 40.350062] ? soft_cursor+0x43d/0xa50 [ 40.350066] kasan_report.cold+0xa9/0x2af [ 40.350072] check_memory_region+0x123/0x190 [ 40.350077] memcpy+0x24/0x50 [ 40.350081] soft_cursor+0x43d/0xa50 [ 40.350085] ? kfree+0x183/0x270 [ 40.350093] bit_cursor+0x11be/0x1830 [ 40.350101] ? bit_clear+0x4a0/0x4a0 [ 40.350111] ? fb_get_color_depth+0x5f/0x70 [ 40.350117] ? get_color+0x1bf/0x3b0 [ 40.350123] fbcon_cursor+0x4e3/0x6f0 [ 40.350126] ? bit_clear+0x4a0/0x4a0 [ 40.350133] hide_cursor+0x9d/0x2e0 [ 40.350139] ? lock_downgrade+0x740/0x740 [ 40.350145] redraw_screen+0x2a5/0x7c0 [ 40.350151] ? con_flush_chars+0x90/0x90 [ 40.350155] ? mutex_unlock+0xd/0x10 [ 40.350160] ? tty_do_resize+0x43/0x160 [ 40.350166] vc_do_resize+0xc8a/0xec0 [ 40.350178] ? vt_console_print+0xf70/0xf70 [ 40.350183] ? lock_acquire+0x16f/0x430 [ 40.350188] ? vt_ioctl+0xfa9/0x2170 [ 40.350194] vc_resize+0x4d/0x60 [ 40.350199] vt_ioctl+0x10a8/0x2170 [ 40.350206] ? complete_change_console+0x360/0x360 [ 40.350212] ? avc_ss_reset+0x110/0x110 [ 40.350216] ? kasan_slab_free+0x75/0xc0 [ 40.350223] ? SyS_open+0x2d/0x40 [ 40.350229] ? do_syscall_64+0x1e8/0x640 [ 40.350234] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 40.350239] ? find_held_lock+0x35/0x130 [ 40.350245] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 40.350250] ? tty_jobctrl_ioctl+0x44/0xc10 [ 40.350254] ? complete_change_console+0x360/0x360 [ 40.350260] tty_ioctl+0x841/0x1320 [ 40.350265] ? tty_vhangup+0x30/0x30 [ 40.350275] ? __might_sleep+0x93/0xb0 [ 40.350283] ? tty_vhangup+0x30/0x30 [ 40.350289] do_vfs_ioctl+0x7ae/0x1060 [ 40.350295] ? selinux_file_mprotect+0x5d0/0x5d0 [ 40.350301] ? ioctl_preallocate+0x1c0/0x1c0 [ 40.350305] ? putname+0xe0/0x120 [ 40.350310] ? do_sys_open+0x221/0x430 [ 40.350319] ? security_file_ioctl+0x7d/0xb0 [ 40.350323] ? security_file_ioctl+0x89/0xb0 [ 40.350329] SyS_ioctl+0x8f/0xc0 [ 40.350333] ? do_vfs_ioctl+0x1060/0x1060 [ 40.350339] do_syscall_64+0x1e8/0x640 [ 40.350344] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 40.350351] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 40.350355] RIP: 0033:0x440249 [ 40.350358] RSP: 002b:00007fff2f269cb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 40.350364] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 0000000000440249 [ 40.350367] RDX: 0000000020000000 RSI: 000000000000560a RDI: 0000000000000004 [ 40.350370] RBP: 00000000006cb018 R08: 000000000000000d R09: 00000000004002c8 [ 40.350372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000401b30 [ 40.350375] R13: 0000000000401bc0 R14: 0000000000000000 R15: 0000000000000000 [ 40.350382] [ 40.350385] Allocated by task 7192: [ 40.350391] save_stack_trace+0x16/0x20 [ 40.350394] save_stack+0x45/0xd0 [ 40.350397] kasan_kmalloc+0xce/0xf0 [ 40.350400] __kmalloc+0x15d/0x7a0 [ 40.350404] fbcon_set_font+0x2f8/0x7b0 [ 40.350408] con_font_op+0xc0f/0x1060 [ 40.350411] vt_ioctl+0x2d3/0x2170 [ 40.350415] tty_ioctl+0x841/0x1320 [ 40.350419] do_vfs_ioctl+0x7ae/0x1060 [ 40.350422] SyS_ioctl+0x8f/0xc0 [ 40.350426] do_syscall_64+0x1e8/0x640 [ 40.350430] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 40.350431] [ 40.350433] Freed by task 0: [ 40.350434] (stack is not available) [ 40.350436] [ 40.350439] The buggy address belongs to the object at ffff8880948f0d00 [ 40.350439] which belongs to the cache kmalloc-2048 of size 2048 [ 40.350443] The buggy address is located 1856 bytes inside of [ 40.350443] 2048-byte region [ffff8880948f0d00, ffff8880948f1500) [ 40.350444] The buggy address belongs to the page: [ 40.350448] page:ffffea0002523c00 count:1 mapcount:0 mapping:ffff8880948f0480 index:0x0 compound_mapcount: 0 [ 40.350455] flags: 0xfffe0000008100(slab|head) [ 40.350462] raw: 00fffe0000008100 ffff8880948f0480 0000000000000000 0000000100000003 [ 40.350467] raw: ffffea0002793320 ffff8880aa801948 ffff8880aa800c40 0000000000000000 [ 40.350469] page dumped because: kasan: bad access detected [ 40.350470] [ 40.350472] Memory state around the buggy address: [ 40.350475] ffff8880948f1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.350478] ffff8880948f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.350481] >ffff8880948f1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.350483] ^ [ 40.350486] ffff8880948f1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.350490] ffff8880948f1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.350491] ================================================================== [ 40.350493] Disabling lock debugging due to kernel taint [ 40.350529] Kernel panic - not syncing: panic_on_warn set ... [ 40.350529] [ 40.350533] CPU: 1 PID: 7192 Comm: syz-executor822 Tainted: G B 4.14.162-syzkaller #0 [ 40.350535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 40.350536] Call Trace: [ 40.350540] dump_stack+0x142/0x197 [ 40.350544] ? soft_cursor+0x43d/0xa50 [ 40.350549] panic+0x1f9/0x42d [ 40.350552] ? add_taint.cold+0x16/0x16 [ 40.350559] kasan_end_report+0x47/0x4f [ 40.350562] kasan_report.cold+0x130/0x2af [ 40.350567] check_memory_region+0x123/0x190 [ 40.350571] memcpy+0x24/0x50 [ 40.350575] soft_cursor+0x43d/0xa50 [ 40.350578] ? kfree+0x183/0x270 [ 40.350583] bit_cursor+0x11be/0x1830 [ 40.350588] ? bit_clear+0x4a0/0x4a0 [ 40.350594] ? fb_get_color_depth+0x5f/0x70 [ 40.350598] ? get_color+0x1bf/0x3b0 [ 40.350603] fbcon_cursor+0x4e3/0x6f0 [ 40.350606] ? bit_clear+0x4a0/0x4a0 [ 40.350610] hide_cursor+0x9d/0x2e0 [ 40.350614] ? lock_downgrade+0x740/0x740 [ 40.350617] redraw_screen+0x2a5/0x7c0 [ 40.350622] ? con_flush_chars+0x90/0x90 [ 40.350625] ? mutex_unlock+0xd/0x10 [ 40.350629] ? tty_do_resize+0x43/0x160 [ 40.350633] vc_do_resize+0xc8a/0xec0 [ 40.350639] ? vt_console_print+0xf70/0xf70 [ 40.350643] ? lock_acquire+0x16f/0x430 [ 40.350646] ? vt_ioctl+0xfa9/0x2170 [ 40.350650] vc_resize+0x4d/0x60 [ 40.350654] vt_ioctl+0x10a8/0x2170 [ 40.350659] ? complete_change_console+0x360/0x360 [ 40.350663] ? avc_ss_reset+0x110/0x110 [ 40.350667] ? kasan_slab_free+0x75/0xc0 [ 40.350671] ? SyS_open+0x2d/0x40 [ 40.350674] ? do_syscall_64+0x1e8/0x640 [ 40.350678] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 40.350682] ? find_held_lock+0x35/0x130 [ 40.350686] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 40.350690] ? tty_jobctrl_ioctl+0x44/0xc10 [ 40.350693] ? complete_change_console+0x360/0x360 [ 40.350698] tty_ioctl+0x841/0x1320 [ 40.350702] ? tty_vhangup+0x30/0x30 [ 40.350708] ? __might_sleep+0x93/0xb0 [ 40.350714] ? tty_vhangup+0x30/0x30 [ 40.350718] do_vfs_ioctl+0x7ae/0x1060 [ 40.350722] ? selinux_file_mprotect+0x5d0/0x5d0 [ 40.350727] ? ioctl_preallocate+0x1c0/0x1c0 [ 40.350730] ? putname+0xe0/0x120 [ 40.350734] ? do_sys_open+0x221/0x430 [ 40.350740] ? security_file_ioctl+0x7d/0xb0 [ 40.350743] ? security_file_ioctl+0x89/0xb0 [ 40.350748] SyS_ioctl+0x8f/0xc0 [ 40.350752] ? do_vfs_ioctl+0x1060/0x1060 [ 40.350756] do_syscall_64+0x1e8/0x640 [ 40.350760] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 40.350765] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 40.350767] RIP: 0033:0x440249 [ 40.350770] RSP: 002b:00007fff2f269cb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 40.350774] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 0000000000440249 [ 40.350776] RDX: 0000000020000000 RSI: 000000000000560a RDI: 0000000000000004 [ 40.350778] RBP: 00000000006cb018 R08: 000000000000000d R09: 00000000004002c8 [ 40.350780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000401b30 [ 40.350782] R13: 0000000000401bc0 R14: 0000000000000000 R15: 0000000000000000 [ 40.352217] Kernel Offset: disabled [ 41.148043] Rebooting in 86400 seconds..