[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 16.018715] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.137804] random: sshd: uninitialized urandom read (32 bytes read) [ 29.522136] random: sshd: uninitialized urandom read (32 bytes read) [ 30.074707] random: sshd: uninitialized urandom read (32 bytes read) [ 38.612555] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.31' (ECDSA) to the list of known hosts. [ 44.018948] random: sshd: uninitialized urandom read (32 bytes read) executing program executing program executing program executing program executing program [ 44.099113] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 44.132917] ================================================================== [ 44.140316] BUG: KASAN: slab-out-of-bounds in pdu_read+0x90/0xd0 [ 44.146454] Read of size 49862 at addr ffff8801ae26872d by task syz-executor527/4463 [ 44.154316] [ 44.155934] CPU: 1 PID: 4463 Comm: syz-executor527 Not tainted 4.18.0-rc4-next-20180710+ #3 [ 44.164397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.174422] Call Trace: [ 44.177002] dump_stack+0x1c9/0x2b4 [ 44.180617] ? dump_stack_print_info.cold.2+0x52/0x52 [ 44.185782] ? printk+0xa7/0xcf [ 44.189041] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 44.193787] ? pdu_read+0x90/0xd0 [ 44.197223] print_address_description+0x6c/0x20b [ 44.202053] ? pdu_read+0x90/0xd0 [ 44.205482] kasan_report.cold.7+0x242/0x30d [ 44.210141] check_memory_region+0x13e/0x1b0 [ 44.214527] memcpy+0x23/0x50 [ 44.217609] pdu_read+0x90/0xd0 [ 44.220872] p9pdu_readf+0x579/0x2170 [ 44.224756] ? p9pdu_writef+0xe0/0xe0 [ 44.228546] ? ksys_dup3+0x690/0x690 [ 44.232252] ? do_raw_spin_lock+0xc1/0x200 [ 44.236464] ? kasan_kmalloc+0xc4/0xe0 [ 44.240331] ? kasan_unpoison_shadow+0x35/0x50 [ 44.244893] ? p9_fd_show_options+0x1c0/0x1c0 [ 44.249374] ? __raw_spin_lock_init+0x2d/0x100 [ 44.253938] p9_client_create+0xde0/0x16c9 [ 44.258149] ? p9_client_read+0xc60/0xc60 [ 44.262277] ? kasan_check_read+0x11/0x20 [ 44.266418] ? lock_acquire+0x1e4/0x540 [ 44.270377] ? fs_reclaim_acquire+0x20/0x20 [ 44.274679] ? lock_release+0xa30/0xa30 [ 44.278633] ? __lockdep_init_map+0x105/0x590 [ 44.283121] ? kasan_check_write+0x14/0x20 [ 44.287343] ? __init_rwsem+0x1cc/0x2a0 [ 44.291304] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 44.296386] ? __kmalloc_track_caller+0x311/0x760 [ 44.301207] ? save_stack+0xa9/0xd0 [ 44.304829] ? save_stack+0x43/0xd0 [ 44.308471] ? kasan_kmalloc+0xc4/0xe0 [ 44.312612] ? kmem_cache_alloc_trace+0x152/0x780 [ 44.317436] ? memcpy+0x45/0x50 [ 44.320714] v9fs_session_init+0x21a/0x1a80 [ 44.325380] ? rcu_note_context_switch+0x730/0x730 [ 44.330307] ? do_mount+0x69e/0x1fb0 [ 44.334018] ? lock_acquire+0x1e4/0x540 [ 44.337987] ? v9fs_show_options+0x7e0/0x7e0 [ 44.342378] ? lock_release+0xa30/0xa30 [ 44.346343] ? check_same_owner+0x340/0x340 [ 44.350643] ? lock_downgrade+0x8f0/0x8f0 [ 44.354862] ? kasan_unpoison_shadow+0x35/0x50 [ 44.359437] ? kasan_kmalloc+0xc4/0xe0 [ 44.363655] ? kmem_cache_alloc_trace+0x318/0x780 [ 44.368492] ? kasan_unpoison_shadow+0x35/0x50 [ 44.373052] ? kasan_kmalloc+0xc4/0xe0 [ 44.376920] v9fs_mount+0x7c/0x900 [ 44.380441] ? v9fs_drop_inode+0x150/0x150 [ 44.384658] legacy_get_tree+0x118/0x440 [ 44.388713] vfs_get_tree+0x1cb/0x5c0 [ 44.392502] do_mount+0x6c1/0x1fb0 [ 44.396029] ? check_same_owner+0x340/0x340 [ 44.400425] ? lock_release+0xa30/0xa30 [ 44.404390] ? copy_mount_string+0x40/0x40 [ 44.408618] ? kasan_kmalloc+0xc4/0xe0 [ 44.412497] ? kmem_cache_alloc_trace+0x318/0x780 [ 44.417323] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 44.422846] ? _copy_from_user+0xdf/0x150 [ 44.427158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 44.432678] ? copy_mount_options+0x285/0x380 [ 44.437153] ksys_mount+0x12d/0x140 [ 44.440771] __x64_sys_mount+0xbe/0x150 [ 44.444739] do_syscall_64+0x1b9/0x820 [ 44.448609] ? syscall_return_slowpath+0x5e0/0x5e0 [ 44.453518] ? syscall_return_slowpath+0x31d/0x5e0 [ 44.458440] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 44.464321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 44.469852] ? prepare_exit_to_usermode+0x291/0x3b0 [ 44.474856] ? perf_trace_sys_enter+0xb10/0xb10 [ 44.479533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 44.484370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 44.489537] RIP: 0033:0x440979 [ 44.492707] Code: e8 8c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 44.511839] RSP: 002b:00007ffe7ef85d08 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 44.519544] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440979 [ 44.526826] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 44.534090] RBP: 0000000000000000 R08: 0000000020000180 R09: 00000000004002c8 [ 44.541429] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000000ac5f [ 44.548681] R13: 0000000000401ed0 R14: 0000000000000000 R15: 0000000000000000 [ 44.555946] [ 44.557553] Allocated by task 4463: [ 44.561174] save_stack+0x43/0xd0 [ 44.564603] kasan_kmalloc+0xc4/0xe0 [ 44.568291] __kmalloc+0x14e/0x760 [ 44.571811] p9_fcall_alloc+0x1e/0x90 [ 44.575588] p9_client_prepare_req.part.9+0x754/0xcd0 [ 44.580766] p9_client_rpc+0x1bd/0x1400 [ 44.584719] p9_client_create+0xd09/0x16c9 [ 44.588944] v9fs_session_init+0x21a/0x1a80 [ 44.593245] v9fs_mount+0x7c/0x900 [ 44.596766] legacy_get_tree+0x118/0x440 [ 44.600821] vfs_get_tree+0x1cb/0x5c0 [ 44.604610] do_mount+0x6c1/0x1fb0 [ 44.608141] ksys_mount+0x12d/0x140 [ 44.611747] __x64_sys_mount+0xbe/0x150 [ 44.615701] do_syscall_64+0x1b9/0x820 [ 44.619583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 44.624765] [ 44.626383] Freed by task 0: [ 44.629386] (stack is not available) [ 44.633187] [ 44.634796] The buggy address belongs to the object at ffff8801ae268700 [ 44.634796] which belongs to the cache kmalloc-16384 of size 16384 [ 44.647990] The buggy address is located 45 bytes inside of [ 44.647990] 16384-byte region [ffff8801ae268700, ffff8801ae26c700) [ 44.660384] The buggy address belongs to the page: [ 44.665384] page:ffffea0006b89a00 count:1 mapcount:0 mapping:ffff8801da802200 index:0x0 compound_mapcount: 0 [ 44.675423] flags: 0x2fffc0000008100(slab|head) [ 44.680076] raw: 02fffc0000008100 ffffea0006b69a08 ffff8801da801c48 ffff8801da802200 [ 44.687936] raw: 0000000000000000 ffff8801ae268700 0000000100000001 0000000000000000 [ 44.695791] page dumped because: kasan: bad access detected [ 44.701475] [ 44.703079] Memory state around the buggy address: [ 44.708008] ffff8801ae26a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 44.715440] ffff8801ae26a680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 44.722789] >ffff8801ae26a700: 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc [ 44.730127] ^ [ 44.734513] ffff8801ae26a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.741850] ffff8801ae26a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.749191] ================================================================== [ 44.756814] Kernel panic - not syncing: panic_on_warn set ... [ 44.756814] [ 44.764180] CPU: 1 PID: 4463 Comm: syz-executor527 Tainted: G B 4.18.0-rc4-next-20180710+ #3 [ 44.774046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.783375] Call Trace: [ 44.785945] dump_stack+0x1c9/0x2b4 [ 44.789555] ? dump_stack_print_info.cold.2+0x52/0x52 [ 44.794745] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 44.799483] panic+0x238/0x4e7 [ 44.802657] ? add_taint.cold.5+0x16/0x16 [ 44.806787] ? do_raw_spin_unlock+0xa7/0x2f0 [ 44.811177] ? pdu_read+0x90/0xd0 [ 44.814612] kasan_end_report+0x47/0x4f [ 44.818565] kasan_report.cold.7+0x76/0x30d [ 44.822878] check_memory_region+0x13e/0x1b0 [ 44.827265] memcpy+0x23/0x50 [ 44.830350] pdu_read+0x90/0xd0 [ 44.833618] p9pdu_readf+0x579/0x2170 [ 44.837396] ? p9pdu_writef+0xe0/0xe0 [ 44.841179] ? ksys_dup3+0x690/0x690 [ 44.844872] ? do_raw_spin_lock+0xc1/0x200 [ 44.849098] ? kasan_kmalloc+0xc4/0xe0 [ 44.852970] ? kasan_unpoison_shadow+0x35/0x50 [ 44.857538] ? p9_fd_show_options+0x1c0/0x1c0 [ 44.862023] ? __raw_spin_lock_init+0x2d/0x100 [ 44.866584] p9_client_create+0xde0/0x16c9 [ 44.870800] ? p9_client_read+0xc60/0xc60 [ 44.874938] ? kasan_check_read+0x11/0x20 [ 44.879077] ? lock_acquire+0x1e4/0x540 [ 44.883047] ? fs_reclaim_acquire+0x20/0x20 [ 44.887361] ? lock_release+0xa30/0xa30 [ 44.891328] ? __lockdep_init_map+0x105/0x590 [ 44.895804] ? kasan_check_write+0x14/0x20 [ 44.900018] ? __init_rwsem+0x1cc/0x2a0 [ 44.903983] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 44.908979] ? __kmalloc_track_caller+0x311/0x760 [ 44.913810] ? save_stack+0xa9/0xd0 [ 44.917425] ? save_stack+0x43/0xd0 [ 44.921132] ? kasan_kmalloc+0xc4/0xe0 [ 44.924995] ? kmem_cache_alloc_trace+0x152/0x780 [ 44.929915] ? memcpy+0x45/0x50 [ 44.933188] v9fs_session_init+0x21a/0x1a80 [ 44.937506] ? rcu_note_context_switch+0x730/0x730 [ 44.942431] ? do_mount+0x69e/0x1fb0 [ 44.946136] ? lock_acquire+0x1e4/0x540 [ 44.950090] ? v9fs_show_options+0x7e0/0x7e0 [ 44.954478] ? lock_release+0xa30/0xa30 [ 44.958444] ? check_same_owner+0x340/0x340 [ 44.963004] ? lock_downgrade+0x8f0/0x8f0 [ 44.967133] ? kasan_unpoison_shadow+0x35/0x50 [ 44.971705] ? kasan_kmalloc+0xc4/0xe0 [ 44.975590] ? kmem_cache_alloc_trace+0x318/0x780 [ 44.980414] ? kasan_unpoison_shadow+0x35/0x50 [ 44.984986] ? kasan_kmalloc+0xc4/0xe0 [ 44.988868] v9fs_mount+0x7c/0x900 [ 44.992661] ? v9fs_drop_inode+0x150/0x150 [ 44.996875] legacy_get_tree+0x118/0x440 [ 45.000919] vfs_get_tree+0x1cb/0x5c0 [ 45.004701] do_mount+0x6c1/0x1fb0 [ 45.008237] ? check_same_owner+0x340/0x340 [ 45.012535] ? lock_release+0xa30/0xa30 [ 45.016501] ? copy_mount_string+0x40/0x40 [ 45.020719] ? kasan_kmalloc+0xc4/0xe0 [ 45.024722] ? kmem_cache_alloc_trace+0x318/0x780 [ 45.029558] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 45.035089] ? _copy_from_user+0xdf/0x150 [ 45.039229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 45.045095] ? copy_mount_options+0x285/0x380 [ 45.049580] ksys_mount+0x12d/0x140 [ 45.053207] __x64_sys_mount+0xbe/0x150 [ 45.057165] do_syscall_64+0x1b9/0x820 [ 45.061031] ? syscall_return_slowpath+0x5e0/0x5e0 [ 45.065952] ? syscall_return_slowpath+0x31d/0x5e0 [ 45.070861] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 45.075868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 45.081400] ? prepare_exit_to_usermode+0x291/0x3b0 [ 45.086397] ? perf_trace_sys_enter+0xb10/0xb10 [ 45.091072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 45.095898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 45.101067] RIP: 0033:0x440979 [ 45.104233] Code: e8 8c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 45.123440] RSP: 002b:00007ffe7ef85d08 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 45.131228] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440979 [ 45.138565] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 45.145917] RBP: 0000000000000000 R08: 0000000020000180 R09: 00000000004002c8 [ 45.153178] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000000ac5f [ 45.160435] R13: 0000000000401ed0 R14: 0000000000000000 R15: 0000000000000000 [ 45.168266] Dumping ftrace buffer: [ 45.171781] (ftrace buffer empty) [ 45.175466] Kernel Offset: disabled [ 45.179097] Rebooting in 86400 seconds..