INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes [ 550.395802] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.168' (ECDSA) to the list of known hosts. [ 556.022001] random: sshd: uninitialized urandom read (32 bytes read) [ 556.114376] audit: type=1400 audit(1561630694.766:8): avc: denied { map } for pid=1894 comm="syz-executor358" path="/root/syz-executor358093263" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program [ 556.670053] hrtimer: interrupt took 38853 ns executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 582.806432] ================================================================== [ 582.814185] BUG: KASAN: slab-out-of-bounds in perf_output_read+0xe58/0xfc0 [ 582.821563] Read of size 8 at addr ffff8881c93e7f08 by task syz-executor358/2206 [ 582.829314] [ 582.831112] CPU: 0 PID: 2206 Comm: syz-executor358 Not tainted 4.14.129+ #11 [ 582.838478] Call Trace: [ 582.842174] dump_stack+0xb9/0x10e [ 582.845709] ? perf_output_read+0xe58/0xfc0 [ 582.850088] print_address_description+0x60/0x226 [ 582.855008] ? perf_output_read+0xe58/0xfc0 [ 582.859311] kasan_report.cold+0xae/0x2d5 [ 582.863449] ? perf_output_read+0xe58/0xfc0 [ 582.867771] ? perf_event_exit_cpu_context+0x170/0x170 [ 582.873062] ? deref_stack_reg+0xaa/0xe0 [ 582.877125] ? perf_output_copy+0x149/0x1d0 [ 582.881462] ? perf_output_sample+0xcea/0x1700 [ 582.886030] ? __perf_event_header__init_id.isra.0+0x276/0x430 [ 582.892001] ? perf_prepare_sample+0x656/0x1330 [ 582.896742] ? perf_event__output_id_sample+0x70/0x70 [ 582.901924] ? perf_output_sample+0x1700/0x1700 [ 582.906581] ? lock_acquire+0x10f/0x380 [ 582.910546] ? perf_prepare_sample+0x1330/0x1330 [ 582.915340] ? perf_event_output_forward+0x10b/0x220 [ 582.920978] ? perf_prepare_sample+0x1330/0x1330 [ 582.925764] ? check_preemption_disabled+0x35/0x1f0 [ 582.930775] ? __perf_event_overflow+0x116/0x320 [ 582.935606] ? perf_swevent_overflow+0x17b/0x210 [ 582.940539] ? ___perf_sw_event+0x11b/0x4a0 [ 582.944849] ? perf_swevent_event+0x19c/0x270 [ 582.949449] ? ___perf_sw_event+0x2a4/0x4a0 [ 582.953756] ? perf_pending_event+0xd0/0xd0 [ 582.958082] ? __handle_mm_fault+0xd96/0x2640 [ 582.962610] ? lock_downgrade+0x5d0/0x5d0 [ 582.966744] ? __handle_mm_fault+0xcc0/0x2640 [ 582.971233] ? _raw_spin_unlock+0x29/0x40 [ 582.975448] ? __handle_mm_fault+0x6c5/0x2640 [ 582.979942] ? vm_insert_mixed_mkwrite+0x30/0x30 [ 582.984694] ? __brelse+0x43/0x60 [ 582.988158] ? __do_page_fault+0x48e/0xb80 [ 582.992386] ? __perf_sw_event+0x42/0x80 [ 582.996698] ? __perf_sw_event+0x42/0x80 [ 583.000861] ? __do_page_fault+0x785/0xb80 [ 583.005186] ? bad_area_access_error+0x340/0x340 [ 583.009955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 583.014798] ? page_fault+0x22/0x50 [ 583.018416] ? iov_iter_fault_in_readable+0x29c/0x350 [ 583.023605] ? iov_iter_init+0x1c0/0x1c0 [ 583.027685] ? generic_perform_write+0x158/0x450 [ 583.032436] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 583.037105] ? current_time+0xb0/0xb0 [ 583.040917] ? __generic_file_write_iter+0x32e/0x550 [ 583.046369] ? generic_write_checks+0x252/0x410 [ 583.051058] ? ext4_file_write_iter+0x551/0xd60 [ 583.055713] ? ext4_llseek+0x7f0/0x7f0 [ 583.059609] ? mark_held_locks+0xa6/0xf0 [ 583.063929] ? retint_kernel+0x2d/0x2d [ 583.067813] ? trace_hardirqs_on_caller+0x37b/0x540 [ 583.072905] ? __vfs_write+0x401/0x5a0 [ 583.076859] ? kernel_read+0x110/0x110 [ 583.080745] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 583.086179] ? rcu_read_lock_sched_held+0x10a/0x130 [ 583.091180] ? vfs_write+0x17f/0x4d0 [ 583.094885] ? SyS_write+0x102/0x250 [ 583.098616] ? SyS_read+0x250/0x250 [ 583.102226] ? SyS_read+0x250/0x250 [ 583.105836] ? do_syscall_64+0x19b/0x510 [ 583.109883] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 583.115242] [ 583.116849] Allocated by task 2206: [ 583.120457] kasan_kmalloc.part.0+0x4f/0xd0 [ 583.124759] kmem_cache_alloc_trace+0x126/0x310 [ 583.129407] alloc_perf_context+0x44/0xe0 [ 583.133558] find_get_context.isra.0+0x119/0x550 [ 583.138399] SyS_perf_event_open+0x9d3/0x2530 [ 583.142875] do_syscall_64+0x19b/0x510 [ 583.146739] [ 583.148364] Freed by task 668: [ 583.151763] kasan_slab_free+0xb0/0x190 [ 583.155725] kfree+0xf5/0x310 [ 583.158811] load_elf_binary+0x1bf2/0x4530 [ 583.163037] search_binary_handler+0x13f/0x6d0 [ 583.167629] do_execveat_common.isra.0+0xf5f/0x1c30 [ 583.172650] SyS_execve+0x34/0x40 [ 583.176085] do_syscall_64+0x19b/0x510 [ 583.179968] [ 583.181579] The buggy address belongs to the object at ffff8881c93e7b80 [ 583.181579] which belongs to the cache kmalloc-512 of size 512 [ 583.194342] The buggy address is located 392 bytes to the right of [ 583.194342] 512-byte region [ffff8881c93e7b80, ffff8881c93e7d80) [ 583.207125] The buggy address belongs to the page: [ 583.212166] page:ffffea000724f980 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 583.222119] flags: 0x4000000000010200(slab|head) [ 583.226855] raw: 4000000000010200 0000000000000000 0000000000000000 00000001800c000c [ 583.234825] raw: ffffea0007242200 0000000900000009 ffff8881da802c00 0000000000000000 [ 583.242784] page dumped because: kasan: bad access detected [ 583.248474] [ 583.250078] Memory state around the buggy address: [ 583.255511] ffff8881c93e7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 583.262884] ffff8881c93e7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 583.270600] >ffff8881c93e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 583.277946] ^ [ 583.281576] ffff8881c93e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 583.289037] ffff8881c93e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 583.296391] ================================================================== [ 583.303732] Disabling lock debugging due to kernel taint [ 583.309251] Kernel panic - not syncing: panic_on_warn set ... [ 583.309251] [ 583.316739] CPU: 0 PID: 2206 Comm: syz-executor358 Tainted: G B 4.14.129+ #11 [ 583.325147] Call Trace: [ 583.327727] dump_stack+0xb9/0x10e [ 583.331271] panic+0x1d9/0x3c2 [ 583.334448] ? add_taint.cold+0x16/0x16 [ 583.338417] ? retint_kernel+0x2d/0x2d [ 583.342310] ? perf_output_read+0xe58/0xfc0 [ 583.346622] kasan_end_report+0x43/0x49 [ 583.350577] kasan_report.cold+0xca/0x2d5 [ 583.354728] ? perf_output_read+0xe58/0xfc0 [ 583.359032] ? perf_event_exit_cpu_context+0x170/0x170 [ 583.364299] ? deref_stack_reg+0xaa/0xe0 [ 583.368354] ? perf_output_copy+0x149/0x1d0 [ 583.372694] ? perf_output_sample+0xcea/0x1700 [ 583.377291] ? __perf_event_header__init_id.isra.0+0x276/0x430 [ 583.383291] ? perf_prepare_sample+0x656/0x1330 [ 583.387958] ? perf_event__output_id_sample+0x70/0x70 [ 583.393147] ? perf_output_sample+0x1700/0x1700 [ 583.397802] ? lock_acquire+0x10f/0x380 [ 583.401765] ? perf_prepare_sample+0x1330/0x1330 [ 583.406532] ? perf_event_output_forward+0x10b/0x220 [ 583.411719] ? perf_prepare_sample+0x1330/0x1330 [ 583.416458] ? check_preemption_disabled+0x35/0x1f0 [ 583.421454] ? __perf_event_overflow+0x116/0x320 [ 583.426210] ? perf_swevent_overflow+0x17b/0x210 [ 583.430959] ? ___perf_sw_event+0x11b/0x4a0 [ 583.435277] ? perf_swevent_event+0x19c/0x270 [ 583.439772] ? ___perf_sw_event+0x2a4/0x4a0 [ 583.444094] ? perf_pending_event+0xd0/0xd0 [ 583.448445] ? __handle_mm_fault+0xd96/0x2640 [ 583.452925] ? lock_downgrade+0x5d0/0x5d0 [ 583.457154] ? __handle_mm_fault+0xcc0/0x2640 [ 583.461634] ? _raw_spin_unlock+0x29/0x40 [ 583.465761] ? __handle_mm_fault+0x6c5/0x2640 [ 583.470235] ? vm_insert_mixed_mkwrite+0x30/0x30 [ 583.474996] ? __brelse+0x43/0x60 [ 583.478437] ? __do_page_fault+0x48e/0xb80 [ 583.482676] ? __perf_sw_event+0x42/0x80 [ 583.486915] ? __perf_sw_event+0x42/0x80 [ 583.490981] ? __do_page_fault+0x785/0xb80 [ 583.495204] ? bad_area_access_error+0x340/0x340 [ 583.499940] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 583.504766] ? page_fault+0x22/0x50 [ 583.508382] ? iov_iter_fault_in_readable+0x29c/0x350 [ 583.513566] ? iov_iter_init+0x1c0/0x1c0 [ 583.517745] ? generic_perform_write+0x158/0x450 [ 583.522576] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 583.527252] ? current_time+0xb0/0xb0 [ 583.531037] ? __generic_file_write_iter+0x32e/0x550 [ 583.536230] ? generic_write_checks+0x252/0x410 [ 583.540885] ? ext4_file_write_iter+0x551/0xd60 [ 583.545554] ? ext4_llseek+0x7f0/0x7f0 [ 583.549431] ? mark_held_locks+0xa6/0xf0 [ 583.553482] ? retint_kernel+0x2d/0x2d [ 583.557451] ? trace_hardirqs_on_caller+0x37b/0x540 [ 583.562634] ? __vfs_write+0x401/0x5a0 [ 583.566503] ? kernel_read+0x110/0x110 [ 583.570384] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 583.575870] ? rcu_read_lock_sched_held+0x10a/0x130 [ 583.580897] ? vfs_write+0x17f/0x4d0 [ 583.584623] ? SyS_write+0x102/0x250 [ 583.589014] ? SyS_read+0x250/0x250 [ 583.592643] ? SyS_read+0x250/0x250 [ 583.596249] ? do_syscall_64+0x19b/0x510 [ 583.600391] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 583.606151] Kernel Offset: 0x32000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 583.617238] Rebooting in 86400 seconds..