[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 16.816432] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.367790] random: sshd: uninitialized urandom read (32 bytes read) [ 22.662527] random: sshd: uninitialized urandom read (32 bytes read) [ 23.409916] random: sshd: uninitialized urandom read (32 bytes read) [ 23.548517] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.41' (ECDSA) to the list of known hosts. [ 29.131610] random: sshd: uninitialized urandom read (32 bytes read) executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 29.212721] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 29.266982] ================================================================== [ 29.274423] BUG: KASAN: slab-out-of-bounds in pdu_read+0x90/0xd0 [ 29.280554] Read of size 42299 at addr ffff8801c7fd8bad by task syz-executor518/4483 [ 29.288408] [ 29.290025] CPU: 0 PID: 4483 Comm: syz-executor518 Not tainted 4.18.0-rc3-next-20180709+ #2 [ 29.298493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.307823] Call Trace: [ 29.310393] dump_stack+0x1c9/0x2b4 [ 29.314015] ? dump_stack_print_info.cold.2+0x52/0x52 [ 29.319195] ? printk+0xa7/0xcf [ 29.322455] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 29.327191] ? pdu_read+0x90/0xd0 [ 29.330625] print_address_description+0x6c/0x20b [ 29.335472] ? pdu_read+0x90/0xd0 [ 29.338981] kasan_report.cold.7+0x242/0x30d [ 29.343413] check_memory_region+0x13e/0x1b0 [ 29.347824] memcpy+0x23/0x50 [ 29.350926] pdu_read+0x90/0xd0 [ 29.354214] p9pdu_readf+0x579/0x2170 [ 29.358022] ? p9pdu_writef+0xe0/0xe0 [ 29.361834] ? ksys_dup3+0x690/0x690 [ 29.365591] ? check_same_owner+0x340/0x340 [ 29.370022] ? p9_fd_poll+0x2b0/0x2b0 [ 29.373844] ? kasan_kmalloc+0xc4/0xe0 [ 29.377850] ? kasan_unpoison_shadow+0x35/0x50 [ 29.382554] ? p9_fd_show_options+0x1c0/0x1c0 [ 29.387082] ? __raw_spin_lock_init+0x2d/0x100 [ 29.391714] p9_client_create+0xde0/0x16c9 [ 29.395972] ? p9_client_read+0xc60/0xc60 [ 29.400134] ? kasan_check_read+0x11/0x20 [ 29.404406] ? lock_acquire+0x1e4/0x540 [ 29.408397] ? fs_reclaim_acquire+0x20/0x20 [ 29.412713] ? lock_release+0xa30/0xa30 [ 29.416707] ? __lockdep_init_map+0x105/0x590 [ 29.421210] ? kasan_check_write+0x14/0x20 [ 29.425476] ? __init_rwsem+0x1cc/0x2a0 [ 29.429475] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 29.434521] ? __kmalloc_track_caller+0x311/0x760 [ 29.439401] ? save_stack+0xa9/0xd0 [ 29.443049] ? save_stack+0x43/0xd0 [ 29.446693] ? kasan_kmalloc+0xc4/0xe0 [ 29.450600] ? kmem_cache_alloc_trace+0x152/0x780 [ 29.455473] ? memcpy+0x45/0x50 [ 29.458758] v9fs_session_init+0x21a/0x1a80 [ 29.463090] ? rcu_note_context_switch+0x730/0x730 [ 29.468084] ? do_mount+0x69e/0x1fb0 [ 29.472105] ? lock_acquire+0x1e4/0x540 [ 29.476088] ? v9fs_show_options+0x7e0/0x7e0 [ 29.480503] ? lock_release+0xa30/0xa30 [ 29.484495] ? check_same_owner+0x340/0x340 [ 29.488870] ? kasan_unpoison_shadow+0x35/0x50 [ 29.493482] ? kasan_kmalloc+0xc4/0xe0 [ 29.497387] ? kmem_cache_alloc_trace+0x318/0x780 [ 29.502240] ? kasan_unpoison_shadow+0x35/0x50 [ 29.506842] ? kasan_kmalloc+0xc4/0xe0 [ 29.510739] v9fs_mount+0x7c/0x900 [ 29.514302] ? v9fs_drop_inode+0x150/0x150 [ 29.518560] legacy_get_tree+0x118/0x440 [ 29.522631] vfs_get_tree+0x1cb/0x5c0 [ 29.526443] do_mount+0x6c1/0x1fb0 [ 29.530127] ? kasan_check_write+0x14/0x20 [ 29.534360] ? copy_mount_string+0x40/0x40 [ 29.538637] ? kasan_kmalloc+0xc4/0xe0 [ 29.542528] ? kmem_cache_alloc_trace+0x318/0x780 [ 29.547463] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 29.553016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 29.558565] ? copy_mount_options+0x285/0x380 [ 29.563106] ksys_mount+0x12d/0x140 [ 29.566742] __x64_sys_mount+0xbe/0x150 [ 29.570724] do_syscall_64+0x1b9/0x820 [ 29.574616] ? syscall_return_slowpath+0x5e0/0x5e0 [ 29.579565] ? syscall_return_slowpath+0x31d/0x5e0 [ 29.584503] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 29.589548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 29.595116] ? prepare_exit_to_usermode+0x291/0x3b0 [ 29.600142] ? perf_trace_sys_enter+0xb10/0xb10 [ 29.604825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 29.609711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 29.614900] RIP: 0033:0x440979 [ 29.618090] Code: e8 8c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 29.637244] RSP: 002b:00007ffdd8711168 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 29.644943] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440979 [ 29.652218] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 29.659504] RBP: 0000000000000000 R08: 0000000020000180 R09: 00000000004002c8 [ 29.666775] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000000724d [ 29.674043] R13: 0000000000401ed0 R14: 0000000000000000 R15: 0000000000000000 [ 29.681313] [ 29.682936] Allocated by task 4483: [ 29.686591] save_stack+0x43/0xd0 [ 29.690049] kasan_kmalloc+0xc4/0xe0 [ 29.693757] __kmalloc+0x14e/0x760 [ 29.697301] p9_fcall_alloc+0x1e/0x90 [ 29.701121] p9_client_prepare_req.part.9+0x754/0xcd0 [ 29.706314] p9_client_rpc+0x1bd/0x1400 [ 29.710279] p9_client_create+0xd09/0x16c9 [ 29.714506] v9fs_session_init+0x21a/0x1a80 [ 29.718821] v9fs_mount+0x7c/0x900 [ 29.722366] legacy_get_tree+0x118/0x440 [ 29.726469] vfs_get_tree+0x1cb/0x5c0 [ 29.730258] do_mount+0x6c1/0x1fb0 [ 29.733781] ksys_mount+0x12d/0x140 [ 29.737402] __x64_sys_mount+0xbe/0x150 [ 29.741381] do_syscall_64+0x1b9/0x820 [ 29.745270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 29.750485] [ 29.752113] Freed by task 0: [ 29.755151] (stack is not available) [ 29.758873] [ 29.760500] The buggy address belongs to the object at ffff8801c7fd8b80 [ 29.760500] which belongs to the cache kmalloc-16384 of size 16384 [ 29.773499] The buggy address is located 45 bytes inside of [ 29.773499] 16384-byte region [ffff8801c7fd8b80, ffff8801c7fdcb80) [ 29.785458] The buggy address belongs to the page: [ 29.790400] page:ffffea00071ff600 count:1 mapcount:0 mapping:ffff8801da802200 index:0x0 compound_mapcount: 0 [ 29.800825] flags: 0x2fffc0000008100(slab|head) [ 29.805506] raw: 02fffc0000008100 ffffea000705a008 ffff8801da801c48 ffff8801da802200 [ 29.813400] raw: 0000000000000000 ffff8801c7fd8b80 0000000100000001 0000000000000000 [ 29.821266] page dumped because: kasan: bad access detected [ 29.826971] [ 29.828588] Memory state around the buggy address: [ 29.833513] ffff8801c7fdaa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.840871] ffff8801c7fdab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.848224] >ffff8801c7fdab80: 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc [ 29.855584] ^ [ 29.860015] ffff8801c7fdac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.868263] ffff8801c7fdac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.875640] ================================================================== [ 29.883170] Kernel panic - not syncing: panic_on_warn set ... [ 29.883170] [ 29.890585] CPU: 0 PID: 4483 Comm: syz-executor518 Tainted: G B 4.18.0-rc3-next-20180709+ #2 [ 29.900458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.909819] Call Trace: [ 29.912409] dump_stack+0x1c9/0x2b4 [ 29.916042] ? dump_stack_print_info.cold.2+0x52/0x52 [ 29.921234] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 29.926035] panic+0x238/0x4e7 [ 29.929232] ? add_taint.cold.5+0x16/0x16 [ 29.933391] ? do_raw_spin_unlock+0xa7/0x2f0 [ 29.937792] ? pdu_read+0x90/0xd0 [ 29.941237] kasan_end_report+0x47/0x4f [ 29.945224] kasan_report.cold.7+0x76/0x30d [ 29.949547] check_memory_region+0x13e/0x1b0 [ 29.953965] memcpy+0x23/0x50 [ 29.957089] pdu_read+0x90/0xd0 [ 29.960385] p9pdu_readf+0x579/0x2170 [ 29.964186] ? p9pdu_writef+0xe0/0xe0 [ 29.967988] ? ksys_dup3+0x690/0x690 [ 29.971699] ? check_same_owner+0x340/0x340 [ 29.976018] ? p9_fd_poll+0x2b0/0x2b0 [ 29.979835] ? kasan_kmalloc+0xc4/0xe0 [ 29.983774] ? kasan_unpoison_shadow+0x35/0x50 [ 29.988434] ? p9_fd_show_options+0x1c0/0x1c0 [ 29.992953] ? __raw_spin_lock_init+0x2d/0x100 [ 29.997543] p9_client_create+0xde0/0x16c9 [ 30.001769] ? p9_client_read+0xc60/0xc60 [ 30.005923] ? kasan_check_read+0x11/0x20 [ 30.010078] ? lock_acquire+0x1e4/0x540 [ 30.014045] ? fs_reclaim_acquire+0x20/0x20 [ 30.018365] ? lock_release+0xa30/0xa30 [ 30.022337] ? __lockdep_init_map+0x105/0x590 [ 30.026833] ? kasan_check_write+0x14/0x20 [ 30.031068] ? __init_rwsem+0x1cc/0x2a0 [ 30.035053] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 30.040071] ? __kmalloc_track_caller+0x311/0x760 [ 30.044919] ? save_stack+0xa9/0xd0 [ 30.048567] ? save_stack+0x43/0xd0 [ 30.052196] ? kasan_kmalloc+0xc4/0xe0 [ 30.056089] ? kmem_cache_alloc_trace+0x152/0x780 [ 30.061111] ? memcpy+0x45/0x50 [ 30.064399] v9fs_session_init+0x21a/0x1a80 [ 30.068721] ? rcu_note_context_switch+0x730/0x730 [ 30.073683] ? do_mount+0x69e/0x1fb0 [ 30.077399] ? lock_acquire+0x1e4/0x540 [ 30.081372] ? v9fs_show_options+0x7e0/0x7e0 [ 30.085786] ? lock_release+0xa30/0xa30 [ 30.090024] ? check_same_owner+0x340/0x340 [ 30.094353] ? kasan_unpoison_shadow+0x35/0x50 [ 30.098946] ? kasan_kmalloc+0xc4/0xe0 [ 30.102837] ? kmem_cache_alloc_trace+0x318/0x780 [ 30.107671] ? kasan_unpoison_shadow+0x35/0x50 [ 30.112245] ? kasan_kmalloc+0xc4/0xe0 [ 30.116121] v9fs_mount+0x7c/0x900 [ 30.119655] ? v9fs_drop_inode+0x150/0x150 [ 30.123901] legacy_get_tree+0x118/0x440 [ 30.127984] vfs_get_tree+0x1cb/0x5c0 [ 30.131776] do_mount+0x6c1/0x1fb0 [ 30.135331] ? kasan_check_write+0x14/0x20 [ 30.139563] ? copy_mount_string+0x40/0x40 [ 30.143807] ? kasan_kmalloc+0xc4/0xe0 [ 30.147695] ? kmem_cache_alloc_trace+0x318/0x780 [ 30.152539] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 30.158091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 30.163640] ? copy_mount_options+0x285/0x380 [ 30.168143] ksys_mount+0x12d/0x140 [ 30.171771] __x64_sys_mount+0xbe/0x150 [ 30.175745] do_syscall_64+0x1b9/0x820 [ 30.179631] ? syscall_return_slowpath+0x5e0/0x5e0 [ 30.184669] ? syscall_return_slowpath+0x31d/0x5e0 [ 30.189637] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 30.194651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 30.200183] ? prepare_exit_to_usermode+0x291/0x3b0 [ 30.205219] ? perf_trace_sys_enter+0xb10/0xb10 [ 30.209886] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 30.214730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 30.219948] RIP: 0033:0x440979 [ 30.223132] Code: e8 8c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 30.242360] RSP: 002b:00007ffdd8711168 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 30.250064] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440979 [ 30.257331] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 30.264608] RBP: 0000000000000000 R08: 0000000020000180 R09: 00000000004002c8 [ 30.271973] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000000724d [ 30.279260] R13: 0000000000401ed0 R14: 0000000000000000 R15: 0000000000000000 [ 30.287093] Dumping ftrace buffer: [ 30.290622] (ftrace buffer empty) [ 30.294315] Kernel Offset: disabled [ 30.297928] Rebooting in 86400 seconds..