[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 20.826429] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 24.496321] random: sshd: uninitialized urandom read (32 bytes read) [ 24.809985] random: sshd: uninitialized urandom read (32 bytes read) [ 25.674400] random: sshd: uninitialized urandom read (32 bytes read) [ 58.166963] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.63' (ECDSA) to the list of known hosts. [ 63.585929] random: sshd: uninitialized urandom read (32 bytes read) 2018/07/09 02:57:41 parsed 1 programs [ 65.240665] random: cc1: uninitialized urandom read (8 bytes read) 2018/07/09 02:57:43 executed programs: 0 [ 66.581307] IPVS: ftp: loaded support on port[0] = 21 [ 66.814520] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.821146] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.829457] device bridge_slave_0 entered promiscuous mode [ 66.849286] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.855805] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.862891] device bridge_slave_1 entered promiscuous mode [ 66.882367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 66.902535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 66.953238] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.974652] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 67.055609] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 67.064044] team0: Port device team_slave_0 added [ 67.083508] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 67.090983] team0: Port device team_slave_1 added [ 67.109761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.130269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.149669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.167974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.344847] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.351478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.358714] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.365258] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.908166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.958729] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.007128] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 68.013373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.021151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.062799] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.403793] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 68.896012] ================================================================== [ 68.903634] BUG: KASAN: slab-out-of-bounds in pdu_read+0x90/0xd0 [ 68.909788] Read of size 27506 at addr ffff8801d49f2a6d by task syz-executor0/4891 [ 68.917490] [ 68.919112] CPU: 0 PID: 4891 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #40 [ 68.926283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.935640] Call Trace: [ 68.938271] dump_stack+0x1c9/0x2b4 [ 68.941904] ? dump_stack_print_info.cold.2+0x52/0x52 [ 68.947090] ? printk+0xa7/0xcf [ 68.950388] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 68.955167] ? pdu_read+0x90/0xd0 [ 68.958627] print_address_description+0x6c/0x20b [ 68.963466] ? pdu_read+0x90/0xd0 [ 68.966919] kasan_report.cold.7+0x242/0x2fe [ 68.971336] check_memory_region+0x13e/0x1b0 [ 68.975756] memcpy+0x23/0x50 [ 68.978861] pdu_read+0x90/0xd0 [ 68.982144] p9pdu_readf+0x579/0x2170 [ 68.985949] ? p9pdu_writef+0xe0/0xe0 [ 68.989745] ? __fget+0x414/0x670 [ 68.993215] ? rcu_is_watching+0x61/0x150 [ 68.997376] ? expand_files.part.8+0x9c0/0x9c0 [ 69.001964] ? rcu_read_lock_sched_held+0x108/0x120 [ 69.006997] ? p9_fd_show_options+0x1c0/0x1c0 [ 69.011501] p9_client_create+0xde0/0x16c9 [ 69.015736] ? p9_client_read+0xc60/0xc60 [ 69.019890] ? find_held_lock+0x36/0x1c0 [ 69.023968] ? __lockdep_init_map+0x105/0x590 [ 69.028470] ? kasan_check_write+0x14/0x20 [ 69.032701] ? __init_rwsem+0x1cc/0x2a0 [ 69.036681] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 69.041705] ? rcu_read_lock_sched_held+0x108/0x120 [ 69.046726] ? __kmalloc_track_caller+0x5f5/0x760 [ 69.051569] ? save_stack+0xa9/0xd0 [ 69.055199] ? save_stack+0x43/0xd0 [ 69.058827] ? kasan_kmalloc+0xc4/0xe0 [ 69.062715] ? memcpy+0x45/0x50 [ 69.065995] v9fs_session_init+0x21a/0x1a80 [ 69.070315] ? find_held_lock+0x36/0x1c0 [ 69.074373] ? v9fs_show_options+0x7e0/0x7e0 [ 69.078773] ? kasan_check_read+0x11/0x20 [ 69.082907] ? rcu_is_watching+0x8c/0x150 [ 69.087042] ? rcu_pm_notify+0xc0/0xc0 [ 69.090929] ? rcu_pm_notify+0xc0/0xc0 [ 69.094817] ? v9fs_mount+0x61/0x900 [ 69.098522] ? rcu_read_lock_sched_held+0x108/0x120 [ 69.103535] ? kmem_cache_alloc_trace+0x616/0x780 [ 69.108400] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 69.113945] v9fs_mount+0x7c/0x900 [ 69.117499] mount_fs+0xae/0x328 [ 69.120873] vfs_kern_mount.part.34+0xdc/0x4e0 [ 69.125456] ? may_umount+0xb0/0xb0 [ 69.129087] ? _raw_read_unlock+0x22/0x30 [ 69.133240] ? __get_fs_type+0x97/0xc0 [ 69.137122] do_mount+0x581/0x30e0 [ 69.140653] ? do_raw_spin_unlock+0xa7/0x2f0 [ 69.145063] ? copy_mount_string+0x40/0x40 [ 69.149292] ? copy_mount_options+0x5f/0x380 [ 69.153699] ? rcu_read_lock_sched_held+0x108/0x120 [ 69.158722] ? kmem_cache_alloc_trace+0x616/0x780 [ 69.163583] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 69.169116] ? _copy_from_user+0xdf/0x150 [ 69.173275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 69.178809] ? copy_mount_options+0x285/0x380 [ 69.183309] __ia32_compat_sys_mount+0x5d5/0x860 [ 69.188071] do_fast_syscall_32+0x34d/0xfb2 [ 69.192404] ? do_int80_syscall_32+0x890/0x890 [ 69.197002] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 69.201771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 69.207309] ? syscall_return_slowpath+0x31d/0x5e0 [ 69.212259] ? sysret32_from_system_call+0x5/0x46 [ 69.217120] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 69.221966] entry_SYSENTER_compat+0x70/0x7f [ 69.226370] RIP: 0023:0xf7f84cb9 [ 69.229716] Code: 55 08 8b 88 64 cd ff ff 8b 98 68 cd ff ff 89 c8 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 1c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 69.248929] RSP: 002b:00000000ff9d502c EFLAGS: 00000286 ORIG_RAX: 0000000000000015 [ 69.256634] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000200000c0 [ 69.263912] RDX: 0000000020000100 RSI: 0000000000000000 RDI: 0000000020000680 [ 69.271184] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 69.278475] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 69.285738] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 69.293035] [ 69.294666] Allocated by task 4891: [ 69.298288] save_stack+0x43/0xd0 [ 69.301730] kasan_kmalloc+0xc4/0xe0 [ 69.305452] __kmalloc+0x14e/0x760 [ 69.308999] p9_fcall_alloc+0x1e/0x90 [ 69.312805] p9_client_prepare_req.part.8+0x754/0xcd0 [ 69.318005] p9_client_rpc+0x1bd/0x1400 [ 69.321976] p9_client_create+0xd09/0x16c9 [ 69.326222] v9fs_session_init+0x21a/0x1a80 [ 69.330554] v9fs_mount+0x7c/0x900 [ 69.334091] mount_fs+0xae/0x328 [ 69.337460] vfs_kern_mount.part.34+0xdc/0x4e0 [ 69.342049] do_mount+0x581/0x30e0 [ 69.345595] __ia32_compat_sys_mount+0x5d5/0x860 [ 69.350357] do_fast_syscall_32+0x34d/0xfb2 [ 69.354684] entry_SYSENTER_compat+0x70/0x7f [ 69.359076] [ 69.360691] Freed by task 0: [ 69.363692] (stack is not available) [ 69.367393] [ 69.369015] The buggy address belongs to the object at ffff8801d49f2a40 [ 69.369015] which belongs to the cache kmalloc-16384 of size 16384 [ 69.382042] The buggy address is located 45 bytes inside of [ 69.382042] 16384-byte region [ffff8801d49f2a40, ffff8801d49f6a40) [ 69.394010] The buggy address belongs to the page: [ 69.398932] page:ffffea0007527c00 count:1 mapcount:0 mapping:ffff8801da802200 index:0x0 compound_mapcount: 0 [ 69.408890] flags: 0x2fffc0000008100(slab|head) [ 69.413551] raw: 02fffc0000008100 ffffea0007510a08 ffff8801da801c48 ffff8801da802200 [ 69.421422] raw: 0000000000000000 ffff8801d49f2a40 0000000100000001 0000000000000000 [ 69.429297] page dumped because: kasan: bad access detected [ 69.434989] [ 69.436600] Memory state around the buggy address: [ 69.441513] ffff8801d49f4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 69.448860] ffff8801d49f4980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 69.456221] >ffff8801d49f4a00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 69.463571] ^ [ 69.470059] ffff8801d49f4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.477440] ffff8801d49f4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.484807] ================================================================== [ 69.492152] Disabling lock debugging due to kernel taint [ 69.498301] Kernel panic - not syncing: panic_on_warn set ... [ 69.498301] [ 69.505722] CPU: 0 PID: 4891 Comm: syz-executor0 Tainted: G B 4.18.0-rc3+ #40 [ 69.514305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.523673] Call Trace: [ 69.526264] dump_stack+0x1c9/0x2b4 [ 69.529897] ? dump_stack_print_info.cold.2+0x52/0x52 [ 69.535107] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 69.539861] panic+0x238/0x4e7 [ 69.543048] ? add_taint.cold.5+0x16/0x16 [ 69.547205] ? do_raw_spin_unlock+0xa7/0x2f0 [ 69.551621] ? pdu_read+0x90/0xd0 [ 69.555078] kasan_end_report+0x47/0x4f [ 69.559061] kasan_report.cold.7+0x76/0x2fe [ 69.563399] check_memory_region+0x13e/0x1b0 [ 69.567810] memcpy+0x23/0x50 [ 69.570923] pdu_read+0x90/0xd0 [ 69.574201] p9pdu_readf+0x579/0x2170 [ 69.577998] ? p9pdu_writef+0xe0/0xe0 [ 69.581796] ? __fget+0x414/0x670 [ 69.585241] ? rcu_is_watching+0x61/0x150 [ 69.589384] ? expand_files.part.8+0x9c0/0x9c0 [ 69.593960] ? rcu_read_lock_sched_held+0x108/0x120 [ 69.598974] ? p9_fd_show_options+0x1c0/0x1c0 [ 69.603468] p9_client_create+0xde0/0x16c9 [ 69.607708] ? p9_client_read+0xc60/0xc60 [ 69.611957] ? find_held_lock+0x36/0x1c0 [ 69.616038] ? __lockdep_init_map+0x105/0x590 [ 69.620529] ? kasan_check_write+0x14/0x20 [ 69.624752] ? __init_rwsem+0x1cc/0x2a0 [ 69.628717] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 69.633722] ? rcu_read_lock_sched_held+0x108/0x120 [ 69.638810] ? __kmalloc_track_caller+0x5f5/0x760 [ 69.643652] ? save_stack+0xa9/0xd0 [ 69.647283] ? save_stack+0x43/0xd0 [ 69.650893] ? kasan_kmalloc+0xc4/0xe0 [ 69.654801] ? memcpy+0x45/0x50 [ 69.658088] v9fs_session_init+0x21a/0x1a80 [ 69.662926] ? find_held_lock+0x36/0x1c0 [ 69.667014] ? v9fs_show_options+0x7e0/0x7e0 [ 69.671446] ? kasan_check_read+0x11/0x20 [ 69.675594] ? rcu_is_watching+0x8c/0x150 [ 69.679740] ? rcu_pm_notify+0xc0/0xc0 [ 69.683619] ? rcu_pm_notify+0xc0/0xc0 [ 69.687500] ? v9fs_mount+0x61/0x900 [ 69.691202] ? rcu_read_lock_sched_held+0x108/0x120 [ 69.696225] ? kmem_cache_alloc_trace+0x616/0x780 [ 69.701067] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 69.706604] v9fs_mount+0x7c/0x900 [ 69.710142] mount_fs+0xae/0x328 [ 69.713510] vfs_kern_mount.part.34+0xdc/0x4e0 [ 69.718080] ? may_umount+0xb0/0xb0 [ 69.721710] ? _raw_read_unlock+0x22/0x30 [ 69.725850] ? __get_fs_type+0x97/0xc0 [ 69.729743] do_mount+0x581/0x30e0 [ 69.733275] ? do_raw_spin_unlock+0xa7/0x2f0 [ 69.737673] ? copy_mount_string+0x40/0x40 [ 69.741908] ? copy_mount_options+0x5f/0x380 [ 69.746318] ? rcu_read_lock_sched_held+0x108/0x120 [ 69.751348] ? kmem_cache_alloc_trace+0x616/0x780 [ 69.756190] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 69.761730] ? _copy_from_user+0xdf/0x150 [ 69.765879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 69.771403] ? copy_mount_options+0x285/0x380 [ 69.775891] __ia32_compat_sys_mount+0x5d5/0x860 [ 69.780650] do_fast_syscall_32+0x34d/0xfb2 [ 69.784971] ? do_int80_syscall_32+0x890/0x890 [ 69.789551] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 69.794324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 69.799862] ? syscall_return_slowpath+0x31d/0x5e0 [ 69.804791] ? sysret32_from_system_call+0x5/0x46 [ 69.809634] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 69.814469] entry_SYSENTER_compat+0x70/0x7f [ 69.818862] RIP: 0023:0xf7f84cb9 [ 69.822900] Code: 55 08 8b 88 64 cd ff ff 8b 98 68 cd ff ff 89 c8 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 1c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 69.842071] RSP: 002b:00000000ff9d502c EFLAGS: 00000286 ORIG_RAX: 0000000000000015 [ 69.849780] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000200000c0 [ 69.857041] RDX: 0000000020000100 RSI: 0000000000000000 RDI: 0000000020000680 [ 69.864298] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 69.871556] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 69.878820] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 69.886978] Dumping ftrace buffer: [ 69.890543] (ftrace buffer empty) [ 69.894249] Kernel Offset: disabled [ 69.897889] Rebooting in 86400 seconds..