[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 23.288691] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 26.351727] random: sshd: uninitialized urandom read (32 bytes read) [ 26.513991] random: sshd: uninitialized urandom read (32 bytes read) [ 27.032027] random: sshd: uninitialized urandom read (32 bytes read) [ 77.601014] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.60' (ECDSA) to the list of known hosts. [ 83.278736] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/04 06:00:44 parsed 1 programs [ 84.265653] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/04 06:00:45 executed programs: 0 [ 85.299655] IPVS: ftp: loaded support on port[0] = 21 [ 85.513467] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.519982] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.527710] device bridge_slave_0 entered promiscuous mode [ 85.544781] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.551334] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.558600] device bridge_slave_1 entered promiscuous mode [ 85.575612] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 85.592491] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 85.638108] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 85.657112] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 85.722973] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 85.730278] team0: Port device team_slave_0 added [ 85.746274] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 85.753393] team0: Port device team_slave_1 added [ 85.770397] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 85.788753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.807503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.827003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.956428] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.963023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.969951] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.976314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.434519] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 86.440642] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.462059] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 86.493509] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.540210] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 86.546709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.554300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.593403] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.044211] ================================================================== [ 87.051918] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 87.057967] Read of size 8 at addr ffff8801af000b70 by task syz-executor0/5017 [ 87.065310] [ 87.066921] CPU: 1 PID: 5017 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 87.075302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.084645] Call Trace: [ 87.087225] dump_stack+0x1c9/0x2b4 [ 87.090956] ? dump_stack_print_info.cold.2+0x52/0x52 [ 87.096218] ? printk+0xa7/0xcf [ 87.099492] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 87.104239] ? sock_i_ino+0x94/0xa0 [ 87.107851] print_address_description+0x6c/0x20b [ 87.112686] ? sock_i_ino+0x94/0xa0 [ 87.116303] kasan_report.cold.7+0x242/0x30d [ 87.120695] __asan_report_load8_noabort+0x14/0x20 [ 87.125688] sock_i_ino+0x94/0xa0 [ 87.129137] tipc_sk_fill_sock_diag+0x3be/0xdb0 [ 87.133795] ? tipc_diag_dump+0x30/0x30 [ 87.137752] ? tipc_getname+0x7f0/0x7f0 [ 87.141716] ? print_usage_bug+0xc0/0xc0 [ 87.145760] ? graph_lock+0x170/0x170 [ 87.149544] ? __lock_sock+0x203/0x360 [ 87.153414] ? find_held_lock+0x36/0x1c0 [ 87.157560] ? mark_held_locks+0xc9/0x160 [ 87.161693] ? __local_bh_enable_ip+0x161/0x230 [ 87.166343] ? __local_bh_enable_ip+0x161/0x230 [ 87.170994] ? lockdep_hardirqs_on+0x421/0x5c0 [ 87.175556] ? trace_hardirqs_on+0xbd/0x2c0 [ 87.179859] ? lock_release+0x9f0/0x9f0 [ 87.183818] ? lock_sock_nested+0xe7/0x120 [ 87.188037] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 87.193036] ? skb_put+0x17b/0x1e0 [ 87.196556] ? memset+0x31/0x40 [ 87.199878] ? __nlmsg_put+0x14c/0x1b0 [ 87.203764] __tipc_add_sock_diag+0x22f/0x360 [ 87.208244] tipc_nl_sk_walk+0x122/0x1d0 [ 87.212293] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 87.217555] tipc_diag_dump+0x24/0x30 [ 87.221336] netlink_dump+0x519/0xd50 [ 87.225123] ? netlink_broadcast+0x50/0x50 [ 87.229344] __netlink_dump_start+0x4f1/0x6f0 [ 87.233824] ? kasan_check_read+0x11/0x20 [ 87.237958] ? tipc_data_ready+0x3f0/0x3f0 [ 87.242184] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 87.247277] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 87.251931] ? tipc_data_ready+0x3f0/0x3f0 [ 87.256151] ? tipc_unregister_sysctl+0x20/0x20 [ 87.260805] ? tipc_ioctl+0x3b0/0x3b0 [ 87.264596] ? netlink_deliver_tap+0x356/0xfb0 [ 87.269189] sock_diag_rcv_msg+0x31d/0x410 [ 87.273415] netlink_rcv_skb+0x172/0x440 [ 87.277461] ? sock_diag_bind+0x80/0x80 [ 87.281421] ? netlink_ack+0xbe0/0xbe0 [ 87.285317] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 87.289981] sock_diag_rcv+0x2a/0x40 [ 87.293682] netlink_unicast+0x5a0/0x760 [ 87.297774] ? netlink_attachskb+0x9a0/0x9a0 [ 87.302177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.307702] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 87.312708] netlink_sendmsg+0xa18/0xfc0 [ 87.316757] ? netlink_unicast+0x760/0x760 [ 87.320977] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 87.325920] ? apparmor_socket_sendmsg+0x29/0x30 [ 87.330666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.336198] ? security_socket_sendmsg+0x94/0xc0 [ 87.340942] ? netlink_unicast+0x760/0x760 [ 87.345166] sock_sendmsg+0xd5/0x120 [ 87.348866] ___sys_sendmsg+0x7fd/0x930 [ 87.352834] ? copy_msghdr_from_user+0x580/0x580 [ 87.357588] ? _raw_spin_unlock_bh+0x30/0x40 [ 87.362040] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 87.367137] ? do_raw_spin_unlock+0xa7/0x2f0 [ 87.371537] ? __release_sock+0x276/0x3a0 [ 87.375690] ? __fget_light+0x2f7/0x440 [ 87.379652] ? __local_bh_enable_ip+0x161/0x230 [ 87.384307] ? fget_raw+0x20/0x20 [ 87.387750] ? __release_sock+0x3a0/0x3a0 [ 87.391886] ? tipc_nametbl_build_group+0x279/0x360 [ 87.396891] ? tipc_setsockopt+0x726/0xd70 [ 87.401127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 87.406652] ? sockfd_lookup_light+0xc5/0x160 [ 87.411136] __sys_sendmsg+0x11d/0x290 [ 87.415009] ? __ia32_sys_shutdown+0x80/0x80 [ 87.419572] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 87.425117] ? fput+0x130/0x1a0 [ 87.428387] ? __x64_sys_futex+0x47f/0x6a0 [ 87.432627] ? do_syscall_64+0x9a/0x820 [ 87.436596] ? do_syscall_64+0x9a/0x820 [ 87.440579] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 87.445690] __x64_sys_sendmsg+0x78/0xb0 [ 87.449745] do_syscall_64+0x1b9/0x820 [ 87.453649] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 87.459008] ? syscall_return_slowpath+0x5e0/0x5e0 [ 87.463925] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 87.468926] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 87.473926] ? recalc_sigpending_tsk+0x180/0x180 [ 87.478667] ? kasan_check_write+0x14/0x20 [ 87.482892] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 87.487726] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.492902] RIP: 0033:0x457099 [ 87.496083] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 87.514997] RSP: 002b:00007fccc1937c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 87.522690] RAX: ffffffffffffffda RBX: 00007fccc19386d4 RCX: 0000000000457099 [ 87.529984] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 87.537259] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 87.544513] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 87.551768] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000000 [ 87.559025] [ 87.560653] Allocated by task 5017: [ 87.564280] save_stack+0x43/0xd0 [ 87.567718] kasan_kmalloc+0xc4/0xe0 [ 87.571413] kasan_slab_alloc+0x12/0x20 [ 87.575373] kmem_cache_alloc+0x12e/0x710 [ 87.579503] sock_alloc_inode+0x1d/0x260 [ 87.583546] alloc_inode+0x63/0x190 [ 87.587168] new_inode_pseudo+0x71/0x1a0 [ 87.591212] sock_alloc+0x41/0x270 [ 87.594734] __sock_create+0x175/0x940 [ 87.598610] __sys_socket+0x106/0x260 [ 87.602392] __x64_sys_socket+0x73/0xb0 [ 87.606349] do_syscall_64+0x1b9/0x820 [ 87.610222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.615389] [ 87.616998] Freed by task 5016: [ 87.620265] save_stack+0x43/0xd0 [ 87.623701] __kasan_slab_free+0x11a/0x170 [ 87.627917] kasan_slab_free+0xe/0x10 [ 87.631714] kmem_cache_free+0x86/0x280 [ 87.635674] sock_destroy_inode+0x51/0x60 [ 87.639807] destroy_inode+0x159/0x200 [ 87.643680] evict+0x5d5/0x990 [ 87.646861] iput+0x5fa/0xa00 [ 87.649952] dentry_unlink_inode+0x461/0x5e0 [ 87.654345] __dentry_kill+0x44c/0x7a0 [ 87.658216] dentry_kill+0xc9/0x5a0 [ 87.661835] dput.part.26+0x66b/0x7a0 [ 87.665659] dput+0x15/0x20 [ 87.668582] __fput+0x505/0xa80 [ 87.671852] ____fput+0x15/0x20 [ 87.675123] task_work_run+0x1e8/0x2a0 [ 87.678996] exit_to_usermode_loop+0x318/0x380 [ 87.683572] do_syscall_64+0x6be/0x820 [ 87.687460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.692627] [ 87.694261] The buggy address belongs to the object at ffff8801af000b00 [ 87.694261] which belongs to the cache sock_inode_cache(17:syz0) of size 984 [ 87.708131] The buggy address is located 112 bytes inside of [ 87.708131] 984-byte region [ffff8801af000b00, ffff8801af000ed8) [ 87.719992] The buggy address belongs to the page: [ 87.724923] page:ffffea0006bc0000 count:1 mapcount:0 mapping:ffff8801c5869780 index:0xffff8801af000ffd [ 87.734362] flags: 0x2fffc0000000100(slab) [ 87.738594] raw: 02fffc0000000100 ffffea0006bdff88 ffffea0006bdf948 ffff8801c5869780 [ 87.746469] raw: ffff8801af000ffd ffff8801af000200 0000000100000003 ffff8801b0f4abc0 [ 87.754331] page dumped because: kasan: bad access detected [ 87.760028] page->mem_cgroup:ffff8801b0f4abc0 [ 87.764507] [ 87.766115] Memory state around the buggy address: [ 87.771027] ffff8801af000a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.778376] ffff8801af000a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.785723] >ffff8801af000b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.793069] ^ [ 87.800090] ffff8801af000b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.807450] ffff8801af000c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.814814] ================================================================== [ 87.822154] Disabling lock debugging due to kernel taint [ 87.827647] Kernel panic - not syncing: panic_on_warn set ... [ 87.827647] [ 87.835023] CPU: 1 PID: 5017 Comm: syz-executor0 Tainted: G B 4.19.0-rc2-next-20180904+ #55 [ 87.844827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.854160] Call Trace: [ 87.856733] dump_stack+0x1c9/0x2b4 [ 87.860345] ? dump_stack_print_info.cold.2+0x52/0x52 [ 87.865522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 87.870269] panic+0x238/0x4e7 [ 87.873451] ? add_taint.cold.5+0x16/0x16 [ 87.877588] ? trace_hardirqs_on+0xb4/0x2c0 [ 87.881915] ? trace_hardirqs_on+0x9a/0x2c0 [ 87.886222] ? sock_i_ino+0x94/0xa0 [ 87.889836] kasan_end_report+0x47/0x4f [ 87.893806] kasan_report.cold.7+0x76/0x30d [ 87.898119] __asan_report_load8_noabort+0x14/0x20 [ 87.903041] sock_i_ino+0x94/0xa0 [ 87.906486] tipc_sk_fill_sock_diag+0x3be/0xdb0 [ 87.911139] ? tipc_diag_dump+0x30/0x30 [ 87.915106] ? tipc_getname+0x7f0/0x7f0 [ 87.919066] ? print_usage_bug+0xc0/0xc0 [ 87.923117] ? graph_lock+0x170/0x170 [ 87.926903] ? __lock_sock+0x203/0x360 [ 87.930805] ? find_held_lock+0x36/0x1c0 [ 87.934852] ? mark_held_locks+0xc9/0x160 [ 87.938982] ? __local_bh_enable_ip+0x161/0x230 [ 87.943633] ? __local_bh_enable_ip+0x161/0x230 [ 87.948286] ? lockdep_hardirqs_on+0x421/0x5c0 [ 87.952851] ? trace_hardirqs_on+0xbd/0x2c0 [ 87.957378] ? lock_release+0x9f0/0x9f0 [ 87.961337] ? lock_sock_nested+0xe7/0x120 [ 87.965571] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 87.970584] ? skb_put+0x17b/0x1e0 [ 87.974136] ? memset+0x31/0x40 [ 87.977398] ? __nlmsg_put+0x14c/0x1b0 [ 87.981274] __tipc_add_sock_diag+0x22f/0x360 [ 87.985755] tipc_nl_sk_walk+0x122/0x1d0 [ 87.989816] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 87.995077] tipc_diag_dump+0x24/0x30 [ 87.998873] netlink_dump+0x519/0xd50 [ 88.002657] ? netlink_broadcast+0x50/0x50 [ 88.006879] __netlink_dump_start+0x4f1/0x6f0 [ 88.011356] ? kasan_check_read+0x11/0x20 [ 88.015486] ? tipc_data_ready+0x3f0/0x3f0 [ 88.019706] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 88.024797] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 88.029445] ? tipc_data_ready+0x3f0/0x3f0 [ 88.033661] ? tipc_unregister_sysctl+0x20/0x20 [ 88.038316] ? tipc_ioctl+0x3b0/0x3b0 [ 88.042120] ? netlink_deliver_tap+0x356/0xfb0 [ 88.046689] sock_diag_rcv_msg+0x31d/0x410 [ 88.050907] netlink_rcv_skb+0x172/0x440 [ 88.054950] ? sock_diag_bind+0x80/0x80 [ 88.058908] ? netlink_ack+0xbe0/0xbe0 [ 88.062781] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 88.067433] sock_diag_rcv+0x2a/0x40 [ 88.071155] netlink_unicast+0x5a0/0x760 [ 88.075204] ? netlink_attachskb+0x9a0/0x9a0 [ 88.079602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.085129] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 88.090131] netlink_sendmsg+0xa18/0xfc0 [ 88.094180] ? netlink_unicast+0x760/0x760 [ 88.098405] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 88.103329] ? apparmor_socket_sendmsg+0x29/0x30 [ 88.108066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.113592] ? security_socket_sendmsg+0x94/0xc0 [ 88.118334] ? netlink_unicast+0x760/0x760 [ 88.122559] sock_sendmsg+0xd5/0x120 [ 88.126266] ___sys_sendmsg+0x7fd/0x930 [ 88.130247] ? copy_msghdr_from_user+0x580/0x580 [ 88.134986] ? _raw_spin_unlock_bh+0x30/0x40 [ 88.139379] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 88.144464] ? do_raw_spin_unlock+0xa7/0x2f0 [ 88.148873] ? __release_sock+0x276/0x3a0 [ 88.153004] ? __fget_light+0x2f7/0x440 [ 88.156961] ? __local_bh_enable_ip+0x161/0x230 [ 88.161615] ? fget_raw+0x20/0x20 [ 88.165070] ? __release_sock+0x3a0/0x3a0 [ 88.169202] ? tipc_nametbl_build_group+0x279/0x360 [ 88.174202] ? tipc_setsockopt+0x726/0xd70 [ 88.178424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 88.183950] ? sockfd_lookup_light+0xc5/0x160 [ 88.188438] __sys_sendmsg+0x11d/0x290 [ 88.192310] ? __ia32_sys_shutdown+0x80/0x80 [ 88.196702] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 88.202221] ? fput+0x130/0x1a0 [ 88.205485] ? __x64_sys_futex+0x47f/0x6a0 [ 88.209721] ? do_syscall_64+0x9a/0x820 [ 88.213681] ? do_syscall_64+0x9a/0x820 [ 88.217640] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 88.222727] __x64_sys_sendmsg+0x78/0xb0 [ 88.226773] do_syscall_64+0x1b9/0x820 [ 88.230647] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 88.235994] ? syscall_return_slowpath+0x5e0/0x5e0 [ 88.240905] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 88.245905] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 88.250904] ? recalc_sigpending_tsk+0x180/0x180 [ 88.255643] ? kasan_check_write+0x14/0x20 [ 88.259863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 88.264693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 88.269862] RIP: 0033:0x457099 [ 88.273039] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 88.291923] RSP: 002b:00007fccc1937c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 88.299616] RAX: ffffffffffffffda RBX: 00007fccc19386d4 RCX: 0000000000457099 [ 88.306866] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 88.314123] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 88.321374] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 88.328628] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000000 [ 88.336286] Dumping ftrace buffer: [ 88.339811] (ftrace buffer empty) [ 88.343501] Kernel Offset: disabled [ 88.347112] Rebooting in 86400 seconds..