[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 26.869678] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 30.421492] random: sshd: uninitialized urandom read (32 bytes read) [ 30.839880] random: sshd: uninitialized urandom read (32 bytes read) [ 31.439362] random: sshd: uninitialized urandom read (32 bytes read) [ 95.898069] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.60' (ECDSA) to the list of known hosts. [ 101.579270] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/12 22:41:24 parsed 1 programs [ 102.876426] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/12 22:41:26 executed programs: 0 [ 104.606146] IPVS: ftp: loaded support on port[0] = 21 [ 104.626787] IPVS: ftp: loaded support on port[0] = 21 [ 104.640013] IPVS: ftp: loaded support on port[0] = 21 [ 104.650608] IPVS: ftp: loaded support on port[0] = 21 [ 104.662486] IPVS: ftp: loaded support on port[0] = 21 [ 104.670026] ================================================================== [ 104.677533] BUG: KASAN: slab-out-of-bounds in mqueue_get_tree+0x2a2/0x2e0 [ 104.684463] Read of size 8 at addr ffff8801d7d6a9e8 by task syz-executor1/5639 [ 104.691812] [ 104.693428] CPU: 1 PID: 5639 Comm: syz-executor1 Not tainted 4.19.0-rc3-next-20180912+ #72 [ 104.701818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.711162] Call Trace: [ 104.711189] dump_stack+0x1d3/0x2c4 [ 104.711208] ? dump_stack_print_info.cold.2+0x52/0x52 [ 104.711222] ? printk+0xa7/0xcf [ 104.711237] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 104.711261] print_address_description.cold.8+0x9/0x1ff [ 104.711276] kasan_report.cold.9+0x242/0x309 [ 104.717590] ? mqueue_get_tree+0x2a2/0x2e0 [ 104.726065] __asan_report_load8_noabort+0x14/0x20 [ 104.736169] mqueue_get_tree+0x2a2/0x2e0 [ 104.744803] vfs_get_tree+0x1cb/0x5c0 [ 104.753810] mq_create_mount+0xe3/0x190 [ 104.761561] mq_init_ns+0x15a/0x210 [ 104.761575] copy_ipcs+0x3d2/0x580 [ 104.761590] ? ipcns_get+0xe0/0xe0 [ 104.761609] ? do_mount+0x1db0/0x1db0 [ 104.761622] ? kmem_cache_alloc+0x33a/0x730 [ 104.761643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.768837] ? perf_event_namespaces+0x136/0x400 [ 104.768859] create_new_namespaces+0x376/0x900 [ 104.768882] ? sys_ni_syscall+0x20/0x20 [ 104.768899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.768914] ? ns_capable_common+0x13f/0x170 [ 104.768933] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 104.776261] ksys_unshare+0x79c/0x10b0 [ 104.786101] ? walk_process_tree+0x440/0x440 [ 104.795427] ? lock_downgrade+0x900/0x900 [ 104.804926] ? kasan_check_read+0x11/0x20 [ 104.814248] ? do_raw_spin_unlock+0xa7/0x2f0 [ 104.822527] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 104.822549] ? kasan_check_write+0x14/0x20 [ 104.822562] ? do_raw_read_unlock+0x3f/0x60 [ 104.822579] ? do_syscall_64+0x9a/0x820 [ 104.822593] ? do_syscall_64+0x9a/0x820 [ 104.822613] ? lockdep_hardirqs_on+0x421/0x5c0 [ 104.835834] ? trace_hardirqs_on+0xbd/0x310 [ 104.844632] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.852915] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 104.861440] ? __ia32_sys_prlimit64+0x8c0/0x8c0 [ 104.861465] __x64_sys_unshare+0x31/0x40 [ 104.861482] do_syscall_64+0x1b9/0x820 [ 104.861498] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 104.861515] ? syscall_return_slowpath+0x5e0/0x5e0 [ 104.861534] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 104.871214] ? trace_hardirqs_on_caller+0x310/0x310 [ 104.881348] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 104.881366] ? prepare_exit_to_usermode+0x291/0x3b0 [ 104.881389] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 104.881413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.881429] RIP: 0033:0x459d87 [ 104.889366] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 104.889375] RSP: 002b:00007fff7e8eae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 104.889392] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459d87 [ 104.889402] RDX: 0000000000000000 RSI: 00007fff7e8eaea0 RDI: 0000000008000000 [ 104.889410] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000018 [ 104.889419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000412c30 [ 104.889427] R13: 0000000000412cc0 R14: 0000000000000000 R15: 0000000000000000 [ 104.889450] [ 104.899727] Allocated by task 5639: [ 104.899745] save_stack+0x43/0xd0 [ 104.899756] kasan_kmalloc+0xc7/0xe0 [ 104.899767] kmem_cache_alloc_trace+0x152/0x750 [ 104.899777] copy_ipcs+0x1c6/0x580 [ 104.899790] create_new_namespaces+0x376/0x900 [ 104.899808] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 104.904718] kobject: 'rx-0' (00000000e0012a36): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 104.909689] ksys_unshare+0x79c/0x10b0 [ 104.909709] __x64_sys_unshare+0x31/0x40 [ 104.909722] do_syscall_64+0x1b9/0x820 [ 104.909736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.909740] [ 104.909746] Freed by task 0: [ 104.909756] (stack is not available) [ 104.921839] kobject: 'tx-0' (000000009f596c9b): kobject_add_internal: parent: 'queues', set: 'queues' [ 104.924607] [ 104.930538] kobject: 'tx-0' (000000009f596c9b): kobject_uevent_env [ 104.932983] The buggy address belongs to the object at ffff8801d7d6a2c0 [ 104.932983] which belongs to the cache kmalloc-2048 of size 2048 [ 104.952820] kobject: 'tx-0' (000000009f596c9b): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 104.959951] The buggy address is located 1832 bytes inside of [ 104.959951] 2048-byte region [ffff8801d7d6a2c0, ffff8801d7d6aac0) [ 104.959957] The buggy address belongs to the page: [ 104.959970] page:ffffea00075f5a80 count:1 mapcount:0 mapping:ffff8801da800c40 index:0x0 compound_mapcount: 0 [ 104.959989] flags: 0x2fffc0000008100(slab|head) [ 104.960008] raw: 02fffc0000008100 ffffea0006eb5488 ffffea0007608688 ffff8801da800c40 [ 104.960024] raw: 0000000000000000 ffff8801d7d6a2c0 0000000100000003 0000000000000000 [ 104.968848] kobject: 'lo' (00000000fb4ef3d3): kobject_add_internal: parent: 'net', set: 'devices' [ 104.974554] page dumped because: kasan: bad access detected [ 104.974564] [ 104.988064] kobject: 'lo' (00000000fb4ef3d3): kobject_uevent_env [ 104.989100] Memory state around the buggy address: [ 104.989115] ffff8801d7d6a880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 104.989126] ffff8801d7d6a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 104.989137] >ffff8801d7d6a980: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 104.989143] ^ [ 104.989154] ffff8801d7d6aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.989164] ffff8801d7d6aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.989177] ================================================================== [ 104.996733] kobject: 'lo' (00000000fb4ef3d3): fill_kobj_path: path = '/devices/virtual/net/lo' [ 104.998097] Disabling lock debugging due to kernel taint [ 104.998284] Kernel panic - not syncing: panic_on_warn set ... [ 104.998284] [ 105.001870] kobject: 'queues' (000000001132bf79): kobject_add_internal: parent: 'lo', set: '' [ 105.005179] CPU: 1 PID: 5639 Comm: syz-executor1 Tainted: G B 4.19.0-rc3-next-20180912+ #72 [ 105.013587] kobject: 'queues' (000000001132bf79): kobject_uevent_env [ 105.017067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.022088] kobject: 'queues' (000000001132bf79): kobject_uevent_env: filter function caused the event to drop! [ 105.026555] Call Trace: [ 105.037053] kobject: 'rx-0' (000000001c07f1c1): kobject_add_internal: parent: 'queues', set: 'queues' [ 105.040406] dump_stack+0x1d3/0x2c4 [ 105.040422] ? dump_stack_print_info.cold.2+0x52/0x52 [ 105.040444] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 105.040463] panic+0x238/0x4e7 [ 105.045792] kobject: 'rx-0' (000000001c07f1c1): kobject_uevent_env [ 105.048399] ? add_taint.cold.5+0x16/0x16 [ 105.048418] ? trace_hardirqs_on+0x9a/0x310 [ 105.048431] ? trace_hardirqs_on+0xb4/0x310 [ 105.048450] ? trace_hardirqs_on+0xb4/0x310 [ 105.053772] kobject: 'rx-0' (000000001c07f1c1): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 105.055255] kasan_end_report+0x47/0x4f [ 105.058332] kobject: 'tx-0' (000000009a8cd091): kobject_add_internal: parent: 'queues', set: 'queues' [ 105.061954] kasan_report.cold.9+0x76/0x309 [ 105.061969] ? mqueue_get_tree+0x2a2/0x2e0 [ 105.061984] __asan_report_load8_noabort+0x14/0x20 [ 105.062002] mqueue_get_tree+0x2a2/0x2e0 [ 105.074106] kobject: 'tx-0' (000000009a8cd091): kobject_uevent_env [ 105.079310] vfs_get_tree+0x1cb/0x5c0 [ 105.079328] mq_create_mount+0xe3/0x190 [ 105.079351] mq_init_ns+0x15a/0x210 [ 105.079373] copy_ipcs+0x3d2/0x580 [ 105.092784] kobject: 'tx-0' (000000009a8cd091): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 105.102174] ? ipcns_get+0xe0/0xe0 [ 105.102189] ? do_mount+0x1db0/0x1db0 [ 105.102200] ? kmem_cache_alloc+0x33a/0x730 [ 105.102215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 105.102227] ? perf_event_namespaces+0x136/0x400 [ 105.102242] create_new_namespaces+0x376/0x900 [ 105.102267] ? sys_ni_syscall+0x20/0x20 [ 105.115989] kobject: 'lo' (00000000a8415246): kobject_add_internal: parent: 'net', set: 'devices' [ 105.119282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 105.119297] ? ns_capable_common+0x13f/0x170 [ 105.119321] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 105.130717] kobject: 'lo' (00000000a8415246): kobject_uevent_env [ 105.133958] ksys_unshare+0x79c/0x10b0 [ 105.142357] kobject: 'lo' (00000000a8415246): fill_kobj_path: path = '/devices/virtual/net/lo' [ 105.149718] ? walk_process_tree+0x440/0x440 [ 105.149734] ? lock_downgrade+0x900/0x900 [ 105.149750] ? kasan_check_read+0x11/0x20 [ 105.149763] ? do_raw_spin_unlock+0xa7/0x2f0 [ 105.149781] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 105.159427] kobject: 'queues' (00000000abbcb57c): kobject_add_internal: parent: 'lo', set: '' [ 105.164523] ? kasan_check_write+0x14/0x20 [ 105.166167] kobject: 'queues' (00000000abbcb57c): kobject_uevent_env [ 105.172276] ? do_raw_read_unlock+0x3f/0x60 [ 105.172291] ? do_syscall_64+0x9a/0x820 [ 105.172302] ? do_syscall_64+0x9a/0x820 [ 105.172316] ? lockdep_hardirqs_on+0x421/0x5c0 [ 105.172331] ? trace_hardirqs_on+0xbd/0x310 [ 105.172356] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 105.179332] kobject: 'queues' (00000000abbcb57c): kobject_uevent_env: filter function caused the event to drop! [ 105.184639] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 105.192587] kobject: 'rx-0' (00000000e8159788): kobject_add_internal: parent: 'queues', set: 'queues' [ 105.199384] ? __ia32_sys_prlimit64+0x8c0/0x8c0 [ 105.199404] __x64_sys_unshare+0x31/0x40 [ 105.199421] do_syscall_64+0x1b9/0x820 [ 105.199442] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 105.206392] kobject: 'rx-0' (00000000e8159788): kobject_uevent_env [ 105.213550] ? syscall_return_slowpath+0x5e0/0x5e0 [ 105.213564] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 105.213582] ? trace_hardirqs_on_caller+0x310/0x310 [ 105.213601] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 105.223061] kobject: 'rx-0' (00000000e8159788): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 105.228321] ? prepare_exit_to_usermode+0x291/0x3b0 [ 105.238046] kobject: 'tx-0' (00000000974764bc): kobject_add_internal: parent: 'queues', set: 'queues' [ 105.242885] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 105.242906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 105.242917] RIP: 0033:0x459d87 [ 105.242941] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 105.251048] kobject: 'tx-0' (00000000974764bc): kobject_uevent_env [ 105.259475] RSP: 002b:00007fff7e8eae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 105.259490] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459d87 [ 105.259498] RDX: 0000000000000000 RSI: 00007fff7e8eaea0 RDI: 0000000008000000 [ 105.259505] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000018 [ 105.259512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000412c30 [ 105.259520] R13: 0000000000412cc0 R14: 0000000000000000 R15: 0000000000000000 [ 105.270193] Kernel Offset: disabled [ 105.740027] Rebooting in 86400 seconds..