[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 26.008256] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 30.358919] random: sshd: uninitialized urandom read (32 bytes read) [ 30.761994] random: sshd: uninitialized urandom read (32 bytes read) [ 31.345458] random: sshd: uninitialized urandom read (32 bytes read) [ 88.953179] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.223' (ECDSA) to the list of known hosts. [ 94.519829] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/10 11:50:48 parsed 1 programs [ 95.701672] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/10 11:50:49 executed programs: 0 [ 96.567897] IPVS: ftp: loaded support on port[0] = 21 [ 96.817585] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.824803] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.832116] device bridge_slave_0 entered promiscuous mode [ 96.849914] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.856402] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.863694] device bridge_slave_1 entered promiscuous mode [ 96.881027] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 96.898287] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 96.947854] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 96.968559] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 97.041662] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 97.048896] team0: Port device team_slave_0 added [ 97.065427] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 97.072684] team0: Port device team_slave_1 added [ 97.089908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 97.113242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.132377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.153792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 97.295354] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.301839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.308722] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.315134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.828183] 8021q: adding VLAN 0 to HW filter on device bond0 [ 97.881641] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 97.935547] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 97.942114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.949300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 98.003326] 8021q: adding VLAN 0 to HW filter on device team0 [ 98.359304] ================================================================== [ 98.366810] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 98.372767] Read of size 8 at addr ffff8801b67d50f0 by task syz-executor0/5645 [ 98.380112] [ 98.381734] CPU: 1 PID: 5645 Comm: syz-executor0 Not tainted 4.19.0-rc3+ #8 [ 98.388859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.398202] Call Trace: [ 98.400783] dump_stack+0x1c4/0x2b4 [ 98.404405] ? dump_stack_print_info.cold.2+0x52/0x52 [ 98.409583] ? printk+0xa7/0xcf [ 98.412852] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 98.417600] print_address_description.cold.8+0x9/0x1ff [ 98.422953] kasan_report.cold.9+0x242/0x309 [ 98.427353] ? sock_i_ino+0x94/0xa0 [ 98.430974] __asan_report_load8_noabort+0x14/0x20 [ 98.435920] sock_i_ino+0x94/0xa0 [ 98.439367] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 98.444038] ? tipc_diag_dump+0x30/0x30 [ 98.448015] ? tipc_getname+0x7f0/0x7f0 [ 98.451989] ? graph_lock+0x170/0x170 [ 98.455786] ? __lock_sock+0x203/0x350 [ 98.459667] ? find_held_lock+0x36/0x1c0 [ 98.463718] ? mark_held_locks+0xc7/0x130 [ 98.467854] ? __local_bh_enable_ip+0x160/0x260 [ 98.472509] ? __local_bh_enable_ip+0x160/0x260 [ 98.477168] ? lockdep_hardirqs_on+0x421/0x5c0 [ 98.481737] ? trace_hardirqs_on+0xbd/0x310 [ 98.486044] ? lock_release+0x970/0x970 [ 98.490017] ? lock_sock_nested+0xe2/0x120 [ 98.494254] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 98.499255] ? skb_put+0x17b/0x1e0 [ 98.502779] ? memset+0x31/0x40 [ 98.506055] ? __nlmsg_put+0x14c/0x1b0 [ 98.509938] __tipc_add_sock_diag+0x233/0x360 [ 98.514496] tipc_nl_sk_walk+0x122/0x1d0 [ 98.518603] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 98.523878] tipc_diag_dump+0x24/0x30 [ 98.527667] netlink_dump+0x519/0xd50 [ 98.531458] ? netlink_broadcast+0x50/0x50 [ 98.535689] __netlink_dump_start+0x4f1/0x6f0 [ 98.540171] ? tipc_data_ready+0x3e0/0x3e0 [ 98.544409] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 98.549516] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 98.554182] ? tipc_data_ready+0x3e0/0x3e0 [ 98.558411] ? tipc_unregister_sysctl+0x20/0x20 [ 98.563080] ? tipc_ioctl+0x3a0/0x3a0 [ 98.566871] ? netlink_deliver_tap+0x355/0xf80 [ 98.571445] sock_diag_rcv_msg+0x31d/0x410 [ 98.575679] netlink_rcv_skb+0x172/0x440 [ 98.579741] ? sock_diag_bind+0x80/0x80 [ 98.583717] ? netlink_ack+0xb80/0xb80 [ 98.587612] sock_diag_rcv+0x2a/0x40 [ 98.591328] netlink_unicast+0x5a5/0x760 [ 98.595398] ? netlink_attachskb+0x9a0/0x9a0 [ 98.599813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.605356] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 98.610364] netlink_sendmsg+0xa18/0xfc0 [ 98.614439] ? netlink_unicast+0x760/0x760 [ 98.618682] ? smack_socket_sendmsg+0xb0/0x190 [ 98.623255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.628779] ? security_socket_sendmsg+0x94/0xc0 [ 98.633529] ? netlink_unicast+0x760/0x760 [ 98.637776] sock_sendmsg+0xd5/0x120 [ 98.641499] ___sys_sendmsg+0x7fd/0x930 [ 98.645471] ? __local_bh_enable_ip+0x160/0x260 [ 98.650135] ? copy_msghdr_from_user+0x580/0x580 [ 98.654896] ? kasan_check_write+0x14/0x20 [ 98.659137] ? _raw_spin_unlock_bh+0x30/0x40 [ 98.663536] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 98.668981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.674509] ? release_sock+0x1ec/0x2c0 [ 98.678486] ? __fget_light+0x2e9/0x430 [ 98.682525] ? fget_raw+0x20/0x20 [ 98.685973] ? __release_sock+0x3a0/0x3a0 [ 98.690111] ? tipc_nametbl_build_group+0x273/0x360 [ 98.695117] ? tipc_setsockopt+0x726/0xd70 [ 98.699346] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 98.704877] ? sockfd_lookup_light+0xc5/0x160 [ 98.709402] __sys_sendmsg+0x11d/0x280 [ 98.713306] ? __ia32_sys_shutdown+0x80/0x80 [ 98.717733] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 98.723255] ? fput+0x130/0x1a0 [ 98.726527] ? __x64_sys_futex+0x47f/0x6a0 [ 98.730759] ? do_syscall_64+0x9a/0x820 [ 98.734731] ? do_syscall_64+0x9a/0x820 [ 98.738716] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 98.744159] __x64_sys_sendmsg+0x78/0xb0 [ 98.748222] do_syscall_64+0x1b9/0x820 [ 98.752111] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 98.757462] ? syscall_return_slowpath+0x5e0/0x5e0 [ 98.762381] ? trace_hardirqs_on_caller+0x310/0x310 [ 98.767385] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 98.772389] ? recalc_sigpending_tsk+0x180/0x180 [ 98.777134] ? kasan_check_write+0x14/0x20 [ 98.781367] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 98.786209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 98.791387] RIP: 0033:0x457099 [ 98.794566] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 98.813508] RSP: 002b:00007f4ee5958c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 98.821208] RAX: ffffffffffffffda RBX: 00007f4ee59596d4 RCX: 0000000000457099 [ 98.828471] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 98.835730] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 98.843026] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 98.850301] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 98.857598] [ 98.859216] Allocated by task 5645: [ 98.862844] save_stack+0x43/0xd0 [ 98.866282] kasan_kmalloc+0xc7/0xe0 [ 98.869992] kasan_slab_alloc+0x12/0x20 [ 98.873952] kmem_cache_alloc+0x12e/0x730 [ 98.878093] sock_alloc_inode+0x1d/0x260 [ 98.882140] alloc_inode+0x63/0x190 [ 98.885750] new_inode_pseudo+0x71/0x1a0 [ 98.889852] sock_alloc+0x41/0x270 [ 98.893396] __sock_create+0x175/0x930 [ 98.897273] __sys_socket+0x106/0x260 [ 98.901059] __x64_sys_socket+0x73/0xb0 [ 98.905021] do_syscall_64+0x1b9/0x820 [ 98.908898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 98.914064] [ 98.915677] Freed by task 5644: [ 98.918940] save_stack+0x43/0xd0 [ 98.922377] __kasan_slab_free+0x102/0x150 [ 98.926598] kasan_slab_free+0xe/0x10 [ 98.930496] kmem_cache_free+0x83/0x290 [ 98.934467] sock_destroy_inode+0x51/0x60 [ 98.938622] destroy_inode+0x159/0x200 [ 98.942501] evict+0x5e0/0x980 [ 98.945689] iput+0x679/0xa90 [ 98.948801] dentry_unlink_inode+0x461/0x5e0 [ 98.953195] __dentry_kill+0x44c/0x7a0 [ 98.957073] dentry_kill+0xc9/0x5a0 [ 98.960688] dput.part.26+0x660/0x790 [ 98.964478] dput+0x15/0x20 [ 98.967397] __fput+0x4cf/0xa30 [ 98.970664] ____fput+0x15/0x20 [ 98.973931] task_work_run+0x1e8/0x2a0 [ 98.977803] exit_to_usermode_loop+0x318/0x380 [ 98.982370] do_syscall_64+0x6be/0x820 [ 98.986245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 98.991416] [ 98.993031] The buggy address belongs to the object at ffff8801b67d5080 [ 98.993031] which belongs to the cache sock_inode_cache(17:syz0) of size 984 [ 99.006934] The buggy address is located 112 bytes inside of [ 99.006934] 984-byte region [ffff8801b67d5080, ffff8801b67d5458) [ 99.018796] The buggy address belongs to the page: [ 99.023713] page:ffffea0006d9f540 count:1 mapcount:0 mapping:ffff8801caeed800 index:0xffff8801b67d5ffd [ 99.033142] flags: 0x2fffc0000000100(slab) [ 99.037366] raw: 02fffc0000000100 ffffea000706fdc8 ffffea000706eb88 ffff8801caeed800 [ 99.045238] raw: ffff8801b67d5ffd ffff8801b67d5080 0000000100000003 ffff8801b8118280 [ 99.053133] page dumped because: kasan: bad access detected [ 99.058872] page->mem_cgroup:ffff8801b8118280 [ 99.063353] [ 99.064964] Memory state around the buggy address: [ 99.069882] ffff8801b67d4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 99.077226] ffff8801b67d5000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 99.084573] >ffff8801b67d5080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 99.091979] ^ [ 99.099000] ffff8801b67d5100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 99.106352] ffff8801b67d5180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 99.113701] ================================================================== [ 99.121049] Disabling lock debugging due to kernel taint [ 99.126548] Kernel panic - not syncing: panic_on_warn set ... [ 99.126548] [ 99.133940] CPU: 1 PID: 5645 Comm: syz-executor0 Tainted: G B 4.19.0-rc3+ #8 [ 99.142424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.151763] Call Trace: [ 99.154349] dump_stack+0x1c4/0x2b4 [ 99.157961] ? dump_stack_print_info.cold.2+0x52/0x52 [ 99.163136] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 99.167884] panic+0x238/0x4e7 [ 99.171069] ? add_taint.cold.5+0x16/0x16 [ 99.175244] ? trace_hardirqs_on+0x9a/0x310 [ 99.179563] ? trace_hardirqs_on+0xb4/0x310 [ 99.183930] ? trace_hardirqs_on+0xb4/0x310 [ 99.188260] kasan_end_report+0x47/0x4f [ 99.192219] kasan_report.cold.9+0x76/0x309 [ 99.196528] ? sock_i_ino+0x94/0xa0 [ 99.200144] __asan_report_load8_noabort+0x14/0x20 [ 99.205096] sock_i_ino+0x94/0xa0 [ 99.208590] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 99.213250] ? tipc_diag_dump+0x30/0x30 [ 99.217250] ? tipc_getname+0x7f0/0x7f0 [ 99.221254] ? graph_lock+0x170/0x170 [ 99.225064] ? __lock_sock+0x203/0x350 [ 99.228954] ? find_held_lock+0x36/0x1c0 [ 99.233004] ? mark_held_locks+0xc7/0x130 [ 99.237142] ? __local_bh_enable_ip+0x160/0x260 [ 99.241796] ? __local_bh_enable_ip+0x160/0x260 [ 99.246453] ? lockdep_hardirqs_on+0x421/0x5c0 [ 99.251023] ? trace_hardirqs_on+0xbd/0x310 [ 99.255339] ? lock_release+0x970/0x970 [ 99.259329] ? lock_sock_nested+0xe2/0x120 [ 99.263596] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 99.268608] ? skb_put+0x17b/0x1e0 [ 99.272149] ? memset+0x31/0x40 [ 99.275413] ? __nlmsg_put+0x14c/0x1b0 [ 99.279287] __tipc_add_sock_diag+0x233/0x360 [ 99.283776] tipc_nl_sk_walk+0x122/0x1d0 [ 99.287821] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 99.293093] tipc_diag_dump+0x24/0x30 [ 99.296905] netlink_dump+0x519/0xd50 [ 99.300783] ? netlink_broadcast+0x50/0x50 [ 99.305006] __netlink_dump_start+0x4f1/0x6f0 [ 99.309494] ? tipc_data_ready+0x3e0/0x3e0 [ 99.313731] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 99.318829] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 99.323497] ? tipc_data_ready+0x3e0/0x3e0 [ 99.327718] ? tipc_unregister_sysctl+0x20/0x20 [ 99.332370] ? tipc_ioctl+0x3a0/0x3a0 [ 99.336155] ? netlink_deliver_tap+0x355/0xf80 [ 99.340722] sock_diag_rcv_msg+0x31d/0x410 [ 99.344945] netlink_rcv_skb+0x172/0x440 [ 99.348992] ? sock_diag_bind+0x80/0x80 [ 99.352953] ? netlink_ack+0xb80/0xb80 [ 99.356859] sock_diag_rcv+0x2a/0x40 [ 99.360561] netlink_unicast+0x5a5/0x760 [ 99.364607] ? netlink_attachskb+0x9a0/0x9a0 [ 99.369005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 99.374528] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 99.379536] netlink_sendmsg+0xa18/0xfc0 [ 99.383588] ? netlink_unicast+0x760/0x760 [ 99.387810] ? smack_socket_sendmsg+0xb0/0x190 [ 99.392384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 99.397903] ? security_socket_sendmsg+0x94/0xc0 [ 99.402652] ? netlink_unicast+0x760/0x760 [ 99.406896] sock_sendmsg+0xd5/0x120 [ 99.410615] ___sys_sendmsg+0x7fd/0x930 [ 99.414577] ? __local_bh_enable_ip+0x160/0x260 [ 99.419236] ? copy_msghdr_from_user+0x580/0x580 [ 99.423979] ? kasan_check_write+0x14/0x20 [ 99.428199] ? _raw_spin_unlock_bh+0x30/0x40 [ 99.432611] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 99.438048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 99.443580] ? release_sock+0x1ec/0x2c0 [ 99.447539] ? __fget_light+0x2e9/0x430 [ 99.451495] ? fget_raw+0x20/0x20 [ 99.454941] ? __release_sock+0x3a0/0x3a0 [ 99.459098] ? tipc_nametbl_build_group+0x273/0x360 [ 99.464101] ? tipc_setsockopt+0x726/0xd70 [ 99.468331] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 99.473856] ? sockfd_lookup_light+0xc5/0x160 [ 99.478361] __sys_sendmsg+0x11d/0x280 [ 99.482241] ? __ia32_sys_shutdown+0x80/0x80 [ 99.486655] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 99.492195] ? fput+0x130/0x1a0 [ 99.495487] ? __x64_sys_futex+0x47f/0x6a0 [ 99.499717] ? do_syscall_64+0x9a/0x820 [ 99.503702] ? do_syscall_64+0x9a/0x820 [ 99.507678] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 99.513123] __x64_sys_sendmsg+0x78/0xb0 [ 99.517175] do_syscall_64+0x1b9/0x820 [ 99.521051] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 99.526399] ? syscall_return_slowpath+0x5e0/0x5e0 [ 99.531322] ? trace_hardirqs_on_caller+0x310/0x310 [ 99.536339] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 99.541352] ? recalc_sigpending_tsk+0x180/0x180 [ 99.546096] ? kasan_check_write+0x14/0x20 [ 99.550327] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 99.555160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 99.560348] RIP: 0033:0x457099 [ 99.563546] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 99.582437] RSP: 002b:00007f4ee5958c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 99.590134] RAX: ffffffffffffffda RBX: 00007f4ee59596d4 RCX: 0000000000457099 [ 99.597387] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 99.604659] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 99.611927] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 99.619187] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 99.626753] Dumping ftrace buffer: [ 99.630281] (ftrace buffer empty) [ 99.634557] Kernel Offset: disabled [ 99.638180] Rebooting in 86400 seconds..