[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 15.446208] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 20.328513] random: sshd: uninitialized urandom read (32 bytes read) [ 20.837977] random: sshd: uninitialized urandom read (32 bytes read) [ 21.663513] random: sshd: uninitialized urandom read (32 bytes read) [ 60.399362] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.13' (ECDSA) to the list of known hosts. [ 65.886151] random: sshd: uninitialized urandom read (32 bytes read) executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 66.188278] ================================================================== [ 66.195664] BUG: KASAN: use-after-free in pppol2tp_session_destruct+0xed/0x110 [ 66.202994] Read of size 4 at addr ffff8801ba1ae000 by task syz-executor473/3830 [ 66.210506] [ 66.212109] CPU: 1 PID: 3830 Comm: syz-executor473 Not tainted 4.9.110-g00a0bcb #56 [ 66.219871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.229197] ffff8801d96dfc30 ffffffff81eb2329 ffffea0006e86b80 ffff8801ba1ae000 [ 66.237188] 0000000000000000 ffff8801ba1ae000 ffffffff83011be0 ffff8801d96dfc68 [ 66.245182] ffffffff81567a89 ffff8801ba1ae000 0000000000000004 0000000000000000 [ 66.253156] Call Trace: [ 66.255712] [] dump_stack+0xc1/0x128 [ 66.261048] [] ? sock_release+0x1c0/0x1c0 [ 66.266856] [] print_address_description+0x6c/0x234 [ 66.273492] [] ? sock_release+0x1c0/0x1c0 [ 66.279258] [] kasan_report.cold.6+0x242/0x2fe [ 66.285465] [] ? pppol2tp_session_destruct+0xed/0x110 [ 66.292280] [] __asan_report_load4_noabort+0x14/0x20 [ 66.299001] [] pppol2tp_session_destruct+0xed/0x110 [ 66.305637] [] ? pppol2tp_seq_start+0x4e0/0x4e0 [ 66.311925] [] __sk_destruct+0x55/0x590 [ 66.317518] [] ? sock_release+0x1c0/0x1c0 [ 66.323288] [] sk_destruct+0x63/0x80 [ 66.328621] [] __sk_free+0x4f/0x220 [ 66.333866] [] sk_free+0x2b/0x40 [ 66.338854] [] pppol2tp_release+0x239/0x2e0 [ 66.344793] [] sock_release+0x96/0x1c0 [ 66.350299] [] sock_close+0x16/0x20 [ 66.355548] [] __fput+0x263/0x700 [ 66.360629] [] ____fput+0x15/0x20 [ 66.365703] [] task_work_run+0x10c/0x180 [ 66.371384] [] exit_to_usermode_loop+0xfc/0x120 [ 66.377672] [] do_syscall_64+0x364/0x490 [ 66.383354] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 66.390247] [ 66.391844] Allocated by task 3830: [ 66.395439] save_stack_trace+0x16/0x20 [ 66.399384] save_stack+0x43/0xd0 [ 66.402804] kasan_kmalloc+0xc7/0xe0 [ 66.406500] __kmalloc+0x11d/0x300 [ 66.410013] l2tp_session_create+0x38/0x16f0 [ 66.414387] pppol2tp_connect+0x10d7/0x18f0 [ 66.418677] SYSC_connect+0x1b8/0x300 [ 66.422444] SyS_connect+0x24/0x30 [ 66.425954] do_syscall_64+0x1a6/0x490 [ 66.429809] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 66.434877] [ 66.436472] Freed by task 3829: [ 66.439721] save_stack_trace+0x16/0x20 [ 66.443672] save_stack+0x43/0xd0 [ 66.447096] kasan_slab_free+0x72/0xc0 [ 66.450958] kfree+0xfb/0x310 [ 66.454033] l2tp_session_free+0x166/0x200 [ 66.458333] l2tp_tunnel_closeall+0x284/0x350 [ 66.462798] l2tp_udp_encap_destroy+0x87/0xe0 [ 66.467288] udpv6_destroy_sock+0xb1/0xd0 [ 66.471405] sk_common_release+0x6d/0x300 [ 66.475520] udp_lib_close+0x15/0x20 [ 66.479203] inet_release+0xff/0x1d0 [ 66.482886] inet6_release+0x50/0x70 [ 66.486568] sock_release+0x96/0x1c0 [ 66.490264] sock_close+0x16/0x20 [ 66.493688] __fput+0x263/0x700 [ 66.496936] ____fput+0x15/0x20 [ 66.500184] task_work_run+0x10c/0x180 [ 66.504041] exit_to_usermode_loop+0xfc/0x120 [ 66.508501] do_syscall_64+0x364/0x490 [ 66.512359] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 66.517435] [ 66.519036] The buggy address belongs to the object at ffff8801ba1ae000 [ 66.519036] which belongs to the cache kmalloc-512 of size 512 [ 66.531659] The buggy address is located 0 bytes inside of [ 66.531659] 512-byte region [ffff8801ba1ae000, ffff8801ba1ae200) [ 66.543329] The buggy address belongs to the page: [ 66.548230] page:ffffea0006e86b80 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 66.558396] flags: 0x8000000000004080(slab|head) [ 66.563116] page dumped because: kasan: bad access detected [ 66.568791] [ 66.570385] Memory state around the buggy address: [ 66.575281] ffff8801ba1adf00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.582607] ffff8801ba1adf80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 66.589934] >ffff8801ba1ae000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.597264] ^ [ 66.600599] ffff8801ba1ae080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.607925] ffff8801ba1ae100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.615253] ================================================================== [ 66.622577] Disabling lock debugging due to kernel taint [ 66.628183] Kernel panic - not syncing: panic_on_warn set ... [ 66.628183] [ 66.635522] CPU: 1 PID: 3830 Comm: syz-executor473 Tainted: G B 4.9.110-g00a0bcb #56 [ 66.644499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.653827] ffff8801d96dfb90 ffffffff81eb2329 ffffffff843c7167 00000000ffffffff [ 66.661800] 0000000000000000 0000000000000001 ffffffff83011be0 ffff8801d96dfc50 [ 66.669770] ffffffff81421925 0000000041b58ab3 ffffffff843ba880 ffffffff81421766 [ 66.677740] Call Trace: [ 66.680313] [] dump_stack+0xc1/0x128 [ 66.685648] [] ? sock_release+0x1c0/0x1c0 [ 66.691417] [] panic+0x1bf/0x3bc [ 66.696404] [] ? add_taint.cold.6+0x16/0x16 [ 66.702346] [] ? ___preempt_schedule+0x16/0x18 [ 66.708546] [] kasan_end_report+0x47/0x4f [ 66.714314] [] kasan_report.cold.6+0x76/0x2fe [ 66.720429] [] ? pppol2tp_session_destruct+0xed/0x110 [ 66.727243] [] __asan_report_load4_noabort+0x14/0x20 [ 66.733963] [] pppol2tp_session_destruct+0xed/0x110 [ 66.740598] [] ? pppol2tp_seq_start+0x4e0/0x4e0 [ 66.746886] [] __sk_destruct+0x55/0x590 [ 66.752485] [] ? sock_release+0x1c0/0x1c0 [ 66.758254] [] sk_destruct+0x63/0x80 [ 66.763587] [] __sk_free+0x4f/0x220 [ 66.768831] [] sk_free+0x2b/0x40 [ 66.773816] [] pppol2tp_release+0x239/0x2e0 [ 66.779756] [] sock_release+0x96/0x1c0 [ 66.785260] [] sock_close+0x16/0x20 [ 66.790508] [] __fput+0x263/0x700 [ 66.795581] [] ____fput+0x15/0x20 [ 66.800655] [] task_work_run+0x10c/0x180 [ 66.806334] [] exit_to_usermode_loop+0xfc/0x120 [ 66.812621] [] do_syscall_64+0x364/0x490 [ 66.818304] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 66.825596] Dumping ftrace buffer: [ 66.829105] (ftrace buffer empty) [ 66.832786] Kernel Offset: disabled [ 66.836381] Rebooting in 86400 seconds..