[....] Starting OpenBSD Secure Shell server: sshd[ 27.006680] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 31.533410] random: sshd: uninitialized urandom read (32 bytes read) [ 32.007154] random: sshd: uninitialized urandom read (32 bytes read) [ 32.605889] random: sshd: uninitialized urandom read (32 bytes read) [ 100.113414] random: sshd: uninitialized urandom read (32 bytes read) [ 100.259736] sshd (5380) used greatest stack depth: 16792 bytes left Warning: Permanently added '10.128.15.205' (ECDSA) to the list of known hosts. [ 105.839444] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/10 12:47:52 parsed 1 programs [ 106.840682] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/10 12:47:53 executed programs: 0 [ 108.115289] IPVS: ftp: loaded support on port[0] = 21 [ 108.242038] ip (5414) used greatest stack depth: 16504 bytes left [ 108.393791] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.400547] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.408143] device bridge_slave_0 entered promiscuous mode [ 108.427350] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.433949] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.440928] device bridge_slave_1 entered promiscuous mode [ 108.459095] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 108.478199] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 108.530021] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 108.552240] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 108.634810] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 108.642656] team0: Port device team_slave_0 added [ 108.660056] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 108.668110] team0: Port device team_slave_1 added [ 108.686306] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.708595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 108.729244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.749674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 108.903354] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.909988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.917249] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.923707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.462711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.517074] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 109.574392] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 109.580537] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.589592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.639551] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.110567] ================================================================== [ 110.118055] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 110.124091] Read of size 8 at addr ffff8801b67f34f0 by task syz-executor0/5688 [ 110.131453] [ 110.133088] CPU: 1 PID: 5688 Comm: syz-executor0 Not tainted 4.19.0-rc3+ #8 [ 110.140394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.149742] Call Trace: [ 110.152321] dump_stack+0x1c4/0x2b4 [ 110.155982] ? dump_stack_print_info.cold.2+0x52/0x52 [ 110.161308] ? printk+0xa7/0xcf [ 110.164623] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 110.169424] print_address_description.cold.8+0x9/0x1ff [ 110.174891] kasan_report.cold.9+0x242/0x309 [ 110.179295] ? sock_i_ino+0x94/0xa0 [ 110.183093] __asan_report_load8_noabort+0x14/0x20 [ 110.188011] sock_i_ino+0x94/0xa0 [ 110.191455] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 110.196121] ? tipc_diag_dump+0x30/0x30 [ 110.200144] ? tipc_getname+0x7f0/0x7f0 [ 110.204126] ? graph_lock+0x170/0x170 [ 110.207917] ? __lock_sock+0x203/0x350 [ 110.211794] ? find_held_lock+0x36/0x1c0 [ 110.215851] ? mark_held_locks+0xc7/0x130 [ 110.220080] ? __local_bh_enable_ip+0x160/0x260 [ 110.224747] ? __local_bh_enable_ip+0x160/0x260 [ 110.229401] ? lockdep_hardirqs_on+0x421/0x5c0 [ 110.233976] ? trace_hardirqs_on+0xbd/0x310 [ 110.238291] ? lock_release+0x970/0x970 [ 110.242265] ? lock_sock_nested+0xe2/0x120 [ 110.246493] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 110.251570] ? skb_put+0x17b/0x1e0 [ 110.255181] ? memset+0x31/0x40 [ 110.258466] ? __nlmsg_put+0x14c/0x1b0 [ 110.262353] __tipc_add_sock_diag+0x233/0x360 [ 110.266841] tipc_nl_sk_walk+0x122/0x1d0 [ 110.270906] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 110.276189] tipc_diag_dump+0x24/0x30 [ 110.280000] netlink_dump+0x519/0xd50 [ 110.283807] ? netlink_broadcast+0x50/0x50 [ 110.288052] __netlink_dump_start+0x4f1/0x6f0 [ 110.292588] ? tipc_data_ready+0x3e0/0x3e0 [ 110.296825] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 110.301964] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 110.306630] ? tipc_data_ready+0x3e0/0x3e0 [ 110.310856] ? tipc_unregister_sysctl+0x20/0x20 [ 110.315517] ? tipc_ioctl+0x3a0/0x3a0 [ 110.319310] ? netlink_deliver_tap+0x355/0xf80 [ 110.323889] sock_diag_rcv_msg+0x31d/0x410 [ 110.328241] netlink_rcv_skb+0x172/0x440 [ 110.332299] ? sock_diag_bind+0x80/0x80 [ 110.336271] ? netlink_ack+0xb80/0xb80 [ 110.340162] sock_diag_rcv+0x2a/0x40 [ 110.343874] netlink_unicast+0x5a5/0x760 [ 110.347931] ? netlink_attachskb+0x9a0/0x9a0 [ 110.352334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.357866] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 110.362879] netlink_sendmsg+0xa18/0xfc0 [ 110.366941] ? netlink_unicast+0x760/0x760 [ 110.371226] ? smack_socket_sendmsg+0xb0/0x190 [ 110.375850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.381390] ? security_socket_sendmsg+0x94/0xc0 [ 110.386261] ? netlink_unicast+0x760/0x760 [ 110.390513] sock_sendmsg+0xd5/0x120 [ 110.394227] ___sys_sendmsg+0x7fd/0x930 [ 110.398193] ? __local_bh_enable_ip+0x160/0x260 [ 110.402892] ? copy_msghdr_from_user+0x580/0x580 [ 110.407636] ? kasan_check_write+0x14/0x20 [ 110.411859] ? _raw_spin_unlock_bh+0x30/0x40 [ 110.416265] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 110.421705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.427232] ? release_sock+0x1ec/0x2c0 [ 110.431223] ? __fget_light+0x2e9/0x430 [ 110.435186] ? fget_raw+0x20/0x20 [ 110.438637] ? __release_sock+0x3a0/0x3a0 [ 110.442774] ? tipc_nametbl_build_group+0x273/0x360 [ 110.447781] ? tipc_setsockopt+0x726/0xd70 [ 110.452014] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 110.457576] ? sockfd_lookup_light+0xc5/0x160 [ 110.462066] __sys_sendmsg+0x11d/0x280 [ 110.465952] ? __ia32_sys_shutdown+0x80/0x80 [ 110.470372] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 110.475903] ? fput+0x130/0x1a0 [ 110.479178] ? __x64_sys_futex+0x47f/0x6a0 [ 110.483408] ? do_syscall_64+0x9a/0x820 [ 110.487368] ? do_syscall_64+0x9a/0x820 [ 110.491339] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 110.496841] __x64_sys_sendmsg+0x78/0xb0 [ 110.500976] do_syscall_64+0x1b9/0x820 [ 110.504872] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 110.510246] ? syscall_return_slowpath+0x5e0/0x5e0 [ 110.515179] ? trace_hardirqs_on_caller+0x310/0x310 [ 110.520214] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 110.525237] ? recalc_sigpending_tsk+0x180/0x180 [ 110.531238] ? kasan_check_write+0x14/0x20 [ 110.535495] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 110.540339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.545520] RIP: 0033:0x457099 [ 110.548701] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 110.567601] RSP: 002b:00007f11e235dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 110.575308] RAX: ffffffffffffffda RBX: 00007f11e235e6d4 RCX: 0000000000457099 [ 110.582585] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 110.589852] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 110.597118] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 110.604375] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 110.611739] [ 110.613383] Allocated by task 5688: [ 110.617006] save_stack+0x43/0xd0 [ 110.620441] kasan_kmalloc+0xc7/0xe0 [ 110.624144] kasan_slab_alloc+0x12/0x20 [ 110.628107] kmem_cache_alloc+0x12e/0x730 [ 110.632353] sock_alloc_inode+0x1d/0x260 [ 110.636402] alloc_inode+0x63/0x190 [ 110.640038] new_inode_pseudo+0x71/0x1a0 [ 110.644101] sock_alloc+0x41/0x270 [ 110.647625] __sock_create+0x175/0x930 [ 110.651499] __sys_socket+0x106/0x260 [ 110.655290] __x64_sys_socket+0x73/0xb0 [ 110.659249] do_syscall_64+0x1b9/0x820 [ 110.663124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.668305] [ 110.669922] Freed by task 5687: [ 110.673188] save_stack+0x43/0xd0 [ 110.676632] __kasan_slab_free+0x102/0x150 [ 110.680875] kasan_slab_free+0xe/0x10 [ 110.684675] kmem_cache_free+0x83/0x290 [ 110.688637] sock_destroy_inode+0x51/0x60 [ 110.692771] destroy_inode+0x159/0x200 [ 110.696639] evict+0x5e0/0x980 [ 110.699838] iput+0x679/0xa90 [ 110.702937] dentry_unlink_inode+0x461/0x5e0 [ 110.707330] __dentry_kill+0x44c/0x7a0 [ 110.711208] dentry_kill+0xc9/0x5a0 [ 110.714820] dput.part.26+0x660/0x790 [ 110.718604] dput+0x15/0x20 [ 110.721521] __fput+0x4cf/0xa30 [ 110.724784] ____fput+0x15/0x20 [ 110.728050] task_work_run+0x1e8/0x2a0 [ 110.731928] exit_to_usermode_loop+0x318/0x380 [ 110.736511] do_syscall_64+0x6be/0x820 [ 110.740386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.745554] [ 110.747167] The buggy address belongs to the object at ffff8801b67f3480 [ 110.747167] which belongs to the cache sock_inode_cache(17:syz0) of size 984 [ 110.761029] The buggy address is located 112 bytes inside of [ 110.761029] 984-byte region [ffff8801b67f3480, ffff8801b67f3858) [ 110.772888] The buggy address belongs to the page: [ 110.777818] page:ffffea0006d9fcc0 count:1 mapcount:0 mapping:ffff8801ca8be840 index:0xffff8801b67f3ffd [ 110.787267] flags: 0x2fffc0000000100(slab) [ 110.791506] raw: 02fffc0000000100 ffffea0006d9fc48 ffffea0006d9fd08 ffff8801ca8be840 [ 110.799374] raw: ffff8801b67f3ffd ffff8801b67f3000 0000000100000003 ffff8801b871cb00 [ 110.807234] page dumped because: kasan: bad access detected [ 110.812924] page->mem_cgroup:ffff8801b871cb00 [ 110.817412] [ 110.819021] Memory state around the buggy address: [ 110.823935] ffff8801b67f3380: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 110.831273] ffff8801b67f3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 110.838613] >ffff8801b67f3480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 110.845957] ^ [ 110.852957] ffff8801b67f3500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 110.860307] ffff8801b67f3580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 110.867650] ================================================================== [ 110.875023] Disabling lock debugging due to kernel taint [ 110.880556] Kernel panic - not syncing: panic_on_warn set ... [ 110.880556] [ 110.887935] CPU: 1 PID: 5688 Comm: syz-executor0 Tainted: G B 4.19.0-rc3+ #8 [ 110.896942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.906285] Call Trace: [ 110.908858] dump_stack+0x1c4/0x2b4 [ 110.912492] ? dump_stack_print_info.cold.2+0x52/0x52 [ 110.917673] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 110.922420] panic+0x238/0x4e7 [ 110.925607] ? add_taint.cold.5+0x16/0x16 [ 110.929776] ? trace_hardirqs_on+0x9a/0x310 [ 110.934106] ? trace_hardirqs_on+0xb4/0x310 [ 110.938415] ? trace_hardirqs_on+0xb4/0x310 [ 110.942737] kasan_end_report+0x47/0x4f [ 110.946714] kasan_report.cold.9+0x76/0x309 [ 110.951026] ? sock_i_ino+0x94/0xa0 [ 110.957229] __asan_report_load8_noabort+0x14/0x20 [ 110.962160] sock_i_ino+0x94/0xa0 [ 110.965610] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 110.970298] ? tipc_diag_dump+0x30/0x30 [ 110.974267] ? tipc_getname+0x7f0/0x7f0 [ 110.978235] ? graph_lock+0x170/0x170 [ 110.982313] ? __lock_sock+0x203/0x350 [ 110.986222] ? find_held_lock+0x36/0x1c0 [ 110.990330] ? mark_held_locks+0xc7/0x130 [ 110.994469] ? __local_bh_enable_ip+0x160/0x260 [ 110.999133] ? __local_bh_enable_ip+0x160/0x260 [ 111.003790] ? lockdep_hardirqs_on+0x421/0x5c0 [ 111.008358] ? trace_hardirqs_on+0xbd/0x310 [ 111.012693] ? lock_release+0x970/0x970 [ 111.016657] ? lock_sock_nested+0xe2/0x120 [ 111.020893] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 111.025904] ? skb_put+0x17b/0x1e0 [ 111.029428] ? memset+0x31/0x40 [ 111.032715] ? __nlmsg_put+0x14c/0x1b0 [ 111.036593] __tipc_add_sock_diag+0x233/0x360 [ 111.041088] tipc_nl_sk_walk+0x122/0x1d0 [ 111.045158] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 111.050453] tipc_diag_dump+0x24/0x30 [ 111.054267] netlink_dump+0x519/0xd50 [ 111.058087] ? netlink_broadcast+0x50/0x50 [ 111.062321] __netlink_dump_start+0x4f1/0x6f0 [ 111.066800] ? tipc_data_ready+0x3e0/0x3e0 [ 111.071019] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 111.076107] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 111.080766] ? tipc_data_ready+0x3e0/0x3e0 [ 111.084993] ? tipc_unregister_sysctl+0x20/0x20 [ 111.089643] ? tipc_ioctl+0x3a0/0x3a0 [ 111.093428] ? netlink_deliver_tap+0x355/0xf80 [ 111.098012] sock_diag_rcv_msg+0x31d/0x410 [ 111.102235] netlink_rcv_skb+0x172/0x440 [ 111.106337] ? sock_diag_bind+0x80/0x80 [ 111.110299] ? netlink_ack+0xb80/0xb80 [ 111.114176] sock_diag_rcv+0x2a/0x40 [ 111.117887] netlink_unicast+0x5a5/0x760 [ 111.121961] ? netlink_attachskb+0x9a0/0x9a0 [ 111.126370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 111.131913] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 111.136915] netlink_sendmsg+0xa18/0xfc0 [ 111.140989] ? netlink_unicast+0x760/0x760 [ 111.145562] ? smack_socket_sendmsg+0xb0/0x190 [ 111.150131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 111.155655] ? security_socket_sendmsg+0x94/0xc0 [ 111.160427] ? netlink_unicast+0x760/0x760 [ 111.164675] sock_sendmsg+0xd5/0x120 [ 111.168410] ___sys_sendmsg+0x7fd/0x930 [ 111.172393] ? __local_bh_enable_ip+0x160/0x260 [ 111.177047] ? copy_msghdr_from_user+0x580/0x580 [ 111.181788] ? kasan_check_write+0x14/0x20 [ 111.186033] ? _raw_spin_unlock_bh+0x30/0x40 [ 111.190433] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 111.195893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 111.201415] ? release_sock+0x1ec/0x2c0 [ 111.205381] ? __fget_light+0x2e9/0x430 [ 111.209340] ? fget_raw+0x20/0x20 [ 111.212779] ? __release_sock+0x3a0/0x3a0 [ 111.216911] ? tipc_nametbl_build_group+0x273/0x360 [ 111.221916] ? tipc_setsockopt+0x726/0xd70 [ 111.226157] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 111.231679] ? sockfd_lookup_light+0xc5/0x160 [ 111.236158] __sys_sendmsg+0x11d/0x280 [ 111.240051] ? __ia32_sys_shutdown+0x80/0x80 [ 111.244444] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 111.249964] ? fput+0x130/0x1a0 [ 111.253250] ? __x64_sys_futex+0x47f/0x6a0 [ 111.257491] ? do_syscall_64+0x9a/0x820 [ 111.261451] ? do_syscall_64+0x9a/0x820 [ 111.265444] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 111.270880] __x64_sys_sendmsg+0x78/0xb0 [ 111.274928] do_syscall_64+0x1b9/0x820 [ 111.278803] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 111.284152] ? syscall_return_slowpath+0x5e0/0x5e0 [ 111.289066] ? trace_hardirqs_on_caller+0x310/0x310 [ 111.294069] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 111.299071] ? recalc_sigpending_tsk+0x180/0x180 [ 111.303815] ? kasan_check_write+0x14/0x20 [ 111.308064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 111.312918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 111.318110] RIP: 0033:0x457099 [ 111.321304] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 111.340221] RSP: 002b:00007f11e235dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 111.347921] RAX: ffffffffffffffda RBX: 00007f11e235e6d4 RCX: 0000000000457099 [ 111.355174] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 111.362445] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 111.369698] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 111.376949] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 111.384563] Dumping ftrace buffer: [ 111.388093] (ftrace buffer empty) [ 111.392460] Kernel Offset: disabled [ 111.396270] Rebooting in 86400 seconds..