[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 34.605927] random: sshd: uninitialized urandom read (32 bytes read) [ 35.000081] audit: type=1400 audit(1536737511.901:6): avc: denied { map } for pid=5503 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 35.050604] random: sshd: uninitialized urandom read (32 bytes read) [ 35.686744] random: sshd: uninitialized urandom read (32 bytes read) [ 184.867682] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.26' (ECDSA) to the list of known hosts. [ 190.436191] random: sshd: uninitialized urandom read (32 bytes read) [ 190.561035] audit: type=1400 audit(1536737667.471:7): avc: denied { map } for pid=5517 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/09/12 07:34:27 parsed 1 programs [ 191.052411] audit: type=1400 audit(1536737667.961:8): avc: denied { map } for pid=5517 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14729 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 191.692227] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/12 07:34:29 executed programs: 0 [ 192.805784] audit: type=1400 audit(1536737669.711:9): avc: denied { map } for pid=5517 comm="syz-execprog" path="/root/syzkaller-shm051652911" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 192.841613] IPVS: ftp: loaded support on port[0] = 21 [ 193.094585] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.101695] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.108809] device bridge_slave_0 entered promiscuous mode [ 193.128191] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.134692] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.141757] device bridge_slave_1 entered promiscuous mode [ 193.159674] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 193.178004] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 193.228385] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.249362] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 193.326152] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 193.333972] team0: Port device team_slave_0 added [ 193.351666] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 193.358847] team0: Port device team_slave_1 added [ 193.376674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.395440] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.415908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.436531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.587196] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.593685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.600449] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.606843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.140871] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.193118] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.247627] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 194.254874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.262078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.317617] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.645478] ================================================================== [ 194.652991] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 194.659220] Read of size 8 at addr ffff8801d3c700f0 by task syz-executor0/5788 [ 194.666687] [ 194.668319] CPU: 1 PID: 5788 Comm: syz-executor0 Not tainted 4.19.0-rc3+ #11 [ 194.676249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.685786] Call Trace: [ 194.688375] dump_stack+0x1c4/0x2b4 [ 194.692081] ? dump_stack_print_info.cold.2+0x52/0x52 [ 194.697274] ? printk+0xa7/0xcf [ 194.700553] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 194.705321] print_address_description.cold.8+0x9/0x1ff [ 194.710699] kasan_report.cold.9+0x242/0x309 [ 194.715231] ? sock_i_ino+0x94/0xa0 [ 194.718870] __asan_report_load8_noabort+0x14/0x20 [ 194.723800] sock_i_ino+0x94/0xa0 [ 194.727258] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 194.732189] ? tipc_diag_dump+0x30/0x30 [ 194.736182] ? tipc_getname+0x7f0/0x7f0 [ 194.740176] ? graph_lock+0x170/0x170 [ 194.743976] ? __lock_sock+0x203/0x350 [ 194.747865] ? find_held_lock+0x36/0x1c0 [ 194.752155] ? mark_held_locks+0xc7/0x130 [ 194.756310] ? __local_bh_enable_ip+0x160/0x260 [ 194.760976] ? __local_bh_enable_ip+0x160/0x260 [ 194.765642] ? lockdep_hardirqs_on+0x421/0x5c0 [ 194.770228] ? trace_hardirqs_on+0xbd/0x310 [ 194.774547] ? lock_release+0x970/0x970 [ 194.778521] ? lock_sock_nested+0xe2/0x120 [ 194.785983] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 194.791013] ? skb_put+0x17b/0x1e0 [ 194.794573] ? memset+0x31/0x40 [ 194.797856] ? __nlmsg_put+0x14c/0x1b0 [ 194.801828] __tipc_add_sock_diag+0x233/0x360 [ 194.806335] tipc_nl_sk_walk+0x122/0x1d0 [ 194.810394] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 194.815671] tipc_diag_dump+0x24/0x30 [ 194.819475] netlink_dump+0x519/0xd50 [ 194.823405] ? netlink_broadcast+0x50/0x50 [ 194.827645] __netlink_dump_start+0x4f1/0x6f0 [ 194.832163] ? tipc_data_ready+0x3e0/0x3e0 [ 194.836485] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 194.841600] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 194.846279] ? tipc_data_ready+0x3e0/0x3e0 [ 194.850513] ? tipc_unregister_sysctl+0x20/0x20 [ 194.855372] ? tipc_ioctl+0x3a0/0x3a0 [ 194.859196] ? netlink_deliver_tap+0x355/0xf80 [ 194.863785] sock_diag_rcv_msg+0x31d/0x410 [ 194.868182] netlink_rcv_skb+0x172/0x440 [ 194.872249] ? sock_diag_bind+0x80/0x80 [ 194.876226] ? netlink_ack+0xb80/0xb80 [ 194.880119] sock_diag_rcv+0x2a/0x40 [ 194.883856] netlink_unicast+0x5a5/0x760 [ 194.888032] ? netlink_attachskb+0x9a0/0x9a0 [ 194.892453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.898216] netlink_sendmsg+0xa18/0xfc0 [ 194.902288] ? netlink_unicast+0x760/0x760 [ 194.906524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.912183] ? security_socket_sendmsg+0x94/0xc0 [ 194.916978] ? netlink_unicast+0x760/0x760 [ 194.921222] sock_sendmsg+0xd5/0x120 [ 194.924946] ___sys_sendmsg+0x7fd/0x930 [ 194.928920] ? __local_bh_enable_ip+0x160/0x260 [ 194.933589] ? copy_msghdr_from_user+0x580/0x580 [ 194.938342] ? _raw_spin_unlock_bh+0x30/0x40 [ 194.942752] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 194.948203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.953745] ? release_sock+0x1ec/0x2c0 [ 194.957720] ? __fget_light+0x2e9/0x430 [ 194.961703] ? fget_raw+0x20/0x20 [ 194.965179] ? __release_sock+0x3a0/0x3a0 [ 194.969326] ? tipc_nametbl_build_group+0x273/0x360 [ 194.974351] ? tipc_setsockopt+0x726/0xd70 [ 194.978674] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 194.984218] ? sockfd_lookup_light+0xc5/0x160 [ 194.988744] __sys_sendmsg+0x11d/0x280 [ 194.992643] ? __ia32_sys_shutdown+0x80/0x80 [ 194.997051] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 195.002714] ? fput+0x130/0x1a0 [ 195.005994] ? __x64_sys_futex+0x47f/0x6a0 [ 195.010227] ? do_syscall_64+0x9a/0x820 [ 195.014203] ? do_syscall_64+0x9a/0x820 [ 195.018192] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 195.023644] __x64_sys_sendmsg+0x78/0xb0 [ 195.027800] do_syscall_64+0x1b9/0x820 [ 195.031695] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 195.037061] ? syscall_return_slowpath+0x5e0/0x5e0 [ 195.041994] ? trace_hardirqs_on_caller+0x310/0x310 [ 195.047151] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 195.052358] ? recalc_sigpending_tsk+0x180/0x180 [ 195.057115] ? kasan_check_write+0x14/0x20 [ 195.061379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 195.066346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.071536] RIP: 0033:0x4572d9 [ 195.074727] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.093625] RSP: 002b:00007ff0688bfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 195.101336] RAX: ffffffffffffffda RBX: 00007ff0688c06d4 RCX: 00000000004572d9 [ 195.108740] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 195.116010] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 195.123278] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 195.130694] R13: 00000000004d4f40 R14: 00000000004c941e R15: 0000000000000000 [ 195.137987] [ 195.139612] Allocated by task 5788: [ 195.143237] save_stack+0x43/0xd0 [ 195.146685] kasan_kmalloc+0xc7/0xe0 [ 195.150398] kasan_slab_alloc+0x12/0x20 [ 195.154373] kmem_cache_alloc+0x12e/0x730 [ 195.158518] sock_alloc_inode+0x1d/0x260 [ 195.162579] alloc_inode+0x63/0x190 [ 195.166211] new_inode_pseudo+0x71/0x1a0 [ 195.170267] sock_alloc+0x41/0x270 [ 195.173805] __sock_create+0x175/0x930 [ 195.177698] __sys_socket+0x106/0x260 [ 195.181497] __x64_sys_socket+0x73/0xb0 [ 195.185593] do_syscall_64+0x1b9/0x820 [ 195.189479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.194658] [ 195.196285] Freed by task 5787: [ 195.199564] save_stack+0x43/0xd0 [ 195.203013] __kasan_slab_free+0x102/0x150 [ 195.207244] kasan_slab_free+0xe/0x10 [ 195.211050] kmem_cache_free+0x83/0x290 [ 195.215045] sock_destroy_inode+0x51/0x60 [ 195.219219] destroy_inode+0x159/0x200 [ 195.223122] evict+0x5e0/0x980 [ 195.226351] iput+0x679/0xa90 [ 195.229456] dentry_unlink_inode+0x461/0x5e0 [ 195.233863] __dentry_kill+0x44c/0x7a0 [ 195.237749] dentry_kill+0xc9/0x5a0 [ 195.241382] dput.part.26+0x660/0x790 [ 195.245191] dput+0x15/0x20 [ 195.248116] __fput+0x4cf/0xa30 [ 195.251534] ____fput+0x15/0x20 [ 195.254953] task_work_run+0x1e8/0x2a0 [ 195.258841] exit_to_usermode_loop+0x318/0x380 [ 195.263422] do_syscall_64+0x6be/0x820 [ 195.267312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.272491] [ 195.274121] The buggy address belongs to the object at ffff8801d3c70080 [ 195.274121] which belongs to the cache sock_inode_cache of size 984 [ 195.287237] The buggy address is located 112 bytes inside of [ 195.287237] 984-byte region [ffff8801d3c70080, ffff8801d3c70458) [ 195.299106] The buggy address belongs to the page: [ 195.304057] page:ffffea00074f1c00 count:1 mapcount:0 mapping:ffff8801d9bfe3c0 index:0xffff8801d3c70ffd [ 195.313501] flags: 0x2fffc0000000100(slab) [ 195.317866] raw: 02fffc0000000100 ffffea0006c6ff08 ffffea00072cc748 ffff8801d9bfe3c0 [ 195.325747] raw: ffff8801d3c70ffd ffff8801d3c70080 0000000100000003 0000000000000000 [ 195.333619] page dumped because: kasan: bad access detected [ 195.339319] [ 195.340937] Memory state around the buggy address: [ 195.345863] ffff8801d3c6ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 195.353218] ffff8801d3c70000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 195.360572] >ffff8801d3c70080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 195.367922] ^ [ 195.374928] ffff8801d3c70100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 195.382287] ffff8801d3c70180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 195.389785] ================================================================== [ 195.397207] Disabling lock debugging due to kernel taint [ 195.402762] Kernel panic - not syncing: panic_on_warn set ... [ 195.402762] [ 195.410179] CPU: 1 PID: 5788 Comm: syz-executor0 Tainted: G B 4.19.0-rc3+ #11 [ 195.418764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.428114] Call Trace: [ 195.430843] dump_stack+0x1c4/0x2b4 [ 195.434470] ? dump_stack_print_info.cold.2+0x52/0x52 [ 195.439663] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 195.444428] panic+0x238/0x4e7 [ 195.447631] ? add_taint.cold.5+0x16/0x16 [ 195.451779] ? trace_hardirqs_on+0x9a/0x310 [ 195.456179] ? trace_hardirqs_on+0xb4/0x310 [ 195.460511] ? trace_hardirqs_on+0xb4/0x310 [ 195.464831] kasan_end_report+0x47/0x4f [ 195.468804] kasan_report.cold.9+0x76/0x309 [ 195.473121] ? sock_i_ino+0x94/0xa0 [ 195.476785] __asan_report_load8_noabort+0x14/0x20 [ 195.481714] sock_i_ino+0x94/0xa0 [ 195.485185] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 195.489850] ? tipc_diag_dump+0x30/0x30 [ 195.493826] ? tipc_getname+0x7f0/0x7f0 [ 195.497803] ? graph_lock+0x170/0x170 [ 195.501633] ? __lock_sock+0x203/0x350 [ 195.505535] ? find_held_lock+0x36/0x1c0 [ 195.509602] ? mark_held_locks+0xc7/0x130 [ 195.513756] ? __local_bh_enable_ip+0x160/0x260 [ 195.518421] ? __local_bh_enable_ip+0x160/0x260 [ 195.523088] ? lockdep_hardirqs_on+0x421/0x5c0 [ 195.527714] ? trace_hardirqs_on+0xbd/0x310 [ 195.532048] ? lock_release+0x970/0x970 [ 195.536030] ? lock_sock_nested+0xe2/0x120 [ 195.540325] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 195.545339] ? skb_put+0x17b/0x1e0 [ 195.548877] ? memset+0x31/0x40 [ 195.552180] ? __nlmsg_put+0x14c/0x1b0 [ 195.556067] __tipc_add_sock_diag+0x233/0x360 [ 195.560562] tipc_nl_sk_walk+0x122/0x1d0 [ 195.564622] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 195.569948] tipc_diag_dump+0x24/0x30 [ 195.573750] netlink_dump+0x519/0xd50 [ 195.577549] ? netlink_broadcast+0x50/0x50 [ 195.581793] __netlink_dump_start+0x4f1/0x6f0 [ 195.586288] ? tipc_data_ready+0x3e0/0x3e0 [ 195.590652] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 195.595766] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 195.600440] ? tipc_data_ready+0x3e0/0x3e0 [ 195.604723] ? tipc_unregister_sysctl+0x20/0x20 [ 195.609389] ? tipc_ioctl+0x3a0/0x3a0 [ 195.613196] ? netlink_deliver_tap+0x355/0xf80 [ 195.617777] sock_diag_rcv_msg+0x31d/0x410 [ 195.622015] netlink_rcv_skb+0x172/0x440 [ 195.626204] ? sock_diag_bind+0x80/0x80 [ 195.630186] ? netlink_ack+0xb80/0xb80 [ 195.634072] sock_diag_rcv+0x2a/0x40 [ 195.637788] netlink_unicast+0x5a5/0x760 [ 195.641967] ? netlink_attachskb+0x9a0/0x9a0 [ 195.646459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.652012] netlink_sendmsg+0xa18/0xfc0 [ 195.656084] ? netlink_unicast+0x760/0x760 [ 195.660491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.666103] ? security_socket_sendmsg+0x94/0xc0 [ 195.670926] ? netlink_unicast+0x760/0x760 [ 195.675311] sock_sendmsg+0xd5/0x120 [ 195.679056] ___sys_sendmsg+0x7fd/0x930 [ 195.683041] ? __local_bh_enable_ip+0x160/0x260 [ 195.687738] ? copy_msghdr_from_user+0x580/0x580 [ 195.692530] ? _raw_spin_unlock_bh+0x30/0x40 [ 195.696954] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 195.702418] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.708012] ? release_sock+0x1ec/0x2c0 [ 195.711990] ? __fget_light+0x2e9/0x430 [ 195.715965] ? fget_raw+0x20/0x20 [ 195.719446] ? __release_sock+0x3a0/0x3a0 [ 195.723603] ? tipc_nametbl_build_group+0x273/0x360 [ 195.728733] ? tipc_setsockopt+0x726/0xd70 [ 195.732969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 195.738699] ? sockfd_lookup_light+0xc5/0x160 [ 195.743203] __sys_sendmsg+0x11d/0x280 [ 195.747095] ? __ia32_sys_shutdown+0x80/0x80 [ 195.751538] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 195.757086] ? fput+0x130/0x1a0 [ 195.760374] ? __x64_sys_futex+0x47f/0x6a0 [ 195.764693] ? do_syscall_64+0x9a/0x820 [ 195.768754] ? do_syscall_64+0x9a/0x820 [ 195.772744] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 195.778258] __x64_sys_sendmsg+0x78/0xb0 [ 195.782322] do_syscall_64+0x1b9/0x820 [ 195.786337] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 195.791702] ? syscall_return_slowpath+0x5e0/0x5e0 [ 195.796688] ? trace_hardirqs_on_caller+0x310/0x310 [ 195.801722] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 195.806739] ? recalc_sigpending_tsk+0x180/0x180 [ 195.811514] ? kasan_check_write+0x14/0x20 [ 195.815757] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 195.820751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.825959] RIP: 0033:0x4572d9 [ 195.829178] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.848234] RSP: 002b:00007ff0688bfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 195.855964] RAX: ffffffffffffffda RBX: 00007ff0688c06d4 RCX: 00000000004572d9 [ 195.863431] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 195.870735] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 195.878016] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 195.885289] R13: 00000000004d4f40 R14: 00000000004c941e R15: 0000000000000000 [ 195.893656] Kernel Offset: disabled [ 195.897303] Rebooting in 86400 seconds..