[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 24.066208] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 28.714127] random: sshd: uninitialized urandom read (32 bytes read) [ 29.047930] random: sshd: uninitialized urandom read (32 bytes read) [ 29.646032] random: sshd: uninitialized urandom read (32 bytes read) [ 99.037140] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.34' (ECDSA) to the list of known hosts. [ 104.673659] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/02 08:33:15 parsed 1 programs [ 105.812263] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/02 08:33:17 executed programs: 0 [ 107.182781] IPVS: ftp: loaded support on port[0] = 21 [ 107.401323] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.407791] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.415407] device bridge_slave_0 entered promiscuous mode [ 107.432976] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.439399] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.446387] device bridge_slave_1 entered promiscuous mode [ 107.464275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 107.481278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 107.526280] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 107.545375] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 107.612732] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 107.620045] team0: Port device team_slave_0 added [ 107.635503] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 107.643117] team0: Port device team_slave_1 added [ 107.658487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.676307] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.694284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.712897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.842301] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.848870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.855758] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.862305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.313434] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 108.319670] 8021q: adding VLAN 0 to HW filter on device bond0 [ 108.339334] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 108.372038] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 108.423113] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 108.429329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.437223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.485740] 8021q: adding VLAN 0 to HW filter on device team0 [ 108.836924] ================================================================== [ 108.844427] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 108.850384] Read of size 8 at addr ffff8801b270d970 by task syz-executor0/4942 [ 108.857778] [ 108.859403] CPU: 1 PID: 4942 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #79 [ 108.866757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.876098] Call Trace: [ 108.878696] dump_stack+0x1c9/0x2b4 [ 108.882329] ? dump_stack_print_info.cold.2+0x52/0x52 [ 108.887510] ? printk+0xa7/0xcf [ 108.890793] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 108.895550] ? sock_i_ino+0x94/0xa0 [ 108.899178] print_address_description+0x6c/0x20b [ 108.904010] ? sock_i_ino+0x94/0xa0 [ 108.907627] kasan_report.cold.7+0x242/0x30d [ 108.912025] __asan_report_load8_noabort+0x14/0x20 [ 108.916936] sock_i_ino+0x94/0xa0 [ 108.920502] tipc_sk_fill_sock_diag+0x3be/0xdb0 [ 108.925162] ? tipc_diag_dump+0x30/0x30 [ 108.929122] ? tipc_getname+0x7f0/0x7f0 [ 108.933090] ? print_usage_bug+0xc0/0xc0 [ 108.937148] ? graph_lock+0x170/0x170 [ 108.940946] ? __lock_sock+0x203/0x360 [ 108.944847] ? find_held_lock+0x36/0x1c0 [ 108.948912] ? mark_held_locks+0xc9/0x160 [ 108.953131] ? __local_bh_enable_ip+0x161/0x230 [ 108.957794] ? __local_bh_enable_ip+0x161/0x230 [ 108.962447] ? lockdep_hardirqs_on+0x421/0x5c0 [ 108.967012] ? trace_hardirqs_on+0xbd/0x2c0 [ 108.971317] ? lock_release+0x9f0/0x9f0 [ 108.975282] ? lock_sock_nested+0xe7/0x120 [ 108.979510] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 108.984518] ? skb_put+0x17b/0x1e0 [ 108.988148] ? memset+0x31/0x40 [ 108.991427] ? __nlmsg_put+0x14c/0x1b0 [ 108.995309] __tipc_add_sock_diag+0x22f/0x360 [ 108.999810] tipc_nl_sk_walk+0x122/0x1d0 [ 109.003856] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 109.009133] tipc_diag_dump+0x24/0x30 [ 109.013060] netlink_dump+0x519/0xd50 [ 109.016857] ? netlink_broadcast+0x50/0x50 [ 109.021093] __netlink_dump_start+0x4f1/0x6f0 [ 109.025583] ? kasan_check_read+0x11/0x20 [ 109.029724] ? tipc_data_ready+0x3f0/0x3f0 [ 109.033951] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 109.039051] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 109.043796] ? tipc_data_ready+0x3f0/0x3f0 [ 109.048021] ? tipc_unregister_sysctl+0x20/0x20 [ 109.052673] ? tipc_ioctl+0x3b0/0x3b0 [ 109.056464] ? netlink_deliver_tap+0x356/0xfb0 [ 109.061056] sock_diag_rcv_msg+0x31d/0x410 [ 109.065287] netlink_rcv_skb+0x172/0x440 [ 109.069335] ? sock_diag_bind+0x80/0x80 [ 109.073305] ? netlink_ack+0xbe0/0xbe0 [ 109.077287] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 109.081978] sock_diag_rcv+0x2a/0x40 [ 109.085678] netlink_unicast+0x5a0/0x760 [ 109.089733] ? netlink_attachskb+0x9a0/0x9a0 [ 109.094134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.099671] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 109.104679] netlink_sendmsg+0xa18/0xfc0 [ 109.108735] ? netlink_unicast+0x760/0x760 [ 109.113004] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 109.117931] ? apparmor_socket_sendmsg+0x29/0x30 [ 109.122677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.128296] ? security_socket_sendmsg+0x94/0xc0 [ 109.133048] ? netlink_unicast+0x760/0x760 [ 109.137272] sock_sendmsg+0xd5/0x120 [ 109.140972] ___sys_sendmsg+0x7fd/0x930 [ 109.144933] ? copy_msghdr_from_user+0x580/0x580 [ 109.149682] ? lock_downgrade+0x8f0/0x8f0 [ 109.153827] ? __fget_light+0x2f7/0x440 [ 109.157786] ? fget_raw+0x20/0x20 [ 109.161243] ? __fd_install+0x2db/0x880 [ 109.165203] ? get_unused_fd_flags+0x1a0/0x1a0 [ 109.169773] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 109.175299] ? sockfd_lookup_light+0xc5/0x160 [ 109.179852] __sys_sendmsg+0x11d/0x290 [ 109.183733] ? __ia32_sys_shutdown+0x80/0x80 [ 109.188143] ? __x64_sys_futex+0x47f/0x6a0 [ 109.192363] ? do_syscall_64+0x9a/0x820 [ 109.196375] ? do_syscall_64+0x9a/0x820 [ 109.200351] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 109.205436] ? trace_hardirqs_off+0xb8/0x2b0 [ 109.209844] __x64_sys_sendmsg+0x78/0xb0 [ 109.213900] do_syscall_64+0x1b9/0x820 [ 109.217776] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 109.223125] ? syscall_return_slowpath+0x5e0/0x5e0 [ 109.228046] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 109.233048] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 109.238046] ? recalc_sigpending_tsk+0x180/0x180 [ 109.242799] ? kasan_check_write+0x14/0x20 [ 109.247036] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 109.251868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 109.257234] RIP: 0033:0x457099 [ 109.260413] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 109.279316] RSP: 002b:00007f0c4c67dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 109.287023] RAX: ffffffffffffffda RBX: 00007f0c4c67e6d4 RCX: 0000000000457099 [ 109.294284] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 109.301570] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 109.308826] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 109.316093] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000001 [ 109.323354] [ 109.324970] Allocated by task 4941: [ 109.328596] save_stack+0x43/0xd0 [ 109.332077] kasan_kmalloc+0xc4/0xe0 [ 109.335856] kasan_slab_alloc+0x12/0x20 [ 109.339824] kmem_cache_alloc+0x12e/0x710 [ 109.344097] sock_alloc_inode+0x1d/0x260 [ 109.348229] alloc_inode+0x63/0x190 [ 109.351847] new_inode_pseudo+0x71/0x1a0 [ 109.355903] sock_alloc+0x41/0x270 [ 109.359477] __sock_create+0x175/0x940 [ 109.363362] __sys_socket+0x106/0x260 [ 109.367152] __x64_sys_socket+0x73/0xb0 [ 109.371113] do_syscall_64+0x1b9/0x820 [ 109.375049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 109.380230] [ 109.381840] Freed by task 4941: [ 109.385104] save_stack+0x43/0xd0 [ 109.388550] __kasan_slab_free+0x11a/0x170 [ 109.392765] kasan_slab_free+0xe/0x10 [ 109.396553] kmem_cache_free+0x86/0x280 [ 109.400505] sock_destroy_inode+0x51/0x60 [ 109.404645] destroy_inode+0x159/0x200 [ 109.408531] evict+0x5d5/0x990 [ 109.411782] iput+0x5fa/0xa00 [ 109.414893] dentry_unlink_inode+0x461/0x5e0 [ 109.419290] __dentry_kill+0x44c/0x7a0 [ 109.423158] dentry_kill+0xc9/0x5a0 [ 109.426762] dput.part.26+0x66b/0x7a0 [ 109.430577] dput+0x15/0x20 [ 109.433495] __fput+0x4d4/0xa40 [ 109.436751] ____fput+0x15/0x20 [ 109.440005] task_work_run+0x1e8/0x2a0 [ 109.443870] get_signal+0x14bf/0x18e0 [ 109.447659] do_signal+0x9c/0x21c0 [ 109.451198] exit_to_usermode_loop+0x2e5/0x380 [ 109.455819] do_syscall_64+0x6be/0x820 [ 109.459693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 109.464865] [ 109.466486] The buggy address belongs to the object at ffff8801b270d900 [ 109.466486] which belongs to the cache sock_inode_cache(17:syz0) of size 984 [ 109.480453] The buggy address is located 112 bytes inside of [ 109.480453] 984-byte region [ffff8801b270d900, ffff8801b270dcd8) [ 109.492304] The buggy address belongs to the page: [ 109.497214] page:ffffea0006c9c340 count:1 mapcount:0 mapping:ffff8801cbd4d780 index:0xffff8801b270dffd [ 109.506737] flags: 0x2fffc0000000100(slab) [ 109.510956] raw: 02fffc0000000100 ffffea0006c9c208 ffff8801d44eef48 ffff8801cbd4d780 [ 109.518861] raw: ffff8801b270dffd ffff8801b270d000 0000000100000003 ffff8801d46e2e00 [ 109.526723] page dumped because: kasan: bad access detected [ 109.532412] page->mem_cgroup:ffff8801d46e2e00 [ 109.536882] [ 109.538486] Memory state around the buggy address: [ 109.543400] ffff8801b270d800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 109.550875] ffff8801b270d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 109.558257] >ffff8801b270d900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 109.565608] ^ [ 109.572630] ffff8801b270d980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 109.579989] ffff8801b270da00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 109.587455] ================================================================== [ 109.594853] Disabling lock debugging due to kernel taint [ 109.600416] Kernel panic - not syncing: panic_on_warn set ... [ 109.600416] [ 109.607770] CPU: 1 PID: 4942 Comm: syz-executor0 Tainted: G B 4.19.0-rc1+ #79 [ 109.616334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.625665] Call Trace: [ 109.628239] dump_stack+0x1c9/0x2b4 [ 109.631871] ? dump_stack_print_info.cold.2+0x52/0x52 [ 109.637046] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 109.641787] panic+0x238/0x4e7 [ 109.644966] ? add_taint.cold.5+0x16/0x16 [ 109.649124] ? trace_hardirqs_on+0xb4/0x2c0 [ 109.653441] ? trace_hardirqs_on+0x9a/0x2c0 [ 109.657809] ? sock_i_ino+0x94/0xa0 [ 109.661425] kasan_end_report+0x47/0x4f [ 109.665380] kasan_report.cold.7+0x76/0x30d [ 109.669823] __asan_report_load8_noabort+0x14/0x20 [ 109.674844] sock_i_ino+0x94/0xa0 [ 109.678299] tipc_sk_fill_sock_diag+0x3be/0xdb0 [ 109.682956] ? tipc_diag_dump+0x30/0x30 [ 109.686911] ? tipc_getname+0x7f0/0x7f0 [ 109.690866] ? print_usage_bug+0xc0/0xc0 [ 109.694906] ? graph_lock+0x170/0x170 [ 109.698686] ? __lock_sock+0x203/0x360 [ 109.702563] ? find_held_lock+0x36/0x1c0 [ 109.706609] ? mark_held_locks+0xc9/0x160 [ 109.710738] ? __local_bh_enable_ip+0x161/0x230 [ 109.715435] ? __local_bh_enable_ip+0x161/0x230 [ 109.720100] ? lockdep_hardirqs_on+0x421/0x5c0 [ 109.724666] ? trace_hardirqs_on+0xbd/0x2c0 [ 109.728965] ? lock_release+0x9f0/0x9f0 [ 109.732918] ? lock_sock_nested+0xe7/0x120 [ 109.737141] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 109.742252] ? skb_put+0x17b/0x1e0 [ 109.745806] ? memset+0x31/0x40 [ 109.749118] ? __nlmsg_put+0x14c/0x1b0 [ 109.752998] __tipc_add_sock_diag+0x22f/0x360 [ 109.757491] tipc_nl_sk_walk+0x122/0x1d0 [ 109.761546] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 109.766811] tipc_diag_dump+0x24/0x30 [ 109.770602] netlink_dump+0x519/0xd50 [ 109.774404] ? netlink_broadcast+0x50/0x50 [ 109.778651] __netlink_dump_start+0x4f1/0x6f0 [ 109.783141] ? kasan_check_read+0x11/0x20 [ 109.787310] ? tipc_data_ready+0x3f0/0x3f0 [ 109.791536] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 109.796648] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 109.801300] ? tipc_data_ready+0x3f0/0x3f0 [ 109.805515] ? tipc_unregister_sysctl+0x20/0x20 [ 109.810166] ? tipc_ioctl+0x3b0/0x3b0 [ 109.813958] ? netlink_deliver_tap+0x356/0xfb0 [ 109.818562] sock_diag_rcv_msg+0x31d/0x410 [ 109.822804] netlink_rcv_skb+0x172/0x440 [ 109.826855] ? sock_diag_bind+0x80/0x80 [ 109.830810] ? netlink_ack+0xbe0/0xbe0 [ 109.834693] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 109.839346] sock_diag_rcv+0x2a/0x40 [ 109.843040] netlink_unicast+0x5a0/0x760 [ 109.847091] ? netlink_attachskb+0x9a0/0x9a0 [ 109.851502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.857018] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 109.862017] netlink_sendmsg+0xa18/0xfc0 [ 109.866061] ? netlink_unicast+0x760/0x760 [ 109.870298] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 109.875211] ? apparmor_socket_sendmsg+0x29/0x30 [ 109.879949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.885487] ? security_socket_sendmsg+0x94/0xc0 [ 109.890233] ? netlink_unicast+0x760/0x760 [ 109.894451] sock_sendmsg+0xd5/0x120 [ 109.898148] ___sys_sendmsg+0x7fd/0x930 [ 109.902121] ? copy_msghdr_from_user+0x580/0x580 [ 109.906862] ? lock_downgrade+0x8f0/0x8f0 [ 109.910998] ? __fget_light+0x2f7/0x440 [ 109.914952] ? fget_raw+0x20/0x20 [ 109.918399] ? __fd_install+0x2db/0x880 [ 109.922370] ? get_unused_fd_flags+0x1a0/0x1a0 [ 109.926939] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 109.932457] ? sockfd_lookup_light+0xc5/0x160 [ 109.936933] __sys_sendmsg+0x11d/0x290 [ 109.940813] ? __ia32_sys_shutdown+0x80/0x80 [ 109.945205] ? __x64_sys_futex+0x47f/0x6a0 [ 109.949424] ? do_syscall_64+0x9a/0x820 [ 109.953379] ? do_syscall_64+0x9a/0x820 [ 109.957339] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 109.962431] ? trace_hardirqs_off+0xb8/0x2b0 [ 109.966847] __x64_sys_sendmsg+0x78/0xb0 [ 109.970902] do_syscall_64+0x1b9/0x820 [ 109.974788] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 109.980140] ? syscall_return_slowpath+0x5e0/0x5e0 [ 109.985054] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 109.990051] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 109.995048] ? recalc_sigpending_tsk+0x180/0x180 [ 109.999806] ? kasan_check_write+0x14/0x20 [ 110.004041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 110.008894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.014064] RIP: 0033:0x457099 [ 110.017245] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 110.036137] RSP: 002b:00007f0c4c67dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 110.043830] RAX: ffffffffffffffda RBX: 00007f0c4c67e6d4 RCX: 0000000000457099 [ 110.051090] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 110.058345] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 110.065599] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 110.072858] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000001 [ 110.080438] Dumping ftrace buffer: [ 110.083968] (ftrace buffer empty) [ 110.087655] Kernel Offset: disabled [ 110.091259] Rebooting in 86400 seconds..