[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 20.201728] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 23.587864] random: sshd: uninitialized urandom read (32 bytes read) [ 23.890685] random: sshd: uninitialized urandom read (32 bytes read) [ 24.452706] random: sshd: uninitialized urandom read (32 bytes read) [ 92.594057] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.225' (ECDSA) to the list of known hosts. [ 98.105037] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/08 18:51:27 parsed 1 programs [ 99.144456] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/08 18:51:29 executed programs: 0 [ 100.251175] IPVS: ftp: loaded support on port[0] = 21 [ 100.464252] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.470743] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.478320] device bridge_slave_0 entered promiscuous mode [ 100.495512] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.501869] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.509155] device bridge_slave_1 entered promiscuous mode [ 100.525024] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 100.541936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 100.585675] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 100.605841] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 100.671694] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 100.678945] team0: Port device team_slave_0 added [ 100.694784] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 100.701894] team0: Port device team_slave_1 added [ 100.719038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.737113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.754758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.772655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.865053] ip (4391) used greatest stack depth: 16280 bytes left [ 100.905722] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.912267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.919162] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.925679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.376386] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 101.382525] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.418500] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 101.434299] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 101.479036] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 101.485403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.492563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.529959] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.801650] ================================================================== [ 101.809099] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 101.815059] Read of size 8 at addr ffff8801b748a5b0 by task syz-executor0/4563 [ 101.822391] [ 101.824003] CPU: 0 PID: 4563 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 101.832384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.841717] Call Trace: [ 101.844300] dump_stack+0x1c9/0x2b4 [ 101.847917] ? dump_stack_print_info.cold.2+0x52/0x52 [ 101.853092] ? printk+0xa7/0xcf [ 101.856362] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 101.861111] ? sock_i_ino+0x94/0xa0 [ 101.864735] print_address_description+0x6c/0x20b [ 101.869563] ? sock_i_ino+0x94/0xa0 [ 101.873179] kasan_report.cold.7+0x242/0x30d [ 101.877581] __asan_report_load8_noabort+0x14/0x20 [ 101.882493] sock_i_ino+0x94/0xa0 [ 101.885932] tipc_sk_fill_sock_diag+0x3be/0xdb0 [ 101.890582] ? tipc_diag_dump+0x30/0x30 [ 101.894590] ? tipc_getname+0x7f0/0x7f0 [ 101.898572] ? print_usage_bug+0xc0/0xc0 [ 101.902624] ? graph_lock+0x170/0x170 [ 101.906416] ? __lock_sock+0x203/0x360 [ 101.910295] ? find_held_lock+0x36/0x1c0 [ 101.914344] ? mark_held_locks+0xc9/0x160 [ 101.918483] ? __local_bh_enable_ip+0x161/0x230 [ 101.923138] ? __local_bh_enable_ip+0x161/0x230 [ 101.927803] ? lockdep_hardirqs_on+0x421/0x5c0 [ 101.932372] ? trace_hardirqs_on+0xbd/0x2c0 [ 101.936674] ? lock_release+0x9f0/0x9f0 [ 101.940633] ? lock_sock_nested+0xe7/0x120 [ 101.944866] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 101.949931] ? skb_put+0x17b/0x1e0 [ 101.953467] ? memset+0x31/0x40 [ 101.956732] ? __nlmsg_put+0x14c/0x1b0 [ 101.960612] __tipc_add_sock_diag+0x22f/0x360 [ 101.965101] tipc_nl_sk_walk+0x122/0x1d0 [ 101.969155] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 101.974429] tipc_diag_dump+0x24/0x30 [ 101.978283] netlink_dump+0x519/0xd50 [ 101.982083] ? netlink_broadcast+0x50/0x50 [ 101.986357] __netlink_dump_start+0x4f1/0x6f0 [ 101.990848] ? kasan_check_read+0x11/0x20 [ 101.995052] ? tipc_data_ready+0x3f0/0x3f0 [ 101.999285] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 102.004380] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 102.009107] ? tipc_data_ready+0x3f0/0x3f0 [ 102.013349] ? tipc_unregister_sysctl+0x20/0x20 [ 102.018202] ? tipc_ioctl+0x3b0/0x3b0 [ 102.022009] ? netlink_deliver_tap+0x356/0xfb0 [ 102.026590] sock_diag_rcv_msg+0x31d/0x410 [ 102.030814] netlink_rcv_skb+0x172/0x440 [ 102.034859] ? sock_diag_bind+0x80/0x80 [ 102.038819] ? netlink_ack+0xbe0/0xbe0 [ 102.042693] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 102.047357] sock_diag_rcv+0x2a/0x40 [ 102.051056] netlink_unicast+0x5a0/0x760 [ 102.055112] ? netlink_attachskb+0x9a0/0x9a0 [ 102.059509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.065032] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 102.070034] netlink_sendmsg+0xa18/0xfc0 [ 102.074085] ? netlink_unicast+0x760/0x760 [ 102.078304] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 102.083228] ? apparmor_socket_sendmsg+0x29/0x30 [ 102.087978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.093502] ? security_socket_sendmsg+0x94/0xc0 [ 102.098253] ? netlink_unicast+0x760/0x760 [ 102.102478] sock_sendmsg+0xd5/0x120 [ 102.106184] ___sys_sendmsg+0x7fd/0x930 [ 102.110155] ? copy_msghdr_from_user+0x580/0x580 [ 102.114897] ? lock_downgrade+0x8f0/0x8f0 [ 102.119403] ? __fget_light+0x2f7/0x440 [ 102.123367] ? fget_raw+0x20/0x20 [ 102.126815] ? __fd_install+0x2db/0x880 [ 102.130776] ? get_unused_fd_flags+0x1a0/0x1a0 [ 102.135351] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 102.140874] ? sockfd_lookup_light+0xc5/0x160 [ 102.145355] __sys_sendmsg+0x11d/0x290 [ 102.149237] ? __ia32_sys_shutdown+0x80/0x80 [ 102.153642] ? __x64_sys_futex+0x47f/0x6a0 [ 102.157862] ? do_syscall_64+0x9a/0x820 [ 102.161824] ? do_syscall_64+0x9a/0x820 [ 102.165787] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 102.170898] ? trace_hardirqs_off+0xb8/0x2b0 [ 102.175311] __x64_sys_sendmsg+0x78/0xb0 [ 102.179361] do_syscall_64+0x1b9/0x820 [ 102.183242] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 102.188601] ? syscall_return_slowpath+0x5e0/0x5e0 [ 102.193516] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 102.198519] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 102.203520] ? recalc_sigpending_tsk+0x180/0x180 [ 102.208266] ? kasan_check_write+0x14/0x20 [ 102.212500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 102.217332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.222502] RIP: 0033:0x457099 [ 102.225679] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 102.244562] RSP: 002b:00007f14749b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 102.252259] RAX: ffffffffffffffda RBX: 00007f14749b46d4 RCX: 0000000000457099 [ 102.259510] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 102.266761] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 102.274017] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 102.281271] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000001 [ 102.288531] [ 102.290146] Allocated by task 4562: [ 102.293759] save_stack+0x43/0xd0 [ 102.297195] kasan_kmalloc+0xc4/0xe0 [ 102.300903] kasan_slab_alloc+0x12/0x20 [ 102.304860] kmem_cache_alloc+0x12e/0x710 [ 102.309007] sock_alloc_inode+0x1d/0x260 [ 102.313050] alloc_inode+0x63/0x190 [ 102.316662] new_inode_pseudo+0x71/0x1a0 [ 102.320707] sock_alloc+0x41/0x270 [ 102.324235] __sock_create+0x175/0x940 [ 102.328110] __sys_socket+0x106/0x260 [ 102.331891] __x64_sys_socket+0x73/0xb0 [ 102.335867] do_syscall_64+0x1b9/0x820 [ 102.339741] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.344909] [ 102.346519] Freed by task 4561: [ 102.349780] save_stack+0x43/0xd0 [ 102.353233] __kasan_slab_free+0x11a/0x170 [ 102.357456] kasan_slab_free+0xe/0x10 [ 102.361246] kmem_cache_free+0x86/0x280 [ 102.365210] sock_destroy_inode+0x51/0x60 [ 102.369355] destroy_inode+0x159/0x200 [ 102.373232] evict+0x5d5/0x990 [ 102.376411] iput+0x5fa/0xa00 [ 102.379497] dentry_unlink_inode+0x461/0x5e0 [ 102.383887] __dentry_kill+0x44c/0x7a0 [ 102.387758] dentry_kill+0xc9/0x5a0 [ 102.391364] dput.part.26+0x66b/0x7a0 [ 102.395149] dput+0x15/0x20 [ 102.398083] __fput+0x505/0xa80 [ 102.401347] ____fput+0x15/0x20 [ 102.404611] task_work_run+0x1e8/0x2a0 [ 102.408482] exit_to_usermode_loop+0x318/0x380 [ 102.413048] do_syscall_64+0x6be/0x820 [ 102.416923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.422088] [ 102.423702] The buggy address belongs to the object at ffff8801b748a540 [ 102.423702] which belongs to the cache sock_inode_cache(17:syz0) of size 984 [ 102.437554] The buggy address is located 112 bytes inside of [ 102.437554] 984-byte region [ffff8801b748a540, ffff8801b748a918) [ 102.449415] The buggy address belongs to the page: [ 102.454327] page:ffffea0006dd2280 count:1 mapcount:0 mapping:ffff8801cdfde840 index:0xffff8801b748affd [ 102.463758] flags: 0x2fffc0000000100(slab) [ 102.467980] raw: 02fffc0000000100 ffffea0006dd2c88 ffffea0006dd23c8 ffff8801cdfde840 [ 102.475940] raw: ffff8801b748affd ffff8801b748a0c0 0000000100000003 ffff8801c41fca40 [ 102.483807] page dumped because: kasan: bad access detected [ 102.489504] page->mem_cgroup:ffff8801c41fca40 [ 102.493975] [ 102.495588] Memory state around the buggy address: [ 102.500499] ffff8801b748a480: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 102.507840] ffff8801b748a500: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 102.515213] >ffff8801b748a580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.522565] ^ [ 102.527482] ffff8801b748a600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.534821] ffff8801b748a680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.542156] ================================================================== [ 102.549490] Disabling lock debugging due to kernel taint [ 102.554990] Kernel panic - not syncing: panic_on_warn set ... [ 102.554990] [ 102.562371] CPU: 0 PID: 4563 Comm: syz-executor0 Tainted: G B 4.19.0-rc2-next-20180904+ #55 [ 102.572156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.581488] Call Trace: [ 102.584061] dump_stack+0x1c9/0x2b4 [ 102.587674] ? dump_stack_print_info.cold.2+0x52/0x52 [ 102.592848] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 102.597589] panic+0x238/0x4e7 [ 102.600763] ? add_taint.cold.5+0x16/0x16 [ 102.604892] ? trace_hardirqs_on+0xb4/0x2c0 [ 102.609219] ? trace_hardirqs_on+0x9a/0x2c0 [ 102.613532] ? sock_i_ino+0x94/0xa0 [ 102.617140] kasan_end_report+0x47/0x4f [ 102.621100] kasan_report.cold.7+0x76/0x30d [ 102.625405] __asan_report_load8_noabort+0x14/0x20 [ 102.630317] sock_i_ino+0x94/0xa0 [ 102.633754] tipc_sk_fill_sock_diag+0x3be/0xdb0 [ 102.638404] ? tipc_diag_dump+0x30/0x30 [ 102.642362] ? tipc_getname+0x7f0/0x7f0 [ 102.646318] ? print_usage_bug+0xc0/0xc0 [ 102.650365] ? graph_lock+0x170/0x170 [ 102.654149] ? __lock_sock+0x203/0x360 [ 102.658024] ? find_held_lock+0x36/0x1c0 [ 102.662068] ? mark_held_locks+0xc9/0x160 [ 102.666209] ? __local_bh_enable_ip+0x161/0x230 [ 102.670868] ? __local_bh_enable_ip+0x161/0x230 [ 102.675520] ? lockdep_hardirqs_on+0x421/0x5c0 [ 102.680084] ? trace_hardirqs_on+0xbd/0x2c0 [ 102.684387] ? lock_release+0x9f0/0x9f0 [ 102.688353] ? lock_sock_nested+0xe7/0x120 [ 102.692578] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 102.697588] ? skb_put+0x17b/0x1e0 [ 102.701111] ? memset+0x31/0x40 [ 102.704392] ? __nlmsg_put+0x14c/0x1b0 [ 102.708269] __tipc_add_sock_diag+0x22f/0x360 [ 102.712750] tipc_nl_sk_walk+0x122/0x1d0 [ 102.716795] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 102.722053] tipc_diag_dump+0x24/0x30 [ 102.725837] netlink_dump+0x519/0xd50 [ 102.729619] ? netlink_broadcast+0x50/0x50 [ 102.733841] __netlink_dump_start+0x4f1/0x6f0 [ 102.738320] ? kasan_check_read+0x11/0x20 [ 102.742446] ? tipc_data_ready+0x3f0/0x3f0 [ 102.746667] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 102.751754] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 102.756408] ? tipc_data_ready+0x3f0/0x3f0 [ 102.760628] ? tipc_unregister_sysctl+0x20/0x20 [ 102.765280] ? tipc_ioctl+0x3b0/0x3b0 [ 102.769065] ? netlink_deliver_tap+0x356/0xfb0 [ 102.773637] sock_diag_rcv_msg+0x31d/0x410 [ 102.777856] netlink_rcv_skb+0x172/0x440 [ 102.781898] ? sock_diag_bind+0x80/0x80 [ 102.785854] ? netlink_ack+0xbe0/0xbe0 [ 102.789724] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 102.794380] sock_diag_rcv+0x2a/0x40 [ 102.798102] netlink_unicast+0x5a0/0x760 [ 102.802148] ? netlink_attachskb+0x9a0/0x9a0 [ 102.806541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.812062] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 102.817065] netlink_sendmsg+0xa18/0xfc0 [ 102.821114] ? netlink_unicast+0x760/0x760 [ 102.825339] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 102.830252] ? apparmor_socket_sendmsg+0x29/0x30 [ 102.834993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.840514] ? security_socket_sendmsg+0x94/0xc0 [ 102.845253] ? netlink_unicast+0x760/0x760 [ 102.849471] sock_sendmsg+0xd5/0x120 [ 102.853173] ___sys_sendmsg+0x7fd/0x930 [ 102.857134] ? copy_msghdr_from_user+0x580/0x580 [ 102.861874] ? lock_downgrade+0x8f0/0x8f0 [ 102.866008] ? __fget_light+0x2f7/0x440 [ 102.869982] ? fget_raw+0x20/0x20 [ 102.873429] ? __fd_install+0x2db/0x880 [ 102.877386] ? get_unused_fd_flags+0x1a0/0x1a0 [ 102.881955] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 102.887493] ? sockfd_lookup_light+0xc5/0x160 [ 102.891982] __sys_sendmsg+0x11d/0x290 [ 102.895852] ? __ia32_sys_shutdown+0x80/0x80 [ 102.900246] ? __x64_sys_futex+0x47f/0x6a0 [ 102.904462] ? do_syscall_64+0x9a/0x820 [ 102.908418] ? do_syscall_64+0x9a/0x820 [ 102.912375] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 102.917460] ? trace_hardirqs_off+0xb8/0x2b0 [ 102.921849] __x64_sys_sendmsg+0x78/0xb0 [ 102.925891] do_syscall_64+0x1b9/0x820 [ 102.929762] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 102.935130] ? syscall_return_slowpath+0x5e0/0x5e0 [ 102.940044] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 102.945042] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 102.950038] ? recalc_sigpending_tsk+0x180/0x180 [ 102.954777] ? kasan_check_write+0x14/0x20 [ 102.958995] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 102.963823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.968995] RIP: 0033:0x457099 [ 102.972173] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 102.991064] RSP: 002b:00007f14749b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 102.998760] RAX: ffffffffffffffda RBX: 00007f14749b46d4 RCX: 0000000000457099 [ 103.006010] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 103.013262] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 103.020516] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 103.027789] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000001 [ 103.035346] Dumping ftrace buffer: [ 103.038875] (ftrace buffer empty) [ 103.042560] Kernel Offset: disabled [ 103.046168] Rebooting in 86400 seconds..