[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 22.880460] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 25.365450] random: sshd: uninitialized urandom read (32 bytes read) [ 25.705570] random: sshd: uninitialized urandom read (32 bytes read) [ 26.269601] random: sshd: uninitialized urandom read (32 bytes read) [ 93.710983] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.34' (ECDSA) to the list of known hosts. [ 99.328830] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/06 04:25:34 parsed 1 programs [ 100.449562] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/06 04:25:36 executed programs: 0 [ 101.735959] IPVS: ftp: loaded support on port[0] = 21 [ 101.950179] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.956730] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.964104] device bridge_slave_0 entered promiscuous mode [ 101.980842] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.987210] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.994081] device bridge_slave_1 entered promiscuous mode [ 102.010045] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 102.026037] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 102.069761] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 102.089676] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 102.158589] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 102.165888] team0: Port device team_slave_0 added [ 102.181246] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 102.188472] team0: Port device team_slave_1 added [ 102.204215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.222962] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 102.242662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 102.261092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.389235] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.395835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.402876] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.409394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.867066] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 102.873191] 8021q: adding VLAN 0 to HW filter on device bond0 [ 102.900152] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 102.929567] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.974530] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.980672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.988871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.029329] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.398229] ================================================================== [ 103.405830] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 103.411783] Read of size 8 at addr ffff8801b276fa70 by task syz-executor0/4956 [ 103.419140] [ 103.420771] CPU: 0 PID: 4956 Comm: syz-executor0 Not tainted 4.19.0-rc2+ #204 [ 103.428020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.437358] Call Trace: [ 103.439943] dump_stack+0x1c9/0x2b4 [ 103.443565] ? dump_stack_print_info.cold.2+0x52/0x52 [ 103.448738] ? printk+0xa7/0xcf [ 103.452014] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 103.456757] ? sock_i_ino+0x94/0xa0 [ 103.460419] print_address_description+0x6c/0x20b [ 103.465266] ? sock_i_ino+0x94/0xa0 [ 103.468879] kasan_report.cold.7+0x242/0x30d [ 103.473272] __asan_report_load8_noabort+0x14/0x20 [ 103.478186] sock_i_ino+0x94/0xa0 [ 103.481622] tipc_sk_fill_sock_diag+0x3be/0xdb0 [ 103.486279] ? tipc_diag_dump+0x30/0x30 [ 103.490244] ? tipc_getname+0x7f0/0x7f0 [ 103.494204] ? print_usage_bug+0xc0/0xc0 [ 103.498246] ? graph_lock+0x170/0x170 [ 103.502028] ? __lock_sock+0x203/0x360 [ 103.505925] ? find_held_lock+0x36/0x1c0 [ 103.509966] ? mark_held_locks+0xc9/0x160 [ 103.514098] ? __local_bh_enable_ip+0x161/0x230 [ 103.518766] ? __local_bh_enable_ip+0x161/0x230 [ 103.523416] ? lockdep_hardirqs_on+0x421/0x5c0 [ 103.527996] ? trace_hardirqs_on+0xbd/0x2c0 [ 103.532295] ? lock_release+0x9f0/0x9f0 [ 103.536249] ? lock_sock_nested+0xe7/0x120 [ 103.540465] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 103.545462] ? skb_put+0x17b/0x1e0 [ 103.549016] ? memset+0x31/0x40 [ 103.552281] ? __nlmsg_put+0x14c/0x1b0 [ 103.556154] __tipc_add_sock_diag+0x22f/0x360 [ 103.560658] tipc_nl_sk_walk+0x122/0x1d0 [ 103.564702] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 103.569960] tipc_diag_dump+0x24/0x30 [ 103.573744] netlink_dump+0x519/0xd50 [ 103.577530] ? netlink_broadcast+0x50/0x50 [ 103.581751] __netlink_dump_start+0x4f1/0x6f0 [ 103.586225] ? kasan_check_read+0x11/0x20 [ 103.590366] ? tipc_data_ready+0x3f0/0x3f0 [ 103.594585] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 103.599669] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 103.604319] ? tipc_data_ready+0x3f0/0x3f0 [ 103.608539] ? tipc_unregister_sysctl+0x20/0x20 [ 103.613201] ? tipc_ioctl+0x3b0/0x3b0 [ 103.616983] ? netlink_deliver_tap+0x356/0xfb0 [ 103.621552] sock_diag_rcv_msg+0x31d/0x410 [ 103.625771] netlink_rcv_skb+0x172/0x440 [ 103.629814] ? sock_diag_bind+0x80/0x80 [ 103.633768] ? netlink_ack+0xbe0/0xbe0 [ 103.637638] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 103.642290] sock_diag_rcv+0x2a/0x40 [ 103.645994] netlink_unicast+0x5a0/0x760 [ 103.650042] ? netlink_attachskb+0x9a0/0x9a0 [ 103.654433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 103.660136] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 103.665222] netlink_sendmsg+0xa18/0xfc0 [ 103.669278] ? netlink_unicast+0x760/0x760 [ 103.673513] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 103.678439] ? apparmor_socket_sendmsg+0x29/0x30 [ 103.683183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 103.688701] ? security_socket_sendmsg+0x94/0xc0 [ 103.693437] ? netlink_unicast+0x760/0x760 [ 103.697727] sock_sendmsg+0xd5/0x120 [ 103.701435] ___sys_sendmsg+0x7fd/0x930 [ 103.705395] ? copy_msghdr_from_user+0x580/0x580 [ 103.710136] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 103.715224] ? do_raw_spin_unlock+0xa7/0x2f0 [ 103.719615] ? __release_sock+0x276/0x3a0 [ 103.723748] ? __fget_light+0x2f7/0x440 [ 103.727705] ? __local_bh_enable_ip+0x161/0x230 [ 103.732357] ? fget_raw+0x20/0x20 [ 103.735794] ? __fget_light+0x2f7/0x440 [ 103.739754] ? fget_raw+0x20/0x20 [ 103.743198] ? tipc_nametbl_build_group+0x279/0x360 [ 103.748203] ? tipc_setsockopt+0x726/0xd70 [ 103.752426] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 103.758060] ? sockfd_lookup_light+0xc5/0x160 [ 103.762541] __sys_sendmsg+0x11d/0x290 [ 103.766413] ? __ia32_sys_shutdown+0x80/0x80 [ 103.770815] ? __x64_sys_futex+0x47f/0x6a0 [ 103.775030] ? do_syscall_64+0x9a/0x820 [ 103.778987] ? do_syscall_64+0x9a/0x820 [ 103.782963] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 103.788048] __x64_sys_sendmsg+0x78/0xb0 [ 103.792092] do_syscall_64+0x1b9/0x820 [ 103.795975] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 103.801327] ? syscall_return_slowpath+0x5e0/0x5e0 [ 103.806331] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 103.811173] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 103.816178] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 103.821182] ? prepare_exit_to_usermode+0x291/0x3b0 [ 103.826188] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 103.831021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.836191] RIP: 0033:0x457099 [ 103.839365] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 103.858244] RSP: 002b:00007fb7f8831c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 103.865936] RAX: ffffffffffffffda RBX: 00007fb7f88326d4 RCX: 0000000000457099 [ 103.873184] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 103.880434] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 103.887736] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 103.894997] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 103.902703] [ 103.904316] Allocated by task 4956: [ 103.908031] save_stack+0x43/0xd0 [ 103.911474] kasan_kmalloc+0xc4/0xe0 [ 103.915177] kasan_slab_alloc+0x12/0x20 [ 103.919133] kmem_cache_alloc+0x12e/0x710 [ 103.923276] sock_alloc_inode+0x1d/0x260 [ 103.927321] alloc_inode+0x63/0x190 [ 103.930928] new_inode_pseudo+0x71/0x1a0 [ 103.934968] sock_alloc+0x41/0x270 [ 103.938489] __sock_create+0x175/0x940 [ 103.942355] __sys_socket+0x106/0x260 [ 103.946151] __x64_sys_socket+0x73/0xb0 [ 103.950118] do_syscall_64+0x1b9/0x820 [ 103.953992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.959156] [ 103.960772] Freed by task 4955: [ 103.964032] save_stack+0x43/0xd0 [ 103.967467] __kasan_slab_free+0x11a/0x170 [ 103.971684] kasan_slab_free+0xe/0x10 [ 103.975478] kmem_cache_free+0x86/0x280 [ 103.979432] sock_destroy_inode+0x51/0x60 [ 103.983558] destroy_inode+0x159/0x200 [ 103.987426] evict+0x5d5/0x990 [ 103.990599] iput+0x5fa/0xa00 [ 103.993691] dentry_unlink_inode+0x461/0x5e0 [ 103.998080] __dentry_kill+0x44c/0x7a0 [ 104.001947] dentry_kill+0xc9/0x5a0 [ 104.005553] dput.part.26+0x66b/0x7a0 [ 104.009331] dput+0x15/0x20 [ 104.012248] __fput+0x4d4/0xa40 [ 104.015509] ____fput+0x15/0x20 [ 104.018767] task_work_run+0x1e8/0x2a0 [ 104.022640] exit_to_usermode_loop+0x318/0x380 [ 104.027208] do_syscall_64+0x6be/0x820 [ 104.031077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.036244] [ 104.037852] The buggy address belongs to the object at ffff8801b276fa00 [ 104.037852] which belongs to the cache sock_inode_cache(17:syz0) of size 984 [ 104.051707] The buggy address is located 112 bytes inside of [ 104.051707] 984-byte region [ffff8801b276fa00, ffff8801b276fdd8) [ 104.063558] The buggy address belongs to the page: [ 104.068469] page:ffffea0006c9dbc0 count:1 mapcount:0 mapping:ffff8801ca528780 index:0xffff8801b276fffd [ 104.077897] flags: 0x2fffc0000000100(slab) [ 104.082117] raw: 02fffc0000000100 ffffea0006c9db48 ffffea000755b088 ffff8801ca528780 [ 104.089983] raw: ffff8801b276fffd ffff8801b276f100 0000000100000003 ffff8801b5234200 [ 104.097838] page dumped because: kasan: bad access detected [ 104.103525] page->mem_cgroup:ffff8801b5234200 [ 104.107994] [ 104.109600] Memory state around the buggy address: [ 104.114523] ffff8801b276f900: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 104.121861] ffff8801b276f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.129201] >ffff8801b276fa00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 104.136535] ^ [ 104.143524] ffff8801b276fa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 104.150862] ffff8801b276fb00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 104.158199] ================================================================== [ 104.165533] Disabling lock debugging due to kernel taint [ 104.171025] Kernel panic - not syncing: panic_on_warn set ... [ 104.171025] [ 104.178380] CPU: 0 PID: 4956 Comm: syz-executor0 Tainted: G B 4.19.0-rc2+ #204 [ 104.187015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.196348] Call Trace: [ 104.198922] dump_stack+0x1c9/0x2b4 [ 104.202546] ? dump_stack_print_info.cold.2+0x52/0x52 [ 104.207731] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 104.212731] panic+0x238/0x4e7 [ 104.215909] ? add_taint.cold.5+0x16/0x16 [ 104.220067] ? trace_hardirqs_on+0xb4/0x2c0 [ 104.224370] ? trace_hardirqs_on+0x9a/0x2c0 [ 104.228678] ? sock_i_ino+0x94/0xa0 [ 104.232301] kasan_end_report+0x47/0x4f [ 104.236271] kasan_report.cold.7+0x76/0x30d [ 104.240597] __asan_report_load8_noabort+0x14/0x20 [ 104.245508] sock_i_ino+0x94/0xa0 [ 104.248948] tipc_sk_fill_sock_diag+0x3be/0xdb0 [ 104.253604] ? tipc_diag_dump+0x30/0x30 [ 104.257560] ? tipc_getname+0x7f0/0x7f0 [ 104.261519] ? print_usage_bug+0xc0/0xc0 [ 104.265562] ? graph_lock+0x170/0x170 [ 104.269348] ? __lock_sock+0x203/0x360 [ 104.273219] ? find_held_lock+0x36/0x1c0 [ 104.277266] ? mark_held_locks+0xc9/0x160 [ 104.281404] ? __local_bh_enable_ip+0x161/0x230 [ 104.286054] ? __local_bh_enable_ip+0x161/0x230 [ 104.290711] ? lockdep_hardirqs_on+0x421/0x5c0 [ 104.295292] ? trace_hardirqs_on+0xbd/0x2c0 [ 104.299626] ? lock_release+0x9f0/0x9f0 [ 104.303582] ? lock_sock_nested+0xe7/0x120 [ 104.307801] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 104.312805] ? skb_put+0x17b/0x1e0 [ 104.316343] ? memset+0x31/0x40 [ 104.319608] ? __nlmsg_put+0x14c/0x1b0 [ 104.323483] __tipc_add_sock_diag+0x22f/0x360 [ 104.327963] tipc_nl_sk_walk+0x122/0x1d0 [ 104.332006] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 104.337266] tipc_diag_dump+0x24/0x30 [ 104.341055] netlink_dump+0x519/0xd50 [ 104.344839] ? netlink_broadcast+0x50/0x50 [ 104.349057] __netlink_dump_start+0x4f1/0x6f0 [ 104.353535] ? kasan_check_read+0x11/0x20 [ 104.357670] ? tipc_data_ready+0x3f0/0x3f0 [ 104.361905] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 104.366988] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 104.371654] ? tipc_data_ready+0x3f0/0x3f0 [ 104.375870] ? tipc_unregister_sysctl+0x20/0x20 [ 104.380523] ? tipc_ioctl+0x3b0/0x3b0 [ 104.384329] ? netlink_deliver_tap+0x356/0xfb0 [ 104.388903] sock_diag_rcv_msg+0x31d/0x410 [ 104.393148] netlink_rcv_skb+0x172/0x440 [ 104.397201] ? sock_diag_bind+0x80/0x80 [ 104.401158] ? netlink_ack+0xbe0/0xbe0 [ 104.405040] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 104.409700] sock_diag_rcv+0x2a/0x40 [ 104.413400] netlink_unicast+0x5a0/0x760 [ 104.417452] ? netlink_attachskb+0x9a0/0x9a0 [ 104.421847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.427371] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 104.432373] netlink_sendmsg+0xa18/0xfc0 [ 104.436420] ? netlink_unicast+0x760/0x760 [ 104.440677] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 104.445589] ? apparmor_socket_sendmsg+0x29/0x30 [ 104.450335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.455857] ? security_socket_sendmsg+0x94/0xc0 [ 104.460594] ? netlink_unicast+0x760/0x760 [ 104.464813] sock_sendmsg+0xd5/0x120 [ 104.468541] ___sys_sendmsg+0x7fd/0x930 [ 104.472500] ? copy_msghdr_from_user+0x580/0x580 [ 104.477247] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 104.482337] ? do_raw_spin_unlock+0xa7/0x2f0 [ 104.486730] ? __release_sock+0x276/0x3a0 [ 104.490886] ? __fget_light+0x2f7/0x440 [ 104.494855] ? __local_bh_enable_ip+0x161/0x230 [ 104.499529] ? fget_raw+0x20/0x20 [ 104.502982] ? __fget_light+0x2f7/0x440 [ 104.506944] ? fget_raw+0x20/0x20 [ 104.510382] ? tipc_nametbl_build_group+0x279/0x360 [ 104.515390] ? tipc_setsockopt+0x726/0xd70 [ 104.519646] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 104.525174] ? sockfd_lookup_light+0xc5/0x160 [ 104.529655] __sys_sendmsg+0x11d/0x290 [ 104.533537] ? __ia32_sys_shutdown+0x80/0x80 [ 104.537946] ? __x64_sys_futex+0x47f/0x6a0 [ 104.542173] ? do_syscall_64+0x9a/0x820 [ 104.546129] ? do_syscall_64+0x9a/0x820 [ 104.550087] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 104.555180] __x64_sys_sendmsg+0x78/0xb0 [ 104.559226] do_syscall_64+0x1b9/0x820 [ 104.563100] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 104.568452] ? syscall_return_slowpath+0x5e0/0x5e0 [ 104.573383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 104.578229] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 104.583242] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 104.588241] ? prepare_exit_to_usermode+0x291/0x3b0 [ 104.593243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 104.598092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.603273] RIP: 0033:0x457099 [ 104.606464] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 104.625349] RSP: 002b:00007fb7f8831c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 104.633037] RAX: ffffffffffffffda RBX: 00007fb7f88326d4 RCX: 0000000000457099 [ 104.640308] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 104.647586] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 104.654836] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 104.662087] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 104.669673] Dumping ftrace buffer: [ 104.673206] (ftrace buffer empty) [ 104.676894] Kernel Offset: disabled [ 104.680501] Rebooting in 86400 seconds..