[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 19.027012] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 24.745011] random: sshd: uninitialized urandom read (32 bytes read) [ 25.092643] random: sshd: uninitialized urandom read (32 bytes read) [ 25.658582] random: sshd: uninitialized urandom read (32 bytes read) [ 182.031574] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.9' (ECDSA) to the list of known hosts. [ 187.988576] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/09 00:40:40 parsed 1 programs [ 189.028309] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/09 00:40:42 executed programs: 0 [ 190.129223] IPVS: ftp: loaded support on port[0] = 21 [ 190.340212] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.346671] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.354002] device bridge_slave_0 entered promiscuous mode [ 190.371316] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.377850] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.384878] device bridge_slave_1 entered promiscuous mode [ 190.401108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 190.417638] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 190.459930] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.478430] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.542007] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.549284] team0: Port device team_slave_0 added [ 190.564792] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.571884] team0: Port device team_slave_1 added [ 190.586988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.604627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.621197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.638587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.762248] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.768700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.775555] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.781904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.220039] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 191.226468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.271954] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 191.318448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.327174] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 191.367171] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.648507] ================================================================== [ 191.655983] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 191.662057] Read of size 8 at addr ffff8801b74835b0 by task syz-executor0/4556 [ 191.669513] [ 191.671131] CPU: 1 PID: 4556 Comm: syz-executor0 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 191.679516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.688858] Call Trace: [ 191.691495] dump_stack+0x1c9/0x2b4 [ 191.695122] ? dump_stack_print_info.cold.2+0x52/0x52 [ 191.700297] ? printk+0xa7/0xcf [ 191.703575] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 191.708331] ? sock_i_ino+0x94/0xa0 [ 191.711948] print_address_description+0x6c/0x20b [ 191.716780] ? sock_i_ino+0x94/0xa0 [ 191.720409] kasan_report.cold.7+0x242/0x30d [ 191.724818] __asan_report_load8_noabort+0x14/0x20 [ 191.729733] sock_i_ino+0x94/0xa0 [ 191.733193] tipc_sk_fill_sock_diag+0x3be/0xdb0 [ 191.737849] ? tipc_diag_dump+0x30/0x30 [ 191.741892] ? tipc_getname+0x7f0/0x7f0 [ 191.745861] ? print_usage_bug+0xc0/0xc0 [ 191.749912] ? graph_lock+0x170/0x170 [ 191.753701] ? __lock_sock+0x203/0x360 [ 191.757577] ? find_held_lock+0x36/0x1c0 [ 191.761673] ? mark_held_locks+0xc9/0x160 [ 191.765827] ? __local_bh_enable_ip+0x161/0x230 [ 191.770479] ? __local_bh_enable_ip+0x161/0x230 [ 191.775129] ? lockdep_hardirqs_on+0x421/0x5c0 [ 191.779699] ? trace_hardirqs_on+0xbd/0x2c0 [ 191.784000] ? lock_release+0x9f0/0x9f0 [ 191.788218] ? lock_sock_nested+0xe7/0x120 [ 191.792470] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 191.797493] ? skb_put+0x17b/0x1e0 [ 191.801042] ? memset+0x31/0x40 [ 191.804322] ? __nlmsg_put+0x14c/0x1b0 [ 191.808202] __tipc_add_sock_diag+0x22f/0x360 [ 191.812688] tipc_nl_sk_walk+0x122/0x1d0 [ 191.816737] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 191.822098] tipc_diag_dump+0x24/0x30 [ 191.825899] netlink_dump+0x519/0xd50 [ 191.829712] ? netlink_broadcast+0x50/0x50 [ 191.833959] __netlink_dump_start+0x4f1/0x6f0 [ 191.838447] ? kasan_check_read+0x11/0x20 [ 191.842582] ? tipc_data_ready+0x3f0/0x3f0 [ 191.846816] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 191.851916] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 191.856571] ? tipc_data_ready+0x3f0/0x3f0 [ 191.860792] ? tipc_unregister_sysctl+0x20/0x20 [ 191.865457] ? tipc_ioctl+0x3b0/0x3b0 [ 191.869253] ? netlink_deliver_tap+0x356/0xfb0 [ 191.873855] sock_diag_rcv_msg+0x31d/0x410 [ 191.878222] netlink_rcv_skb+0x172/0x440 [ 191.882273] ? sock_diag_bind+0x80/0x80 [ 191.886236] ? netlink_ack+0xbe0/0xbe0 [ 191.890111] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 191.894774] sock_diag_rcv+0x2a/0x40 [ 191.898488] netlink_unicast+0x5a0/0x760 [ 191.902555] ? netlink_attachskb+0x9a0/0x9a0 [ 191.906957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.912601] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 191.917610] netlink_sendmsg+0xa18/0xfc0 [ 191.921676] ? netlink_unicast+0x760/0x760 [ 191.925912] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 191.931117] ? apparmor_socket_sendmsg+0x29/0x30 [ 191.935868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.941457] ? security_socket_sendmsg+0x94/0xc0 [ 191.946212] ? netlink_unicast+0x760/0x760 [ 191.950435] sock_sendmsg+0xd5/0x120 [ 191.954136] ___sys_sendmsg+0x7fd/0x930 [ 191.958099] ? __switch_to_asm+0x40/0x70 [ 191.962150] ? __switch_to_asm+0x40/0x70 [ 191.966203] ? copy_msghdr_from_user+0x580/0x580 [ 191.970954] ? __sched_text_start+0x8/0x8 [ 191.975104] ? __fget_light+0x2f7/0x440 [ 191.979069] ? __local_bh_enable_ip+0x161/0x230 [ 191.983726] ? fget_raw+0x20/0x20 [ 191.987174] ? __release_sock+0x3a0/0x3a0 [ 191.991347] ? tipc_nametbl_build_group+0x279/0x360 [ 191.996357] ? tipc_setsockopt+0x726/0xd70 [ 192.000587] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.006117] ? sockfd_lookup_light+0xc5/0x160 [ 192.010606] __sys_sendmsg+0x11d/0x290 [ 192.014501] ? __ia32_sys_shutdown+0x80/0x80 [ 192.018913] ? fput+0x130/0x1a0 [ 192.022195] ? __x64_sys_futex+0x47f/0x6a0 [ 192.026434] ? do_syscall_64+0x9a/0x820 [ 192.030398] ? do_syscall_64+0x9a/0x820 [ 192.034365] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 192.039470] __x64_sys_sendmsg+0x78/0xb0 [ 192.043543] do_syscall_64+0x1b9/0x820 [ 192.047433] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 192.052787] ? syscall_return_slowpath+0x5e0/0x5e0 [ 192.057713] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 192.062722] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 192.067734] ? recalc_sigpending_tsk+0x180/0x180 [ 192.072501] ? kasan_check_write+0x14/0x20 [ 192.076745] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 192.081582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.086780] RIP: 0033:0x457099 [ 192.089988] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.108884] RSP: 002b:00007efdc92a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 192.116589] RAX: ffffffffffffffda RBX: 00007efdc92aa6d4 RCX: 0000000000457099 [ 192.123868] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 192.131129] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 192.138386] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 192.145642] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 192.152902] [ 192.154522] Allocated by task 4556: [ 192.158144] save_stack+0x43/0xd0 [ 192.161582] kasan_kmalloc+0xc4/0xe0 [ 192.165280] kasan_slab_alloc+0x12/0x20 [ 192.169243] kmem_cache_alloc+0x12e/0x710 [ 192.173377] sock_alloc_inode+0x1d/0x260 [ 192.177442] alloc_inode+0x63/0x190 [ 192.181057] new_inode_pseudo+0x71/0x1a0 [ 192.185103] sock_alloc+0x41/0x270 [ 192.188626] __sock_create+0x175/0x940 [ 192.192503] __sys_socket+0x106/0x260 [ 192.196300] __x64_sys_socket+0x73/0xb0 [ 192.200264] do_syscall_64+0x1b9/0x820 [ 192.204136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.209303] [ 192.210916] Freed by task 4555: [ 192.214184] save_stack+0x43/0xd0 [ 192.217622] __kasan_slab_free+0x11a/0x170 [ 192.221845] kasan_slab_free+0xe/0x10 [ 192.225648] kmem_cache_free+0x86/0x280 [ 192.229613] sock_destroy_inode+0x51/0x60 [ 192.233749] destroy_inode+0x159/0x200 [ 192.237627] evict+0x5d5/0x990 [ 192.240811] iput+0x5fa/0xa00 [ 192.243906] dentry_unlink_inode+0x461/0x5e0 [ 192.248306] __dentry_kill+0x44c/0x7a0 [ 192.252193] dentry_kill+0xc9/0x5a0 [ 192.255812] dput.part.26+0x66b/0x7a0 [ 192.259599] dput+0x15/0x20 [ 192.262523] __fput+0x505/0xa80 [ 192.265795] ____fput+0x15/0x20 [ 192.269072] task_work_run+0x1e8/0x2a0 [ 192.272954] exit_to_usermode_loop+0x318/0x380 [ 192.277542] do_syscall_64+0x6be/0x820 [ 192.281440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.286610] [ 192.288222] The buggy address belongs to the object at ffff8801b7483540 [ 192.288222] which belongs to the cache sock_inode_cache(17:syz0) of size 984 [ 192.302084] The buggy address is located 112 bytes inside of [ 192.302084] 984-byte region [ffff8801b7483540, ffff8801b7483918) [ 192.313943] The buggy address belongs to the page: [ 192.318861] page:ffffea0006dd20c0 count:1 mapcount:0 mapping:ffff8801cdfe2840 index:0xffff8801b7483ffd [ 192.328290] flags: 0x2fffc0000000100(slab) [ 192.332525] raw: 02fffc0000000100 ffffea0006dd2908 ffffea0006dd2208 ffff8801cdfe2840 [ 192.340397] raw: ffff8801b7483ffd ffff8801b74830c0 0000000100000003 ffff8801c53706c0 [ 192.348258] page dumped because: kasan: bad access detected [ 192.353954] page->mem_cgroup:ffff8801c53706c0 [ 192.358442] [ 192.360051] Memory state around the buggy address: [ 192.364963] ffff8801b7483480: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 192.372306] ffff8801b7483500: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 192.379663] >ffff8801b7483580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 192.387007] ^ [ 192.391918] ffff8801b7483600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 192.399267] ffff8801b7483680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 192.406610] ================================================================== [ 192.413952] Disabling lock debugging due to kernel taint [ 192.419441] Kernel panic - not syncing: panic_on_warn set ... [ 192.419441] [ 192.426845] CPU: 1 PID: 4556 Comm: syz-executor0 Tainted: G B 4.19.0-rc2-next-20180904+ #55 [ 192.436631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.445965] Call Trace: [ 192.448554] dump_stack+0x1c9/0x2b4 [ 192.452174] ? dump_stack_print_info.cold.2+0x52/0x52 [ 192.457352] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.462093] panic+0x238/0x4e7 [ 192.465270] ? add_taint.cold.5+0x16/0x16 [ 192.469414] ? trace_hardirqs_on+0xb4/0x2c0 [ 192.473720] ? trace_hardirqs_on+0x9a/0x2c0 [ 192.478048] ? sock_i_ino+0x94/0xa0 [ 192.481672] kasan_end_report+0x47/0x4f [ 192.485633] kasan_report.cold.7+0x76/0x30d [ 192.489942] __asan_report_load8_noabort+0x14/0x20 [ 192.494857] sock_i_ino+0x94/0xa0 [ 192.498296] tipc_sk_fill_sock_diag+0x3be/0xdb0 [ 192.502955] ? tipc_diag_dump+0x30/0x30 [ 192.506917] ? tipc_getname+0x7f0/0x7f0 [ 192.510878] ? print_usage_bug+0xc0/0xc0 [ 192.514925] ? graph_lock+0x170/0x170 [ 192.518712] ? __lock_sock+0x203/0x360 [ 192.522587] ? find_held_lock+0x36/0x1c0 [ 192.526643] ? mark_held_locks+0xc9/0x160 [ 192.530785] ? __local_bh_enable_ip+0x161/0x230 [ 192.535445] ? __local_bh_enable_ip+0x161/0x230 [ 192.540097] ? lockdep_hardirqs_on+0x421/0x5c0 [ 192.544662] ? trace_hardirqs_on+0xbd/0x2c0 [ 192.548969] ? lock_release+0x9f0/0x9f0 [ 192.552936] ? lock_sock_nested+0xe7/0x120 [ 192.557165] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 192.562182] ? skb_put+0x17b/0x1e0 [ 192.565708] ? memset+0x31/0x40 [ 192.568972] ? __nlmsg_put+0x14c/0x1b0 [ 192.572847] __tipc_add_sock_diag+0x22f/0x360 [ 192.577333] tipc_nl_sk_walk+0x122/0x1d0 [ 192.581393] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 192.586666] tipc_diag_dump+0x24/0x30 [ 192.590453] netlink_dump+0x519/0xd50 [ 192.594239] ? netlink_broadcast+0x50/0x50 [ 192.598460] __netlink_dump_start+0x4f1/0x6f0 [ 192.602939] ? kasan_check_read+0x11/0x20 [ 192.607069] ? tipc_data_ready+0x3f0/0x3f0 [ 192.611291] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 192.616380] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 192.621032] ? tipc_data_ready+0x3f0/0x3f0 [ 192.625253] ? tipc_unregister_sysctl+0x20/0x20 [ 192.629905] ? tipc_ioctl+0x3b0/0x3b0 [ 192.633690] ? netlink_deliver_tap+0x356/0xfb0 [ 192.638260] sock_diag_rcv_msg+0x31d/0x410 [ 192.642480] netlink_rcv_skb+0x172/0x440 [ 192.646543] ? sock_diag_bind+0x80/0x80 [ 192.650514] ? netlink_ack+0xbe0/0xbe0 [ 192.654400] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 192.659057] sock_diag_rcv+0x2a/0x40 [ 192.662773] netlink_unicast+0x5a0/0x760 [ 192.666830] ? netlink_attachskb+0x9a0/0x9a0 [ 192.671247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.676772] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 192.681815] netlink_sendmsg+0xa18/0xfc0 [ 192.685868] ? netlink_unicast+0x760/0x760 [ 192.690086] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 192.694997] ? apparmor_socket_sendmsg+0x29/0x30 [ 192.699739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.705259] ? security_socket_sendmsg+0x94/0xc0 [ 192.710000] ? netlink_unicast+0x760/0x760 [ 192.714226] sock_sendmsg+0xd5/0x120 [ 192.717930] ___sys_sendmsg+0x7fd/0x930 [ 192.721897] ? __switch_to_asm+0x40/0x70 [ 192.725956] ? __switch_to_asm+0x40/0x70 [ 192.730002] ? copy_msghdr_from_user+0x580/0x580 [ 192.734743] ? __sched_text_start+0x8/0x8 [ 192.738877] ? __fget_light+0x2f7/0x440 [ 192.742849] ? __local_bh_enable_ip+0x161/0x230 [ 192.747517] ? fget_raw+0x20/0x20 [ 192.750983] ? __release_sock+0x3a0/0x3a0 [ 192.755118] ? tipc_nametbl_build_group+0x279/0x360 [ 192.760120] ? tipc_setsockopt+0x726/0xd70 [ 192.764348] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.769871] ? sockfd_lookup_light+0xc5/0x160 [ 192.774351] __sys_sendmsg+0x11d/0x290 [ 192.778224] ? __ia32_sys_shutdown+0x80/0x80 [ 192.782616] ? fput+0x130/0x1a0 [ 192.785881] ? __x64_sys_futex+0x47f/0x6a0 [ 192.790100] ? do_syscall_64+0x9a/0x820 [ 192.794061] ? do_syscall_64+0x9a/0x820 [ 192.798022] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 192.803112] __x64_sys_sendmsg+0x78/0xb0 [ 192.807161] do_syscall_64+0x1b9/0x820 [ 192.811032] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 192.816382] ? syscall_return_slowpath+0x5e0/0x5e0 [ 192.821298] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 192.826302] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 192.831309] ? recalc_sigpending_tsk+0x180/0x180 [ 192.836059] ? kasan_check_write+0x14/0x20 [ 192.840280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 192.845110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.850289] RIP: 0033:0x457099 [ 192.853479] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.872377] RSP: 002b:00007efdc92a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 192.880067] RAX: ffffffffffffffda RBX: 00007efdc92aa6d4 RCX: 0000000000457099 [ 192.887318] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 192.894577] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 192.901837] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 192.909096] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 192.916735] Dumping ftrace buffer: [ 192.920262] (ftrace buffer empty) [ 192.923950] Kernel Offset: disabled [ 192.927558] Rebooting in 86400 seconds..