[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 23.889944] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 25.294289] random: sshd: uninitialized urandom read (32 bytes read) [ 25.589975] random: sshd: uninitialized urandom read (32 bytes read) [ 26.131156] random: sshd: uninitialized urandom read (32 bytes read) [ 97.643977] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.50' (ECDSA) to the list of known hosts. [ 103.297015] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/04 06:21:54 parsed 1 programs [ 104.278006] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/04 06:21:55 executed programs: 0 [ 105.186179] IPVS: ftp: loaded support on port[0] = 21 [ 105.397411] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.403954] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.411441] device bridge_slave_0 entered promiscuous mode [ 105.429552] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.436007] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.443038] device bridge_slave_1 entered promiscuous mode [ 105.459134] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 105.475570] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 105.519408] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 105.537973] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 105.605213] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 105.612538] team0: Port device team_slave_0 added [ 105.628914] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 105.636136] team0: Port device team_slave_1 added [ 105.651983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.669027] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.686181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.703781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.831670] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.838176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.845025] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.851382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.300072] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 106.306206] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.341195] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 106.361248] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 106.408447] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 106.414682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.422341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.460778] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.740341] ================================================================== [ 106.747844] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 106.753811] Read of size 8 at addr ffff8801b1f460f0 by task syz-executor0/4961 [ 106.761150] [ 106.762763] CPU: 1 PID: 4961 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #82 [ 106.769932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.779272] Call Trace: [ 106.781852] dump_stack+0x1c9/0x2b4 [ 106.785476] ? dump_stack_print_info.cold.2+0x52/0x52 [ 106.790773] ? printk+0xa7/0xcf [ 106.794043] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 106.798791] ? sock_i_ino+0x94/0xa0 [ 106.802412] print_address_description+0x6c/0x20b [ 106.807243] ? sock_i_ino+0x94/0xa0 [ 106.810871] kasan_report.cold.7+0x242/0x30d [ 106.815322] __asan_report_load8_noabort+0x14/0x20 [ 106.820249] sock_i_ino+0x94/0xa0 [ 106.823701] tipc_sk_fill_sock_diag+0x3be/0xdb0 [ 106.828368] ? tipc_diag_dump+0x30/0x30 [ 106.832397] ? tipc_getname+0x7f0/0x7f0 [ 106.836369] ? print_usage_bug+0xc0/0xc0 [ 106.840417] ? graph_lock+0x170/0x170 [ 106.844211] ? __lock_sock+0x203/0x360 [ 106.848090] ? find_held_lock+0x36/0x1c0 [ 106.852143] ? mark_held_locks+0xc9/0x160 [ 106.856326] ? __local_bh_enable_ip+0x161/0x230 [ 106.860988] ? __local_bh_enable_ip+0x161/0x230 [ 106.865650] ? lockdep_hardirqs_on+0x421/0x5c0 [ 106.870225] ? trace_hardirqs_on+0xbd/0x2c0 [ 106.874543] ? lock_release+0x9f0/0x9f0 [ 106.878514] ? lock_sock_nested+0xe7/0x120 [ 106.882753] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 106.887769] ? skb_put+0x17b/0x1e0 [ 106.891297] ? memset+0x31/0x40 [ 106.894565] ? __nlmsg_put+0x14c/0x1b0 [ 106.898444] __tipc_add_sock_diag+0x22f/0x360 [ 106.902933] tipc_nl_sk_walk+0x122/0x1d0 [ 106.906986] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 106.912255] tipc_diag_dump+0x24/0x30 [ 106.916043] netlink_dump+0x519/0xd50 [ 106.919847] ? netlink_broadcast+0x50/0x50 [ 106.924088] __netlink_dump_start+0x4f1/0x6f0 [ 106.928576] ? kasan_check_read+0x11/0x20 [ 106.932717] ? tipc_data_ready+0x3f0/0x3f0 [ 106.936947] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 106.942138] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 106.946798] ? tipc_data_ready+0x3f0/0x3f0 [ 106.951028] ? tipc_unregister_sysctl+0x20/0x20 [ 106.955688] ? tipc_ioctl+0x3b0/0x3b0 [ 106.959545] ? netlink_deliver_tap+0x356/0xfb0 [ 106.964128] sock_diag_rcv_msg+0x31d/0x410 [ 106.968359] netlink_rcv_skb+0x172/0x440 [ 106.972411] ? sock_diag_bind+0x80/0x80 [ 106.976373] ? netlink_ack+0xbe0/0xbe0 [ 106.980248] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 106.984926] sock_diag_rcv+0x2a/0x40 [ 106.988641] netlink_unicast+0x5a0/0x760 [ 106.992712] ? netlink_attachskb+0x9a0/0x9a0 [ 106.997154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.002704] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 107.007722] netlink_sendmsg+0xa18/0xfc0 [ 107.011784] ? netlink_unicast+0x760/0x760 [ 107.016011] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 107.020942] ? apparmor_socket_sendmsg+0x29/0x30 [ 107.025702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.031228] ? security_socket_sendmsg+0x94/0xc0 [ 107.035971] ? netlink_unicast+0x760/0x760 [ 107.040195] sock_sendmsg+0xd5/0x120 [ 107.043899] ___sys_sendmsg+0x7fd/0x930 [ 107.047876] ? copy_msghdr_from_user+0x580/0x580 [ 107.052627] ? _raw_spin_unlock_bh+0x30/0x40 [ 107.057026] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 107.062117] ? do_raw_spin_unlock+0xa7/0x2f0 [ 107.066528] ? __release_sock+0x276/0x3a0 [ 107.070681] ? __fget_light+0x2f7/0x440 [ 107.074645] ? __local_bh_enable_ip+0x161/0x230 [ 107.079305] ? fget_raw+0x20/0x20 [ 107.082799] ? __release_sock+0x3a0/0x3a0 [ 107.087024] ? tipc_nametbl_build_group+0x279/0x360 [ 107.092058] ? tipc_setsockopt+0x726/0xd70 [ 107.096290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 107.101875] ? sockfd_lookup_light+0xc5/0x160 [ 107.106381] __sys_sendmsg+0x11d/0x290 [ 107.110258] ? __ia32_sys_shutdown+0x80/0x80 [ 107.114659] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 107.120181] ? fput+0x130/0x1a0 [ 107.123456] ? __x64_sys_futex+0x47f/0x6a0 [ 107.127683] ? do_syscall_64+0x9a/0x820 [ 107.131646] ? do_syscall_64+0x9a/0x820 [ 107.135624] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 107.140738] __x64_sys_sendmsg+0x78/0xb0 [ 107.144791] do_syscall_64+0x1b9/0x820 [ 107.148679] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 107.154066] ? syscall_return_slowpath+0x5e0/0x5e0 [ 107.158986] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 107.163989] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 107.168992] ? recalc_sigpending_tsk+0x180/0x180 [ 107.173750] ? kasan_check_write+0x14/0x20 [ 107.177988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 107.182835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.188029] RIP: 0033:0x457099 [ 107.191226] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 107.210113] RSP: 002b:00007fe91e8a3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 107.217808] RAX: ffffffffffffffda RBX: 00007fe91e8a46d4 RCX: 0000000000457099 [ 107.225075] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 107.232330] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 107.239585] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 107.246847] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000000 [ 107.254138] [ 107.255752] Allocated by task 4961: [ 107.259366] save_stack+0x43/0xd0 [ 107.262804] kasan_kmalloc+0xc4/0xe0 [ 107.266526] kasan_slab_alloc+0x12/0x20 [ 107.270486] kmem_cache_alloc+0x12e/0x710 [ 107.274628] sock_alloc_inode+0x1d/0x260 [ 107.278675] alloc_inode+0x63/0x190 [ 107.282305] new_inode_pseudo+0x71/0x1a0 [ 107.286352] sock_alloc+0x41/0x270 [ 107.289882] __sock_create+0x175/0x940 [ 107.293755] __sys_socket+0x106/0x260 [ 107.297543] __x64_sys_socket+0x73/0xb0 [ 107.301515] do_syscall_64+0x1b9/0x820 [ 107.305396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.310563] [ 107.312192] Freed by task 4960: [ 107.315458] save_stack+0x43/0xd0 [ 107.318905] __kasan_slab_free+0x11a/0x170 [ 107.323128] kasan_slab_free+0xe/0x10 [ 107.326915] kmem_cache_free+0x86/0x280 [ 107.330887] sock_destroy_inode+0x51/0x60 [ 107.335035] destroy_inode+0x159/0x200 [ 107.338910] evict+0x5d5/0x990 [ 107.342090] iput+0x5fa/0xa00 [ 107.345185] dentry_unlink_inode+0x461/0x5e0 [ 107.349608] __dentry_kill+0x44c/0x7a0 [ 107.353485] dentry_kill+0xc9/0x5a0 [ 107.357118] dput.part.26+0x66b/0x7a0 [ 107.360905] dput+0x15/0x20 [ 107.363834] __fput+0x4d4/0xa40 [ 107.367120] ____fput+0x15/0x20 [ 107.370384] task_work_run+0x1e8/0x2a0 [ 107.374259] exit_to_usermode_loop+0x318/0x380 [ 107.378839] do_syscall_64+0x6be/0x820 [ 107.382728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.387894] [ 107.389517] The buggy address belongs to the object at ffff8801b1f46080 [ 107.389517] which belongs to the cache sock_inode_cache(17:syz0) of size 984 [ 107.403377] The buggy address is located 112 bytes inside of [ 107.403377] 984-byte region [ffff8801b1f46080, ffff8801b1f46458) [ 107.415241] The buggy address belongs to the page: [ 107.420160] page:ffffea0006c7d180 count:1 mapcount:0 mapping:ffff8801d051a780 index:0xffff8801b1f46ffd [ 107.429587] flags: 0x2fffc0000000100(slab) [ 107.433819] raw: 02fffc0000000100 ffffea0006efad48 ffffea0006efc848 ffff8801d051a780 [ 107.441713] raw: ffff8801b1f46ffd ffff8801b1f46080 0000000100000003 ffff8801b3f88b80 [ 107.449575] page dumped because: kasan: bad access detected [ 107.455264] page->mem_cgroup:ffff8801b3f88b80 [ 107.459750] [ 107.461359] Memory state around the buggy address: [ 107.466272] ffff8801b1f45f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.473618] ffff8801b1f46000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.480961] >ffff8801b1f46080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 107.488299] ^ [ 107.495293] ffff8801b1f46100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 107.502649] ffff8801b1f46180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 107.510073] ================================================================== [ 107.517411] Disabling lock debugging due to kernel taint [ 107.522944] Kernel panic - not syncing: panic_on_warn set ... [ 107.522944] [ 107.530352] CPU: 1 PID: 4961 Comm: syz-executor0 Tainted: G B 4.19.0-rc1+ #82 [ 107.538921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.548279] Call Trace: [ 107.550867] dump_stack+0x1c9/0x2b4 [ 107.554491] ? dump_stack_print_info.cold.2+0x52/0x52 [ 107.559681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 107.564421] panic+0x238/0x4e7 [ 107.567616] ? add_taint.cold.5+0x16/0x16 [ 107.571750] ? trace_hardirqs_on+0xb4/0x2c0 [ 107.576064] ? trace_hardirqs_on+0x9a/0x2c0 [ 107.580386] ? sock_i_ino+0x94/0xa0 [ 107.583998] kasan_end_report+0x47/0x4f [ 107.587967] kasan_report.cold.7+0x76/0x30d [ 107.593064] __asan_report_load8_noabort+0x14/0x20 [ 107.597981] sock_i_ino+0x94/0xa0 [ 107.601422] tipc_sk_fill_sock_diag+0x3be/0xdb0 [ 107.606079] ? tipc_diag_dump+0x30/0x30 [ 107.610045] ? tipc_getname+0x7f0/0x7f0 [ 107.614007] ? print_usage_bug+0xc0/0xc0 [ 107.618114] ? graph_lock+0x170/0x170 [ 107.621904] ? __lock_sock+0x203/0x360 [ 107.625793] ? find_held_lock+0x36/0x1c0 [ 107.629853] ? mark_held_locks+0xc9/0x160 [ 107.633989] ? __local_bh_enable_ip+0x161/0x230 [ 107.638640] ? __local_bh_enable_ip+0x161/0x230 [ 107.643304] ? lockdep_hardirqs_on+0x421/0x5c0 [ 107.647879] ? trace_hardirqs_on+0xbd/0x2c0 [ 107.652193] ? lock_release+0x9f0/0x9f0 [ 107.656180] ? lock_sock_nested+0xe7/0x120 [ 107.660401] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 107.665399] ? skb_put+0x17b/0x1e0 [ 107.668929] ? memset+0x31/0x40 [ 107.672197] ? __nlmsg_put+0x14c/0x1b0 [ 107.676071] __tipc_add_sock_diag+0x22f/0x360 [ 107.680556] tipc_nl_sk_walk+0x122/0x1d0 [ 107.684600] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 107.689868] tipc_diag_dump+0x24/0x30 [ 107.693709] netlink_dump+0x519/0xd50 [ 107.697502] ? netlink_broadcast+0x50/0x50 [ 107.701745] __netlink_dump_start+0x4f1/0x6f0 [ 107.706249] ? kasan_check_read+0x11/0x20 [ 107.710393] ? tipc_data_ready+0x3f0/0x3f0 [ 107.714612] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 107.719699] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 107.724352] ? tipc_data_ready+0x3f0/0x3f0 [ 107.728578] ? tipc_unregister_sysctl+0x20/0x20 [ 107.733240] ? tipc_ioctl+0x3b0/0x3b0 [ 107.737041] ? netlink_deliver_tap+0x356/0xfb0 [ 107.741622] sock_diag_rcv_msg+0x31d/0x410 [ 107.745852] netlink_rcv_skb+0x172/0x440 [ 107.749903] ? sock_diag_bind+0x80/0x80 [ 107.753867] ? netlink_ack+0xbe0/0xbe0 [ 107.757747] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 107.762403] sock_diag_rcv+0x2a/0x40 [ 107.766100] netlink_unicast+0x5a0/0x760 [ 107.770148] ? netlink_attachskb+0x9a0/0x9a0 [ 107.774545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.780065] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 107.785062] netlink_sendmsg+0xa18/0xfc0 [ 107.789112] ? netlink_unicast+0x760/0x760 [ 107.793332] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 107.798249] ? apparmor_socket_sendmsg+0x29/0x30 [ 107.802988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.808514] ? security_socket_sendmsg+0x94/0xc0 [ 107.813503] ? netlink_unicast+0x760/0x760 [ 107.817736] sock_sendmsg+0xd5/0x120 [ 107.821436] ___sys_sendmsg+0x7fd/0x930 [ 107.825400] ? copy_msghdr_from_user+0x580/0x580 [ 107.830140] ? _raw_spin_unlock_bh+0x30/0x40 [ 107.834550] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 107.839645] ? do_raw_spin_unlock+0xa7/0x2f0 [ 107.844066] ? __release_sock+0x276/0x3a0 [ 107.848211] ? __fget_light+0x2f7/0x440 [ 107.852171] ? __local_bh_enable_ip+0x161/0x230 [ 107.856830] ? fget_raw+0x20/0x20 [ 107.860280] ? __release_sock+0x3a0/0x3a0 [ 107.864413] ? tipc_nametbl_build_group+0x279/0x360 [ 107.869414] ? tipc_setsockopt+0x726/0xd70 [ 107.873636] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 107.879157] ? sockfd_lookup_light+0xc5/0x160 [ 107.883649] __sys_sendmsg+0x11d/0x290 [ 107.887544] ? __ia32_sys_shutdown+0x80/0x80 [ 107.891941] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 107.897459] ? fput+0x130/0x1a0 [ 107.900723] ? __x64_sys_futex+0x47f/0x6a0 [ 107.904944] ? do_syscall_64+0x9a/0x820 [ 107.908915] ? do_syscall_64+0x9a/0x820 [ 107.912889] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 107.917978] __x64_sys_sendmsg+0x78/0xb0 [ 107.922027] do_syscall_64+0x1b9/0x820 [ 107.925901] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 107.931248] ? syscall_return_slowpath+0x5e0/0x5e0 [ 107.936160] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 107.941172] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 107.946182] ? recalc_sigpending_tsk+0x180/0x180 [ 107.950924] ? kasan_check_write+0x14/0x20 [ 107.955144] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 107.959983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.965154] RIP: 0033:0x457099 [ 107.968330] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 107.987213] RSP: 002b:00007fe91e8a3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 107.994901] RAX: ffffffffffffffda RBX: 00007fe91e8a46d4 RCX: 0000000000457099 [ 108.002161] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 108.009425] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 108.016676] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 108.023949] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000000 [ 108.031531] Dumping ftrace buffer: [ 108.035061] (ftrace buffer empty) [ 108.039275] Kernel Offset: disabled [ 108.042882] Rebooting in 86400 seconds..