[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 27.338743] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 31.790542] random: sshd: uninitialized urandom read (32 bytes read) [ 32.191623] random: sshd: uninitialized urandom read (32 bytes read) [ 32.793356] random: sshd: uninitialized urandom read (32 bytes read) [ 97.987014] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.9' (ECDSA) to the list of known hosts. [ 103.561497] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/08 04:51:22 parsed 1 programs [ 104.612634] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/08 04:51:23 executed programs: 0 [ 105.531614] IPVS: ftp: loaded support on port[0] = 21 [ 105.798267] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.805313] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.813082] device bridge_slave_0 entered promiscuous mode [ 105.832359] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.838807] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.846362] device bridge_slave_1 entered promiscuous mode [ 105.864620] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 105.883957] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 105.936325] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 105.958104] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 106.036788] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 106.044669] team0: Port device team_slave_0 added [ 106.061694] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 106.068824] team0: Port device team_slave_1 added [ 106.087230] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.107728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.127960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.147707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.297833] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.304364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.311557] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.317914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.831468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.885593] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 106.938866] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 106.945690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.953923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.003334] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.546585] ================================================================== [ 107.554102] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 107.560179] Read of size 8 at addr ffff8801b2c03530 by task syz-executor0/5712 [ 107.567525] [ 107.569168] CPU: 1 PID: 5712 Comm: syz-executor0 Not tainted 4.19.0-rc2+ #4 [ 107.576278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.585627] Call Trace: [ 107.588210] dump_stack+0x1c4/0x2b4 [ 107.591828] ? dump_stack_print_info.cold.2+0x52/0x52 [ 107.597011] ? printk+0xa7/0xcf [ 107.600281] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 107.605061] print_address_description.cold.8+0x9/0x1ff [ 107.610418] kasan_report.cold.9+0x242/0x309 [ 107.614822] ? sock_i_ino+0x94/0xa0 [ 107.618489] __asan_report_load8_noabort+0x14/0x20 [ 107.623422] sock_i_ino+0x94/0xa0 [ 107.626875] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 107.631534] ? tipc_diag_dump+0x30/0x30 [ 107.635498] ? tipc_getname+0x7f0/0x7f0 [ 107.639568] ? graph_lock+0x170/0x170 [ 107.643386] ? __lock_sock+0x203/0x350 [ 107.647277] ? find_held_lock+0x36/0x1c0 [ 107.651332] ? mark_held_locks+0xc7/0x130 [ 107.655485] ? __local_bh_enable_ip+0x160/0x260 [ 107.660154] ? __local_bh_enable_ip+0x160/0x260 [ 107.664811] ? lockdep_hardirqs_on+0x421/0x5c0 [ 107.669381] ? trace_hardirqs_on+0xbd/0x310 [ 107.673705] ? lock_release+0x970/0x970 [ 107.677668] ? lock_sock_nested+0xe2/0x120 [ 107.681906] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 107.686961] ? skb_put+0x17b/0x1e0 [ 107.690496] ? memset+0x31/0x40 [ 107.693769] ? __nlmsg_put+0x14c/0x1b0 [ 107.697648] __tipc_add_sock_diag+0x233/0x360 [ 107.702314] tipc_nl_sk_walk+0x122/0x1d0 [ 107.706389] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 107.711656] tipc_diag_dump+0x24/0x30 [ 107.715447] netlink_dump+0x519/0xd50 [ 107.719238] ? netlink_broadcast+0x50/0x50 [ 107.723468] __netlink_dump_start+0x4f1/0x6f0 [ 107.727953] ? tipc_data_ready+0x3e0/0x3e0 [ 107.732181] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 107.737280] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 107.741952] ? tipc_data_ready+0x3e0/0x3e0 [ 107.746176] ? tipc_unregister_sysctl+0x20/0x20 [ 107.750832] ? tipc_ioctl+0x3a0/0x3a0 [ 107.754632] ? netlink_deliver_tap+0x355/0xf80 [ 107.759207] sock_diag_rcv_msg+0x31d/0x410 [ 107.763433] netlink_rcv_skb+0x172/0x440 [ 107.767496] ? sock_diag_bind+0x80/0x80 [ 107.771461] ? netlink_ack+0xb80/0xb80 [ 107.775341] sock_diag_rcv+0x2a/0x40 [ 107.779087] netlink_unicast+0x5a5/0x760 [ 107.783154] ? netlink_attachskb+0x9a0/0x9a0 [ 107.787553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.793078] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 107.798088] netlink_sendmsg+0xa18/0xfc0 [ 107.802142] ? netlink_unicast+0x760/0x760 [ 107.806389] ? smack_socket_sendmsg+0xb0/0x190 [ 107.810960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.816508] ? security_socket_sendmsg+0x94/0xc0 [ 107.821301] ? netlink_unicast+0x760/0x760 [ 107.825524] sock_sendmsg+0xd5/0x120 [ 107.829228] ___sys_sendmsg+0x7fd/0x930 [ 107.833203] ? __local_bh_enable_ip+0x160/0x260 [ 107.837868] ? copy_msghdr_from_user+0x580/0x580 [ 107.842618] ? kasan_check_write+0x14/0x20 [ 107.846867] ? _raw_spin_unlock_bh+0x30/0x40 [ 107.851269] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 107.856736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.862443] ? release_sock+0x1ec/0x2c0 [ 107.866428] ? __fget_light+0x2e9/0x430 [ 107.870407] ? fget_raw+0x20/0x20 [ 107.873860] ? __release_sock+0x3a0/0x3a0 [ 107.878000] ? tipc_nametbl_build_group+0x273/0x360 [ 107.883007] ? tipc_setsockopt+0x726/0xd70 [ 107.887232] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 107.892757] ? sockfd_lookup_light+0xc5/0x160 [ 107.897241] __sys_sendmsg+0x11d/0x280 [ 107.901121] ? __ia32_sys_shutdown+0x80/0x80 [ 107.905553] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 107.911113] ? fput+0x130/0x1a0 [ 107.914387] ? __x64_sys_futex+0x47f/0x6a0 [ 107.918618] ? do_syscall_64+0x9a/0x820 [ 107.922583] ? do_syscall_64+0x9a/0x820 [ 107.926556] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 107.931999] __x64_sys_sendmsg+0x78/0xb0 [ 107.936059] do_syscall_64+0x1b9/0x820 [ 107.939937] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 107.945289] ? syscall_return_slowpath+0x5e0/0x5e0 [ 107.950205] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 107.955058] ? trace_hardirqs_on_caller+0x310/0x310 [ 107.960072] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 107.965110] ? prepare_exit_to_usermode+0x291/0x3b0 [ 107.970141] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 107.974981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.980155] RIP: 0033:0x457099 [ 107.983358] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 108.002249] RSP: 002b:00007f445a9b5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 108.009969] RAX: ffffffffffffffda RBX: 00007f445a9b66d4 RCX: 0000000000457099 [ 108.017239] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 108.024496] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 108.031749] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 108.039002] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 108.046438] [ 108.048053] Allocated by task 5712: [ 108.051692] save_stack+0x43/0xd0 [ 108.055163] kasan_kmalloc+0xc7/0xe0 [ 108.058877] kasan_slab_alloc+0x12/0x20 [ 108.062859] kmem_cache_alloc+0x12e/0x730 [ 108.067001] sock_alloc_inode+0x1d/0x260 [ 108.071047] alloc_inode+0x63/0x190 [ 108.074660] new_inode_pseudo+0x71/0x1a0 [ 108.078716] sock_alloc+0x41/0x270 [ 108.082242] __sock_create+0x175/0x930 [ 108.086144] __sys_socket+0x106/0x260 [ 108.089936] __x64_sys_socket+0x73/0xb0 [ 108.093901] do_syscall_64+0x1b9/0x820 [ 108.097777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.102946] [ 108.104580] Freed by task 5711: [ 108.107873] save_stack+0x43/0xd0 [ 108.111313] __kasan_slab_free+0x102/0x150 [ 108.115586] kasan_slab_free+0xe/0x10 [ 108.119410] kmem_cache_free+0x83/0x290 [ 108.123382] sock_destroy_inode+0x51/0x60 [ 108.127523] destroy_inode+0x159/0x200 [ 108.131424] evict+0x5e0/0x980 [ 108.134617] iput+0x679/0xa90 [ 108.137727] dentry_unlink_inode+0x461/0x5e0 [ 108.142123] __dentry_kill+0x44c/0x7a0 [ 108.146025] dentry_kill+0xc9/0x5a0 [ 108.149644] dput.part.26+0x660/0x790 [ 108.153437] dput+0x15/0x20 [ 108.156356] __fput+0x4cf/0xa30 [ 108.159630] ____fput+0x15/0x20 [ 108.162899] task_work_run+0x1e8/0x2a0 [ 108.166787] exit_to_usermode_loop+0x318/0x380 [ 108.171378] do_syscall_64+0x6be/0x820 [ 108.175253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.180446] [ 108.182060] The buggy address belongs to the object at ffff8801b2c034c0 [ 108.182060] which belongs to the cache sock_inode_cache(17:syz0) of size 984 [ 108.195951] The buggy address is located 112 bytes inside of [ 108.195951] 984-byte region [ffff8801b2c034c0, ffff8801b2c03898) [ 108.208237] The buggy address belongs to the page: [ 108.213161] page:ffffea0006cb00c0 count:1 mapcount:0 mapping:ffff8801cd556840 index:0xffff8801b2c03ffd [ 108.222623] flags: 0x2fffc0000000100(slab) [ 108.226867] raw: 02fffc0000000100 ffffea0006d9ff88 ffffea0006cb0c88 ffff8801cd556840 [ 108.234738] raw: ffff8801b2c03ffd ffff8801b2c03040 0000000100000003 ffff8801b8152900 [ 108.242600] page dumped because: kasan: bad access detected [ 108.248299] page->mem_cgroup:ffff8801b8152900 [ 108.252807] [ 108.254423] Memory state around the buggy address: [ 108.259337] ffff8801b2c03400: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 108.266718] ffff8801b2c03480: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 108.274065] >ffff8801b2c03500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 108.281417] ^ [ 108.286366] ffff8801b2c03580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 108.293718] ffff8801b2c03600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 108.301076] ================================================================== [ 108.308419] Disabling lock debugging due to kernel taint [ 108.313925] Kernel panic - not syncing: panic_on_warn set ... [ 108.313925] [ 108.329535] CPU: 1 PID: 5712 Comm: syz-executor0 Tainted: G B 4.19.0-rc2+ #4 [ 108.338012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.347352] Call Trace: [ 108.349927] dump_stack+0x1c4/0x2b4 [ 108.353554] ? dump_stack_print_info.cold.2+0x52/0x52 [ 108.358774] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 108.363518] panic+0x238/0x4e7 [ 108.366698] ? add_taint.cold.5+0x16/0x16 [ 108.370839] ? trace_hardirqs_on+0x9a/0x310 [ 108.375375] ? trace_hardirqs_on+0xb4/0x310 [ 108.379693] ? trace_hardirqs_on+0xb4/0x310 [ 108.384003] kasan_end_report+0x47/0x4f [ 108.387989] kasan_report.cold.9+0x76/0x309 [ 108.392299] ? sock_i_ino+0x94/0xa0 [ 108.395916] __asan_report_load8_noabort+0x14/0x20 [ 108.400833] sock_i_ino+0x94/0xa0 [ 108.404296] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 108.408960] ? tipc_diag_dump+0x30/0x30 [ 108.412920] ? tipc_getname+0x7f0/0x7f0 [ 108.416885] ? graph_lock+0x170/0x170 [ 108.420675] ? __lock_sock+0x203/0x350 [ 108.424551] ? find_held_lock+0x36/0x1c0 [ 108.428618] ? mark_held_locks+0xc7/0x130 [ 108.432784] ? __local_bh_enable_ip+0x160/0x260 [ 108.437438] ? __local_bh_enable_ip+0x160/0x260 [ 108.442092] ? lockdep_hardirqs_on+0x421/0x5c0 [ 108.446703] ? trace_hardirqs_on+0xbd/0x310 [ 108.451009] ? lock_release+0x970/0x970 [ 108.454971] ? lock_sock_nested+0xe2/0x120 [ 108.459219] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 108.464228] ? skb_put+0x17b/0x1e0 [ 108.467779] ? memset+0x31/0x40 [ 108.471046] ? __nlmsg_put+0x14c/0x1b0 [ 108.474924] __tipc_add_sock_diag+0x233/0x360 [ 108.479457] tipc_nl_sk_walk+0x122/0x1d0 [ 108.483510] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 108.488773] tipc_diag_dump+0x24/0x30 [ 108.492572] netlink_dump+0x519/0xd50 [ 108.496380] ? netlink_broadcast+0x50/0x50 [ 108.500632] __netlink_dump_start+0x4f1/0x6f0 [ 108.505118] ? tipc_data_ready+0x3e0/0x3e0 [ 108.509341] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 108.514454] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 108.519117] ? tipc_data_ready+0x3e0/0x3e0 [ 108.523336] ? tipc_unregister_sysctl+0x20/0x20 [ 108.527993] ? tipc_ioctl+0x3a0/0x3a0 [ 108.531784] ? netlink_deliver_tap+0x355/0xf80 [ 108.536354] sock_diag_rcv_msg+0x31d/0x410 [ 108.540579] netlink_rcv_skb+0x172/0x440 [ 108.544633] ? sock_diag_bind+0x80/0x80 [ 108.548594] ? netlink_ack+0xb80/0xb80 [ 108.552475] sock_diag_rcv+0x2a/0x40 [ 108.556188] netlink_unicast+0x5a5/0x760 [ 108.560426] ? netlink_attachskb+0x9a0/0x9a0 [ 108.564826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.570390] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 108.575397] netlink_sendmsg+0xa18/0xfc0 [ 108.579479] ? netlink_unicast+0x760/0x760 [ 108.583701] ? smack_socket_sendmsg+0xb0/0x190 [ 108.588270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.593833] ? security_socket_sendmsg+0x94/0xc0 [ 108.598616] ? netlink_unicast+0x760/0x760 [ 108.602882] sock_sendmsg+0xd5/0x120 [ 108.606602] ___sys_sendmsg+0x7fd/0x930 [ 108.610572] ? __local_bh_enable_ip+0x160/0x260 [ 108.615231] ? copy_msghdr_from_user+0x580/0x580 [ 108.619973] ? kasan_check_write+0x14/0x20 [ 108.624194] ? _raw_spin_unlock_bh+0x30/0x40 [ 108.628588] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 108.634034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.639585] ? release_sock+0x1ec/0x2c0 [ 108.643574] ? __fget_light+0x2e9/0x430 [ 108.647571] ? fget_raw+0x20/0x20 [ 108.651019] ? __release_sock+0x3a0/0x3a0 [ 108.655156] ? tipc_nametbl_build_group+0x273/0x360 [ 108.660163] ? tipc_setsockopt+0x726/0xd70 [ 108.664385] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 108.669913] ? sockfd_lookup_light+0xc5/0x160 [ 108.674398] __sys_sendmsg+0x11d/0x280 [ 108.678294] ? __ia32_sys_shutdown+0x80/0x80 [ 108.682688] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 108.688223] ? fput+0x130/0x1a0 [ 108.691494] ? __x64_sys_futex+0x47f/0x6a0 [ 108.695722] ? do_syscall_64+0x9a/0x820 [ 108.699697] ? do_syscall_64+0x9a/0x820 [ 108.703661] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 108.709104] __x64_sys_sendmsg+0x78/0xb0 [ 108.713157] do_syscall_64+0x1b9/0x820 [ 108.717185] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 108.722537] ? syscall_return_slowpath+0x5e0/0x5e0 [ 108.727467] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 108.732299] ? trace_hardirqs_on_caller+0x310/0x310 [ 108.737304] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 108.742308] ? prepare_exit_to_usermode+0x291/0x3b0 [ 108.747313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 108.752146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.757345] RIP: 0033:0x457099 [ 108.760531] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 108.779421] RSP: 002b:00007f445a9b5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 108.787119] RAX: ffffffffffffffda RBX: 00007f445a9b66d4 RCX: 0000000000457099 [ 108.794387] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 108.801639] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 108.808902] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 108.816182] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 108.823762] Dumping ftrace buffer: [ 108.827298] (ftrace buffer empty) [ 108.831676] Kernel Offset: disabled [ 108.835300] Rebooting in 86400 seconds..