Warning: Permanently added '10.128.0.194' (ECDSA) to the list of known hosts. [ 39.007670] random: sshd: uninitialized urandom read (32 bytes read) executing program [ 39.120692] audit: type=1400 audit(1568123905.380:36): avc: denied { map } for pid=6868 comm="syz-executor314" path="/root/syz-executor314626549" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 39.147843] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 39.160393] ================================================================== [ 39.167816] BUG: KASAN: use-after-free in tcp_init_tso_segs+0x1ae/0x200 [ 39.174638] Read of size 2 at addr ffff88809973e330 by task syz-executor314/6868 [ 39.182156] [ 39.183773] CPU: 0 PID: 6868 Comm: syz-executor314 Not tainted 4.14.143 #0 [ 39.190893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 39.200528] Call Trace: [ 39.203107] dump_stack+0x138/0x197 [ 39.206722] ? tcp_init_tso_segs+0x1ae/0x200 [ 39.211392] print_address_description.cold+0x7c/0x1dc [ 39.216659] ? tcp_init_tso_segs+0x1ae/0x200 [ 39.221172] kasan_report.cold+0xa9/0x2af [ 39.225403] __asan_report_load2_noabort+0x14/0x20 [ 39.230327] tcp_init_tso_segs+0x1ae/0x200 [ 39.234819] ? tcp_tso_segs+0x7d/0x1c0 [ 39.238768] tcp_write_xmit+0x15e/0x4960 [ 39.242903] ? tcp_v6_md5_lookup+0x23/0x30 [ 39.247125] ? tcp_established_options+0x2c5/0x420 [ 39.252047] ? tcp_current_mss+0x1dc/0x2f0 [ 39.256280] ? __alloc_skb+0x3ee/0x500 [ 39.260164] __tcp_push_pending_frames+0xa6/0x260 [ 39.265001] tcp_send_fin+0x17e/0xc40 [ 39.268793] tcp_close+0xcc8/0xfb0 [ 39.272412] ? lock_acquire+0x16f/0x430 [ 39.276373] ? ip_mc_drop_socket+0x1d6/0x230 [ 39.280771] inet_release+0xec/0x1c0 [ 39.284471] inet6_release+0x53/0x80 [ 39.288172] __sock_release+0xce/0x2b0 [ 39.292047] ? __sock_release+0x2b0/0x2b0 [ 39.296179] sock_close+0x1b/0x30 [ 39.299617] __fput+0x275/0x7a0 [ 39.302950] ____fput+0x16/0x20 [ 39.306216] task_work_run+0x114/0x190 [ 39.310096] do_exit+0x7df/0x2c10 [ 39.313545] ? mm_update_next_owner+0x5d0/0x5d0 [ 39.318202] ? fd_install+0x4d/0x60 [ 39.321817] ? sock_map_fd+0x56/0x80 [ 39.325516] ? SyS_socket+0x103/0x170 [ 39.329308] do_group_exit+0x111/0x330 [ 39.333187] SyS_exit_group+0x1d/0x20 [ 39.336975] ? do_group_exit+0x330/0x330 [ 39.341030] do_syscall_64+0x1e8/0x640 [ 39.344904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 39.349741] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 39.354919] RIP: 0033:0x43ee88 [ 39.358094] RSP: 002b:00007fffb7781088 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 39.365792] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000043ee88 [ 39.373229] RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 [ 39.380547] RBP: 00000000004be688 R08: 00000000000000e7 R09: ffffffffffffffd0 [ 39.387805] R10: 0000000020040010 R11: 0000000000000246 R12: 0000000000000001 [ 39.395239] R13: 00000000006d0180 R14: 0000000000000000 R15: 0000000000000000 [ 39.402517] [ 39.404137] Allocated by task 6868: [ 39.407760] save_stack_trace+0x16/0x20 [ 39.411817] save_stack+0x45/0xd0 [ 39.415376] kasan_kmalloc+0xce/0xf0 [ 39.419078] kasan_slab_alloc+0xf/0x20 [ 39.422958] kmem_cache_alloc_node+0x144/0x780 [ 39.427761] __alloc_skb+0x9c/0x500 [ 39.431500] sk_stream_alloc_skb+0xb3/0x780 [ 39.435811] tcp_sendmsg_locked+0xf61/0x3200 [ 39.440387] tcp_sendmsg+0x30/0x50 [ 39.443926] inet_sendmsg+0x122/0x500 [ 39.447722] sock_sendmsg+0xce/0x110 [ 39.451429] SYSC_sendto+0x206/0x310 [ 39.455130] SyS_sendto+0x40/0x50 [ 39.458571] do_syscall_64+0x1e8/0x640 [ 39.462451] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 39.467622] [ 39.469231] Freed by task 6868: [ 39.472492] save_stack_trace+0x16/0x20 [ 39.476595] save_stack+0x45/0xd0 [ 39.480035] kasan_slab_free+0x75/0xc0 [ 39.483916] kmem_cache_free+0x83/0x2b0 [ 39.487876] kfree_skbmem+0x8d/0x120 [ 39.491738] __kfree_skb+0x1e/0x30 [ 39.495262] tcp_remove_empty_skb.part.0+0x231/0x2e0 [ 39.500351] tcp_sendmsg_locked+0x1ced/0x3200 [ 39.504835] tcp_sendmsg+0x30/0x50 [ 39.508538] inet_sendmsg+0x122/0x500 [ 39.512454] sock_sendmsg+0xce/0x110 [ 39.516153] SYSC_sendto+0x206/0x310 [ 39.519851] SyS_sendto+0x40/0x50 [ 39.523295] do_syscall_64+0x1e8/0x640 [ 39.527172] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 39.532361] [ 39.534015] The buggy address belongs to the object at ffff88809973e300 [ 39.534015] which belongs to the cache skbuff_fclone_cache of size 472 [ 39.547492] The buggy address is located 48 bytes inside of [ 39.547492] 472-byte region [ffff88809973e300, ffff88809973e4d8) [ 39.559317] The buggy address belongs to the page: [ 39.564321] page:ffffea000265cf80 count:1 mapcount:0 mapping:ffff88809973e080 index:0x0 [ 39.572467] flags: 0x1fffc0000000100(slab) [ 39.576734] raw: 01fffc0000000100 ffff88809973e080 0000000000000000 0000000100000006 [ 39.584670] raw: ffffea00029315e0 ffffea0002574520 ffff88821b75f3c0 0000000000000000 [ 39.592538] page dumped because: kasan: bad access detected [ 39.598235] [ 39.599848] Memory state around the buggy address: [ 39.604907] ffff88809973e200: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc [ 39.612254] ffff88809973e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.619607] >ffff88809973e300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.626954] ^ [ 39.631872] ffff88809973e380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.639263] ffff88809973e400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.646607] ================================================================== [ 39.653952] Disabling lock debugging due to kernel taint [ 39.660183] Kernel panic - not syncing: panic_on_warn set ... [ 39.660183] [ 39.667567] CPU: 1 PID: 6868 Comm: syz-executor314 Tainted: G B 4.14.143 #0 [ 39.675781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 39.685121] Call Trace: [ 39.687823] dump_stack+0x138/0x197 [ 39.691439] ? tcp_init_tso_segs+0x1ae/0x200 [ 39.695837] panic+0x1f2/0x426 [ 39.699020] ? add_taint.cold+0x16/0x16 [ 39.703005] ? ___preempt_schedule+0x16/0x18 [ 39.707403] kasan_end_report+0x47/0x4f [ 39.711485] kasan_report.cold+0x130/0x2af [ 39.715758] __asan_report_load2_noabort+0x14/0x20 [ 39.720721] tcp_init_tso_segs+0x1ae/0x200 [ 39.725035] ? tcp_tso_segs+0x7d/0x1c0 [ 39.728913] tcp_write_xmit+0x15e/0x4960 [ 39.732961] ? tcp_v6_md5_lookup+0x23/0x30 [ 39.737239] ? tcp_established_options+0x2c5/0x420 [ 39.742158] ? tcp_current_mss+0x1dc/0x2f0 [ 39.746381] ? __alloc_skb+0x3ee/0x500 [ 39.750259] __tcp_push_pending_frames+0xa6/0x260 [ 39.755090] tcp_send_fin+0x17e/0xc40 [ 39.758880] tcp_close+0xcc8/0xfb0 [ 39.762411] ? lock_acquire+0x16f/0x430 [ 39.766373] ? ip_mc_drop_socket+0x1d6/0x230 [ 39.770771] inet_release+0xec/0x1c0 [ 39.774472] inet6_release+0x53/0x80 [ 39.778175] __sock_release+0xce/0x2b0 [ 39.782090] ? __sock_release+0x2b0/0x2b0 [ 39.786223] sock_close+0x1b/0x30 [ 39.789667] __fput+0x275/0x7a0 [ 39.792941] ____fput+0x16/0x20 [ 39.796388] task_work_run+0x114/0x190 [ 39.800468] do_exit+0x7df/0x2c10 [ 39.803909] ? mm_update_next_owner+0x5d0/0x5d0 [ 39.808566] ? fd_install+0x4d/0x60 [ 39.812181] ? sock_map_fd+0x56/0x80 [ 39.815929] ? SyS_socket+0x103/0x170 [ 39.819810] do_group_exit+0x111/0x330 [ 39.823688] SyS_exit_group+0x1d/0x20 [ 39.827474] ? do_group_exit+0x330/0x330 [ 39.831574] do_syscall_64+0x1e8/0x640 [ 39.835497] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 39.840330] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 39.845548] RIP: 0033:0x43ee88 [ 39.848727] RSP: 002b:00007fffb7781088 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 39.856512] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000043ee88 [ 39.863983] RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 [ 39.871329] RBP: 00000000004be688 R08: 00000000000000e7 R09: ffffffffffffffd0 [ 39.878590] R10: 0000000020040010 R11: 0000000000000246 R12: 0000000000000001 [ 39.885846] R13: 00000000006d0180 R14: 0000000000000000 R15: 0000000000000000 [ 39.894554] Kernel Offset: disabled [ 39.898197] Rebooting in 86400 seconds..