[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 24.366830] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.764901] random: sshd: uninitialized urandom read (32 bytes read) [ 29.992693] random: sshd: uninitialized urandom read (32 bytes read) [ 30.609689] random: sshd: uninitialized urandom read (32 bytes read) [ 186.827773] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.34' (ECDSA) to the list of known hosts. [ 192.365069] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/08 15:34:09 parsed 1 programs [ 193.749992] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/08 15:34:11 executed programs: 0 [ 195.282570] IPVS: ftp: loaded support on port[0] = 21 [ 195.524565] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.531302] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.538563] device bridge_slave_0 entered promiscuous mode [ 195.556762] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.563139] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.570155] device bridge_slave_1 entered promiscuous mode [ 195.588137] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 195.606536] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 195.655007] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.674632] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.748243] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.755513] team0: Port device team_slave_0 added [ 195.773474] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 195.780906] team0: Port device team_slave_1 added [ 195.798030] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.817136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.837872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.857761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.002447] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.009028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.015831] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.022236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.544542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.597515] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 196.649858] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 196.656002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.665822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.715018] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.078636] ================================================================== [ 197.086184] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 197.092156] Read of size 8 at addr ffff8801c37b30f0 by task syz-executor0/5606 [ 197.099494] [ 197.101122] CPU: 0 PID: 5606 Comm: syz-executor0 Not tainted 4.19.0-rc2+ #227 [ 197.108374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.117722] Call Trace: [ 197.120312] dump_stack+0x1c4/0x2b4 [ 197.123924] ? dump_stack_print_info.cold.2+0x52/0x52 [ 197.129101] ? printk+0xa7/0xcf [ 197.132368] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 197.137120] print_address_description.cold.8+0x9/0x1ff [ 197.142560] kasan_report.cold.9+0x242/0x309 [ 197.146965] ? sock_i_ino+0x94/0xa0 [ 197.150582] __asan_report_load8_noabort+0x14/0x20 [ 197.155505] sock_i_ino+0x94/0xa0 [ 197.158956] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 197.163614] ? tipc_diag_dump+0x30/0x30 [ 197.167579] ? tipc_getname+0x7f0/0x7f0 [ 197.171582] ? graph_lock+0x170/0x170 [ 197.175389] ? __lock_sock+0x203/0x350 [ 197.179269] ? find_held_lock+0x36/0x1c0 [ 197.183323] ? mark_held_locks+0xc7/0x130 [ 197.187465] ? __local_bh_enable_ip+0x160/0x260 [ 197.192124] ? __local_bh_enable_ip+0x160/0x260 [ 197.196795] ? lockdep_hardirqs_on+0x421/0x5c0 [ 197.201364] ? trace_hardirqs_on+0xbd/0x310 [ 197.205670] ? lock_release+0x970/0x970 [ 197.209648] ? lock_sock_nested+0xe2/0x120 [ 197.213867] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 197.218869] ? skb_put+0x17b/0x1e0 [ 197.222397] ? memset+0x31/0x40 [ 197.225667] ? __nlmsg_put+0x14c/0x1b0 [ 197.229545] __tipc_add_sock_diag+0x233/0x360 [ 197.234055] tipc_nl_sk_walk+0x122/0x1d0 [ 197.238103] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 197.243368] tipc_diag_dump+0x24/0x30 [ 197.247189] netlink_dump+0x519/0xd50 [ 197.250984] ? netlink_broadcast+0x50/0x50 [ 197.255225] __netlink_dump_start+0x4f1/0x6f0 [ 197.259709] ? tipc_data_ready+0x3e0/0x3e0 [ 197.263932] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 197.269018] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 197.273675] ? tipc_data_ready+0x3e0/0x3e0 [ 197.277894] ? tipc_unregister_sysctl+0x20/0x20 [ 197.282573] ? tipc_ioctl+0x3a0/0x3a0 [ 197.286387] ? netlink_deliver_tap+0x355/0xf80 [ 197.290974] sock_diag_rcv_msg+0x31d/0x410 [ 197.295196] netlink_rcv_skb+0x172/0x440 [ 197.299242] ? sock_diag_bind+0x80/0x80 [ 197.303208] ? netlink_ack+0xb80/0xb80 [ 197.307099] sock_diag_rcv+0x2a/0x40 [ 197.310799] netlink_unicast+0x5a5/0x760 [ 197.314851] ? netlink_attachskb+0x9a0/0x9a0 [ 197.319251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.324779] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 197.329800] netlink_sendmsg+0xa18/0xfc0 [ 197.333857] ? netlink_unicast+0x760/0x760 [ 197.338079] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 197.342994] ? apparmor_socket_sendmsg+0x29/0x30 [ 197.347736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.353259] ? security_socket_sendmsg+0x94/0xc0 [ 197.358002] ? netlink_unicast+0x760/0x760 [ 197.362224] sock_sendmsg+0xd5/0x120 [ 197.365926] ___sys_sendmsg+0x7fd/0x930 [ 197.369898] ? __local_bh_enable_ip+0x160/0x260 [ 197.374566] ? copy_msghdr_from_user+0x580/0x580 [ 197.379309] ? kasan_check_write+0x14/0x20 [ 197.383771] ? _raw_spin_unlock_bh+0x30/0x40 [ 197.388174] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 197.393622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.399155] ? release_sock+0x1ec/0x2c0 [ 197.403121] ? __fget_light+0x2e9/0x430 [ 197.407082] ? fget_raw+0x20/0x20 [ 197.410545] ? __release_sock+0x3a0/0x3a0 [ 197.414682] ? tipc_nametbl_build_group+0x273/0x360 [ 197.419688] ? tipc_setsockopt+0x726/0xd70 [ 197.423912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.429445] ? sockfd_lookup_light+0xc5/0x160 [ 197.433950] __sys_sendmsg+0x11d/0x280 [ 197.437839] ? __ia32_sys_shutdown+0x80/0x80 [ 197.442232] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 197.447752] ? fput+0x130/0x1a0 [ 197.451094] ? __x64_sys_futex+0x47f/0x6a0 [ 197.455324] ? do_syscall_64+0x9a/0x820 [ 197.459284] ? do_syscall_64+0x9a/0x820 [ 197.463251] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 197.468705] __x64_sys_sendmsg+0x78/0xb0 [ 197.472770] do_syscall_64+0x1b9/0x820 [ 197.476648] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 197.481997] ? syscall_return_slowpath+0x5e0/0x5e0 [ 197.486921] ? trace_hardirqs_on_caller+0x310/0x310 [ 197.491941] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 197.496950] ? recalc_sigpending_tsk+0x180/0x180 [ 197.501696] ? kasan_check_write+0x14/0x20 [ 197.505930] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.510766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.515968] RIP: 0033:0x457099 [ 197.519145] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.538030] RSP: 002b:00007fb000318c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.545725] RAX: ffffffffffffffda RBX: 00007fb0003196d4 RCX: 0000000000457099 [ 197.552979] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 197.560231] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 197.567497] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 197.574765] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 197.582033] [ 197.583641] Allocated by task 5606: [ 197.587264] save_stack+0x43/0xd0 [ 197.590702] kasan_kmalloc+0xc7/0xe0 [ 197.594415] kasan_slab_alloc+0x12/0x20 [ 197.598397] kmem_cache_alloc+0x12e/0x730 [ 197.602536] sock_alloc_inode+0x1d/0x260 [ 197.606650] alloc_inode+0x63/0x190 [ 197.610267] new_inode_pseudo+0x71/0x1a0 [ 197.614315] sock_alloc+0x41/0x270 [ 197.617841] __sock_create+0x175/0x930 [ 197.621716] __sys_socket+0x106/0x260 [ 197.625516] __x64_sys_socket+0x73/0xb0 [ 197.629477] do_syscall_64+0x1b9/0x820 [ 197.633365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.638530] [ 197.640139] Freed by task 5605: [ 197.643418] save_stack+0x43/0xd0 [ 197.646873] __kasan_slab_free+0x102/0x150 [ 197.651123] kasan_slab_free+0xe/0x10 [ 197.655050] kmem_cache_free+0x83/0x290 [ 197.659024] sock_destroy_inode+0x51/0x60 [ 197.663157] destroy_inode+0x159/0x200 [ 197.667039] evict+0x5e0/0x980 [ 197.670215] iput+0x679/0xa90 [ 197.673413] dentry_unlink_inode+0x461/0x5e0 [ 197.677809] __dentry_kill+0x44c/0x7a0 [ 197.681684] dentry_kill+0xc9/0x5a0 [ 197.685346] dput.part.26+0x660/0x790 [ 197.689165] dput+0x15/0x20 [ 197.692083] __fput+0x4cf/0xa30 [ 197.695345] ____fput+0x15/0x20 [ 197.698639] task_work_run+0x1e8/0x2a0 [ 197.702518] exit_to_usermode_loop+0x318/0x380 [ 197.707095] do_syscall_64+0x6be/0x820 [ 197.710981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.716154] [ 197.717769] The buggy address belongs to the object at ffff8801c37b3080 [ 197.717769] which belongs to the cache sock_inode_cache(17:syz0) of size 984 [ 197.731654] The buggy address is located 112 bytes inside of [ 197.731654] 984-byte region [ffff8801c37b3080, ffff8801c37b3458) [ 197.743526] The buggy address belongs to the page: [ 197.748467] page:ffffea00070decc0 count:1 mapcount:0 mapping:ffff8801cec10800 index:0xffff8801c37b3ffd [ 197.757916] flags: 0x2fffc0000000100(slab) [ 197.762140] raw: 02fffc0000000100 ffffea0006db0048 ffffea00070dee88 ffff8801cec10800 [ 197.770006] raw: ffff8801c37b3ffd ffff8801c37b3080 0000000100000003 ffff8801b8facbc0 [ 197.777868] page dumped because: kasan: bad access detected [ 197.783557] page->mem_cgroup:ffff8801b8facbc0 [ 197.788085] [ 197.789701] Memory state around the buggy address: [ 197.794616] ffff8801c37b2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 197.801959] ffff8801c37b3000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 197.809404] >ffff8801c37b3080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.816829] ^ [ 197.823830] ffff8801c37b3100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.831300] ffff8801c37b3180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.838646] ================================================================== [ 197.846002] Disabling lock debugging due to kernel taint [ 197.851512] Kernel panic - not syncing: panic_on_warn set ... [ 197.851512] [ 197.858893] CPU: 0 PID: 5606 Comm: syz-executor0 Tainted: G B 4.19.0-rc2+ #227 [ 197.867547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.876879] Call Trace: [ 197.879486] dump_stack+0x1c4/0x2b4 [ 197.883121] ? dump_stack_print_info.cold.2+0x52/0x52 [ 197.888313] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.893055] panic+0x238/0x4e7 [ 197.896229] ? add_taint.cold.5+0x16/0x16 [ 197.900371] ? trace_hardirqs_on+0x9a/0x310 [ 197.904689] ? trace_hardirqs_on+0xb4/0x310 [ 197.909001] ? trace_hardirqs_on+0xb4/0x310 [ 197.913314] kasan_end_report+0x47/0x4f [ 197.917275] kasan_report.cold.9+0x76/0x309 [ 197.921585] ? sock_i_ino+0x94/0xa0 [ 197.925195] __asan_report_load8_noabort+0x14/0x20 [ 197.930106] sock_i_ino+0x94/0xa0 [ 197.933559] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 197.938212] ? tipc_diag_dump+0x30/0x30 [ 197.942173] ? tipc_getname+0x7f0/0x7f0 [ 197.946148] ? graph_lock+0x170/0x170 [ 197.949955] ? __lock_sock+0x203/0x350 [ 197.953841] ? find_held_lock+0x36/0x1c0 [ 197.957884] ? mark_held_locks+0xc7/0x130 [ 197.962034] ? __local_bh_enable_ip+0x160/0x260 [ 197.966703] ? __local_bh_enable_ip+0x160/0x260 [ 197.971368] ? lockdep_hardirqs_on+0x421/0x5c0 [ 197.975941] ? trace_hardirqs_on+0xbd/0x310 [ 197.980246] ? lock_release+0x970/0x970 [ 197.984205] ? lock_sock_nested+0xe2/0x120 [ 197.988427] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 197.993430] ? skb_put+0x17b/0x1e0 [ 197.996954] ? memset+0x31/0x40 [ 198.000331] ? __nlmsg_put+0x14c/0x1b0 [ 198.004206] __tipc_add_sock_diag+0x233/0x360 [ 198.008687] tipc_nl_sk_walk+0x122/0x1d0 [ 198.012735] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 198.017993] tipc_diag_dump+0x24/0x30 [ 198.021786] netlink_dump+0x519/0xd50 [ 198.025678] ? netlink_broadcast+0x50/0x50 [ 198.029899] __netlink_dump_start+0x4f1/0x6f0 [ 198.034405] ? tipc_data_ready+0x3e0/0x3e0 [ 198.038628] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 198.043716] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 198.048382] ? tipc_data_ready+0x3e0/0x3e0 [ 198.052600] ? tipc_unregister_sysctl+0x20/0x20 [ 198.057257] ? tipc_ioctl+0x3a0/0x3a0 [ 198.061104] ? netlink_deliver_tap+0x355/0xf80 [ 198.065683] sock_diag_rcv_msg+0x31d/0x410 [ 198.069904] netlink_rcv_skb+0x172/0x440 [ 198.073946] ? sock_diag_bind+0x80/0x80 [ 198.077902] ? netlink_ack+0xb80/0xb80 [ 198.081773] sock_diag_rcv+0x2a/0x40 [ 198.085535] netlink_unicast+0x5a5/0x760 [ 198.089597] ? netlink_attachskb+0x9a0/0x9a0 [ 198.093991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.099510] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 198.104512] netlink_sendmsg+0xa18/0xfc0 [ 198.108571] ? netlink_unicast+0x760/0x760 [ 198.112793] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 198.117804] ? apparmor_socket_sendmsg+0x29/0x30 [ 198.122549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.128074] ? security_socket_sendmsg+0x94/0xc0 [ 198.132813] ? netlink_unicast+0x760/0x760 [ 198.137034] sock_sendmsg+0xd5/0x120 [ 198.140733] ___sys_sendmsg+0x7fd/0x930 [ 198.144695] ? __local_bh_enable_ip+0x160/0x260 [ 198.149349] ? copy_msghdr_from_user+0x580/0x580 [ 198.154089] ? kasan_check_write+0x14/0x20 [ 198.158306] ? _raw_spin_unlock_bh+0x30/0x40 [ 198.162702] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 198.168221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.173776] ? release_sock+0x1ec/0x2c0 [ 198.177735] ? __fget_light+0x2e9/0x430 [ 198.181694] ? fget_raw+0x20/0x20 [ 198.185134] ? __release_sock+0x3a0/0x3a0 [ 198.189303] ? tipc_nametbl_build_group+0x273/0x360 [ 198.194304] ? tipc_setsockopt+0x726/0xd70 [ 198.198526] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 198.204047] ? sockfd_lookup_light+0xc5/0x160 [ 198.208539] __sys_sendmsg+0x11d/0x280 [ 198.212416] ? __ia32_sys_shutdown+0x80/0x80 [ 198.216809] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 198.222329] ? fput+0x130/0x1a0 [ 198.225595] ? __x64_sys_futex+0x47f/0x6a0 [ 198.229816] ? do_syscall_64+0x9a/0x820 [ 198.233772] ? do_syscall_64+0x9a/0x820 [ 198.237736] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 198.243187] __x64_sys_sendmsg+0x78/0xb0 [ 198.247256] do_syscall_64+0x1b9/0x820 [ 198.251152] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 198.256497] ? syscall_return_slowpath+0x5e0/0x5e0 [ 198.261414] ? trace_hardirqs_on_caller+0x310/0x310 [ 198.266462] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 198.271462] ? recalc_sigpending_tsk+0x180/0x180 [ 198.276214] ? kasan_check_write+0x14/0x20 [ 198.280454] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.285294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.290479] RIP: 0033:0x457099 [ 198.293671] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.312553] RSP: 002b:00007fb000318c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.320260] RAX: ffffffffffffffda RBX: 00007fb0003196d4 RCX: 0000000000457099 [ 198.327516] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 198.334769] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 198.342017] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 198.349280] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 198.356861] Dumping ftrace buffer: [ 198.360386] (ftrace buffer empty) [ 198.364695] Kernel Offset: disabled [ 198.368330] Rebooting in 86400 seconds..