[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 13.951807] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 26.854979] random: sshd: uninitialized urandom read (32 bytes read) [ 27.318292] random: sshd: uninitialized urandom read (32 bytes read) [ 27.895532] random: sshd: uninitialized urandom read (32 bytes read) [ 28.022588] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.26' (ECDSA) to the list of known hosts. [ 33.474353] random: sshd: uninitialized urandom read (32 bytes read) RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported [ 33.563070] IPVS: Creating netns size=2536 id=1 Error: argument "bridge0" is wrong: Device does not exist Error: argument "bridge0" is wrong: Device does not exist Error: argument "bond0" is wrong: Device does not exist Error: argument "bond0" is wrong: Device does not exist [ 33.645716] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 33.656933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready Error: argument "team0" is wrong: Device does not exist Error: argument "team0" is wrong: Device does not exist [ 33.698602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 33.709789] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready RTNETLINK answers: Operation not supported [ 33.752152] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 33.763015] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 33.774834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 33.787134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready Cannot find device "bridge0" Cannot find device "bridge0" Cannot find device "bridge0" Cannot find device "bridge0" Cannot find device "vcan0" Cannot find device "vcan0" Cannot find device "vcan0" Cannot find device "vcan0" RTNETLINK answers: Operation not supported Cannot find device "gre0" Cannot find device "gre0" Cannot find device "gre0" Cannot find device "gre0" Cannot find device "gretap0" Cannot find device "gretap0" Cannot find device "gretap0" Cannot find device "gretap0" Cannot find device "ip_vti0" Cannot find device "ip_vti0" Cannot find device "ip_vti0" Cannot find device "ip_vti0" Cannot find device "ip6_vti0" Cannot find device "ip6_vti0" Cannot find device "ip6_vti0" Cannot find device "ip6_vti0" Cannot find device "ip6tnl0" Cannot find device "ip6tnl0" Cannot find device "ip6tnl0" Cannot find device "ip6tnl0" Cannot find device "ip6gre0" Cannot find device "ip6gre0" Cannot find device "ip6gre0" Cannot find device "ip6gre0" Cannot find device "ip6gretap0" Cannot find device "ip6gretap0" Cannot find device "ip6gretap0" Cannot find device "ip6gretap0" Cannot find device "erspan0" Cannot find device "erspan0" Cannot find device "erspan0" Cannot find device "erspan0" Cannot find device "bond0" Cannot find device "bond0" Cannot find device "bond0" Cannot find device "bond0" Cannot find device "team0" Cannot find device "team0" Cannot find device "team0" [ 34.261624] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 34.284647] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 34.290820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.297574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready Cannot find device "team0" executing program [ 34.453106] ================================================================== [ 34.460524] BUG: KASAN: use-after-free in skb_copy_datagram_iter+0x898/0x8f0 [ 34.467697] Read of size 1 at addr ffff8801d6dd85c0 by task syz-executor988/3802 [ 34.475213] [ 34.476825] CPU: 1 PID: 3802 Comm: syz-executor988 Not tainted 4.9.102-gc5aceac #32 [ 34.484598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.493942] ffff8801c499f7e0 ffffffff81eb3489 ffffea00075b7600 ffff8801d6dd85c0 [ 34.501965] 0000000000000000 ffff8801d6dd85c0 0000000000000000 ffff8801c499f818 [ 34.510042] ffffffff815676bb ffff8801d6dd85c0 0000000000000001 0000000000000000 [ 34.518026] Call Trace: [ 34.520616] [] dump_stack+0xc1/0x128 [ 34.525960] [] print_address_description+0x6c/0x234 [ 34.532607] [] kasan_report.cold.6+0x242/0x2fe [ 34.538817] [] ? skb_copy_datagram_iter+0x898/0x8f0 [ 34.545459] [] __asan_report_load1_noabort+0x14/0x20 [ 34.552199] [] skb_copy_datagram_iter+0x898/0x8f0 [ 34.558677] [] sock_recv_errqueue+0xb8/0x3f0 [ 34.564717] [] packet_recvmsg+0x88f/0xf40 [ 34.570502] [] ? packet_rcv_has_room+0xa0/0xa0 [ 34.576708] [] ? get_pages_array+0x60/0x60 [ 34.582567] [] ? selinux_socket_recvmsg+0x3f/0x50 [ 34.589033] [] ? security_socket_recvmsg+0x97/0xc0 [ 34.595589] [] ? packet_rcv_has_room+0xa0/0xa0 [ 34.601800] [] sock_recvmsg+0xc6/0x110 [ 34.607310] [] ? __sock_recv_ts_and_drops+0x490/0x490 [ 34.614122] [] ___sys_recvmsg+0x242/0x550 [ 34.619900] [] ? ___sys_sendmsg+0x840/0x840 [ 34.625846] [] ? selinux_socket_sendmsg+0x3f/0x50 [ 34.632512] [] ? security_socket_sendmsg+0x8f/0xc0 [ 34.639071] [] ? packet_cached_dev_get+0x1f0/0x1f0 [ 34.645628] [] ? sock_sendmsg+0x4f/0x110 [ 34.651311] [] ? SYSC_sendto+0x24b/0x370 [ 34.656991] [] ? SYSC_connect+0x300/0x300 [ 34.662775] [] ? sock_setsockopt+0x3d4/0x17b0 [ 34.668893] [] ? sock_enable_timestamp+0xb0/0xb0 [ 34.675282] [] ? selinux_netlbl_socket_setsockopt+0x8c/0x340 [ 34.682703] [] ? __fget_light+0x169/0x1f0 [ 34.688473] [] ? __fdget+0x18/0x20 [ 34.693636] [] ? sockfd_lookup_light+0xb6/0x160 [ 34.699926] [] __sys_recvmsg+0xd6/0x190 [ 34.705524] [] ? SyS_sendmmsg+0x60/0x60 [ 34.711125] [] ? security_socket_setsockopt+0x8f/0xc0 [ 34.717938] [] ? SyS_setsockopt+0x185/0x260 [ 34.723883] [] SyS_recvmsg+0x2d/0x50 [ 34.729391] [] ? __sys_recvmsg+0x190/0x190 [ 34.735253] [] do_syscall_64+0x1a6/0x490 [ 34.740940] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 34.747837] [ 34.749441] Allocated by task 3802: [ 34.753046] save_stack_trace+0x16/0x20 [ 34.756994] save_stack+0x43/0xd0 [ 34.760418] kasan_kmalloc+0xc7/0xe0 [ 34.764102] kasan_slab_alloc+0x12/0x20 [ 34.768055] __kmalloc_track_caller+0xdc/0x2b0 [ 34.772621] __kmalloc_reserve.isra.37+0x33/0xc0 [ 34.777358] __alloc_skb+0x11a/0x600 [ 34.781043] alloc_skb_with_frags+0xaf/0x520 [ 34.785422] sock_alloc_send_pskb+0x5a9/0x750 [ 34.789889] packet_sendmsg+0x1581/0x4470 [ 34.794013] sock_sendmsg+0xcc/0x110 [ 34.797711] SYSC_sendto+0x21c/0x370 [ 34.801396] SyS_sendto+0x40/0x50 [ 34.804842] do_syscall_64+0x1a6/0x490 [ 34.808705] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 34.813778] [ 34.815378] Freed by task 3802: [ 34.818629] save_stack_trace+0x16/0x20 [ 34.822588] save_stack+0x43/0xd0 [ 34.826015] kasan_slab_free+0x72/0xc0 [ 34.829877] kfree+0xfb/0x310 [ 34.832972] skb_free_head+0x8b/0xb0 [ 34.836657] skb_release_data+0x329/0x400 [ 34.840788] skb_release_all+0x4a/0x60 [ 34.844659] __kfree_skb+0x15/0x20 [ 34.848262] kfree_skb+0xcc/0x340 [ 34.851691] sit_tunnel_xmit+0xfb/0x2590 [ 34.855726] dev_hard_start_xmit+0x197/0x8b0 [ 34.860105] __dev_queue_xmit+0x19a5/0x2080 [ 34.864396] dev_queue_xmit+0x17/0x20 [ 34.868171] packet_sendmsg+0x1eff/0x4470 [ 34.872292] sock_sendmsg+0xcc/0x110 [ 34.875979] SYSC_sendto+0x21c/0x370 [ 34.879668] SyS_sendto+0x40/0x50 [ 34.883096] do_syscall_64+0x1a6/0x490 [ 34.886957] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 34.892040] [ 34.893654] The buggy address belongs to the object at ffff8801d6dd8500 [ 34.893654] which belongs to the cache kmalloc-512 of size 512 [ 34.906282] The buggy address is located 192 bytes inside of [ 34.906282] 512-byte region [ffff8801d6dd8500, ffff8801d6dd8700) [ 34.918739] The buggy address belongs to the page: [ 34.924170] page:ffffea00075b7600 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 34.934352] flags: 0x8000000000004080(slab|head) [ 34.939080] page dumped because: kasan: bad access detected [ 34.944761] [ 34.946360] Memory state around the buggy address: [ 34.951261] ffff8801d6dd8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.958593] ffff8801d6dd8500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.965929] >ffff8801d6dd8580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.973260] ^ [ 34.978691] ffff8801d6dd8600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.986037] ffff8801d6dd8680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.993367] ================================================================== [ 35.000957] Disabling lock debugging due to kernel taint [ 35.008366] Kernel panic - not syncing: panic_on_warn set ... [ 35.008366] [ 35.015743] CPU: 0 PID: 3802 Comm: syz-executor988 Tainted: G B 4.9.102-gc5aceac #32 [ 35.024730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.034078] ffff8801c499f740 ffffffff81eb3489 ffffffff843c5d7d 00000000ffffffff [ 35.042080] 0000000000000000 0000000000000000 0000000000000000 ffff8801c499f800 [ 35.050091] ffffffff81421aa5 0000000041b58ab3 ffffffff843b94b0 ffffffff814218e6 [ 35.058093] Call Trace: [ 35.060670] [] dump_stack+0xc1/0x128 [ 35.066012] [] panic+0x1bf/0x3bc [ 35.071010] [] ? add_taint.cold.6+0x16/0x16 [ 35.076966] [] ? ___preempt_schedule+0x16/0x18 [ 35.083183] [] kasan_end_report+0x47/0x4f [ 35.088958] [] kasan_report.cold.6+0x76/0x2fe [ 35.095079] [] ? skb_copy_datagram_iter+0x898/0x8f0 [ 35.101718] [] __asan_report_load1_noabort+0x14/0x20 [ 35.108444] [] skb_copy_datagram_iter+0x898/0x8f0 [ 35.114920] [] sock_recv_errqueue+0xb8/0x3f0 [ 35.120957] [] packet_recvmsg+0x88f/0xf40 [ 35.126738] [] ? packet_rcv_has_room+0xa0/0xa0 [ 35.132944] [] ? get_pages_array+0x60/0x60 [ 35.138813] [] ? selinux_socket_recvmsg+0x3f/0x50 [ 35.145288] [] ? security_socket_recvmsg+0x97/0xc0 [ 35.151840] [] ? packet_rcv_has_room+0xa0/0xa0 [ 35.158044] [] sock_recvmsg+0xc6/0x110 [ 35.163556] [] ? __sock_recv_ts_and_drops+0x490/0x490 [ 35.170369] [] ___sys_recvmsg+0x242/0x550 [ 35.176150] [] ? ___sys_sendmsg+0x840/0x840 [ 35.182278] [] ? selinux_socket_sendmsg+0x3f/0x50 [ 35.188747] [] ? security_socket_sendmsg+0x8f/0xc0 [ 35.195304] [] ? packet_cached_dev_get+0x1f0/0x1f0 [ 35.201856] [] ? sock_sendmsg+0x4f/0x110 [ 35.207537] [] ? SYSC_sendto+0x24b/0x370 [ 35.213222] [] ? SYSC_connect+0x300/0x300 [ 35.218991] [] ? sock_setsockopt+0x3d4/0x17b0 [ 35.225109] [] ? sock_enable_timestamp+0xb0/0xb0 [ 35.231494] [] ? selinux_netlbl_socket_setsockopt+0x8c/0x340 [ 35.238932] [] ? __fget_light+0x169/0x1f0 [ 35.244702] [] ? __fdget+0x18/0x20 [ 35.249866] [] ? sockfd_lookup_light+0xb6/0x160 [ 35.256156] [] __sys_recvmsg+0xd6/0x190 [ 35.261759] [] ? SyS_sendmmsg+0x60/0x60 [ 35.267355] [] ? security_socket_setsockopt+0x8f/0xc0 [ 35.274169] [] ? SyS_setsockopt+0x185/0x260 [ 35.280110] [] SyS_recvmsg+0x2d/0x50 [ 35.285445] [] ? __sys_recvmsg+0x190/0x190 [ 35.291320] [] do_syscall_64+0x1a6/0x490 [ 35.297012] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 35.304388] Dumping ftrace buffer: [ 35.307918] (ftrace buffer empty) [ 35.311613] Kernel Offset: disabled [ 35.315216] Rebooting in 86400 seconds..