[....] Starting OpenBSD Secure Shell server: sshd[ 25.599959] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 30.485961] random: sshd: uninitialized urandom read (32 bytes read) [ 30.742843] random: sshd: uninitialized urandom read (32 bytes read) [ 31.300321] sshd (5328) used greatest stack depth: 16600 bytes left [ 31.322765] random: sshd: uninitialized urandom read (32 bytes read) [ 88.293100] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.244' (ECDSA) to the list of known hosts. [ 93.879262] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/12 08:48:14 parsed 1 programs [ 94.969670] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/12 08:48:15 executed programs: 0 [ 95.966157] IPVS: ftp: loaded support on port[0] = 21 [ 96.215843] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.222572] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.229649] device bridge_slave_0 entered promiscuous mode [ 96.248070] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.254525] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.261687] device bridge_slave_1 entered promiscuous mode [ 96.278445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 96.296653] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 96.346407] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 96.367143] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 96.440479] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 96.448057] team0: Port device team_slave_0 added [ 96.464931] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 96.472605] team0: Port device team_slave_1 added [ 96.489744] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.509064] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.528302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.547951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.689431] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.695894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.702843] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.709194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.211154] 8021q: adding VLAN 0 to HW filter on device bond0 [ 97.261334] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 97.314263] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 97.320471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.329067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.376930] 8021q: adding VLAN 0 to HW filter on device team0 [ 97.810864] ================================================================== [ 97.818388] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 97.824346] Read of size 8 at addr ffff8801b38330b0 by task syz-executor0/5635 [ 97.831884] [ 97.833498] CPU: 1 PID: 5635 Comm: syz-executor0 Not tainted 4.19.0-rc3+ #232 [ 97.840812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.850252] Call Trace: [ 97.852842] dump_stack+0x1c4/0x2b4 [ 97.856463] ? dump_stack_print_info.cold.2+0x52/0x52 [ 97.861741] ? printk+0xa7/0xcf [ 97.865013] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 97.869816] print_address_description.cold.8+0x9/0x1ff [ 97.875175] kasan_report.cold.9+0x242/0x309 [ 97.879571] ? sock_i_ino+0x94/0xa0 [ 97.883200] __asan_report_load8_noabort+0x14/0x20 [ 97.888119] sock_i_ino+0x94/0xa0 [ 97.891673] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 97.896334] ? tipc_diag_dump+0x30/0x30 [ 97.900409] ? tipc_getname+0x7f0/0x7f0 [ 97.904381] ? graph_lock+0x170/0x170 [ 97.908227] ? __lock_sock+0x203/0x350 [ 97.912130] ? find_held_lock+0x36/0x1c0 [ 97.916181] ? mark_held_locks+0xc7/0x130 [ 97.920316] ? __local_bh_enable_ip+0x160/0x260 [ 97.925079] ? __local_bh_enable_ip+0x160/0x260 [ 97.929780] ? lockdep_hardirqs_on+0x421/0x5c0 [ 97.934360] ? trace_hardirqs_on+0xbd/0x310 [ 97.938670] ? lock_release+0x970/0x970 [ 97.942646] ? lock_sock_nested+0xe2/0x120 [ 97.946873] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 97.951879] ? skb_put+0x17b/0x1e0 [ 97.955403] ? memset+0x31/0x40 [ 97.958729] ? __nlmsg_put+0x14c/0x1b0 [ 97.962616] __tipc_add_sock_diag+0x233/0x360 [ 97.967123] tipc_nl_sk_walk+0x122/0x1d0 [ 97.971174] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 97.976443] tipc_diag_dump+0x24/0x30 [ 97.980231] netlink_dump+0x519/0xd50 [ 97.984145] ? netlink_broadcast+0x50/0x50 [ 97.988374] __netlink_dump_start+0x4f1/0x6f0 [ 97.992906] ? tipc_data_ready+0x3e0/0x3e0 [ 97.997275] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 98.002895] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 98.007567] ? tipc_data_ready+0x3e0/0x3e0 [ 98.011793] ? tipc_unregister_sysctl+0x20/0x20 [ 98.016450] ? tipc_ioctl+0x3a0/0x3a0 [ 98.020238] ? netlink_deliver_tap+0x355/0xf80 [ 98.024858] sock_diag_rcv_msg+0x31d/0x410 [ 98.029092] netlink_rcv_skb+0x172/0x440 [ 98.033146] ? sock_diag_bind+0x80/0x80 [ 98.037112] ? netlink_ack+0xb80/0xb80 [ 98.040990] sock_diag_rcv+0x2a/0x40 [ 98.044700] netlink_unicast+0x5a5/0x760 [ 98.048842] ? netlink_attachskb+0x9a0/0x9a0 [ 98.053248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.058876] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 98.063916] netlink_sendmsg+0xa18/0xfc0 [ 98.067974] ? netlink_unicast+0x760/0x760 [ 98.072212] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 98.077157] ? apparmor_socket_sendmsg+0x29/0x30 [ 98.081917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.087496] ? security_socket_sendmsg+0x94/0xc0 [ 98.092275] ? netlink_unicast+0x760/0x760 [ 98.096506] sock_sendmsg+0xd5/0x120 [ 98.100265] ___sys_sendmsg+0x7fd/0x930 [ 98.104248] ? __local_bh_enable_ip+0x160/0x260 [ 98.108910] ? copy_msghdr_from_user+0x580/0x580 [ 98.113665] ? kasan_check_write+0x14/0x20 [ 98.117887] ? _raw_spin_unlock_bh+0x30/0x40 [ 98.122292] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 98.127728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.133308] ? release_sock+0x1ec/0x2c0 [ 98.137275] ? __fget_light+0x2e9/0x430 [ 98.141233] ? fget_raw+0x20/0x20 [ 98.144713] ? __release_sock+0x3a0/0x3a0 [ 98.148909] ? tipc_nametbl_build_group+0x273/0x360 [ 98.153919] ? tipc_setsockopt+0x726/0xd70 [ 98.158145] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 98.163776] ? sockfd_lookup_light+0xc5/0x160 [ 98.168260] __sys_sendmsg+0x11d/0x280 [ 98.172133] ? __ia32_sys_shutdown+0x80/0x80 [ 98.176528] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 98.182107] ? fput+0x130/0x1a0 [ 98.185377] ? __x64_sys_futex+0x47f/0x6a0 [ 98.189621] ? do_syscall_64+0x9a/0x820 [ 98.193706] ? do_syscall_64+0x9a/0x820 [ 98.197731] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 98.203179] __x64_sys_sendmsg+0x78/0xb0 [ 98.207225] do_syscall_64+0x1b9/0x820 [ 98.211096] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 98.216444] ? syscall_return_slowpath+0x5e0/0x5e0 [ 98.221498] ? trace_hardirqs_on_caller+0x310/0x310 [ 98.226508] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 98.231509] ? recalc_sigpending_tsk+0x180/0x180 [ 98.236363] ? kasan_check_write+0x14/0x20 [ 98.240720] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 98.245559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 98.250734] RIP: 0033:0x4572d9 [ 98.253915] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 98.272908] RSP: 002b:00007f41f40adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 98.280603] RAX: ffffffffffffffda RBX: 00007f41f40ae6d4 RCX: 00000000004572d9 [ 98.287857] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 98.295113] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 98.302371] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 98.309628] R13: 00000000004d4f40 R14: 00000000004c941e R15: 0000000000000000 [ 98.316896] [ 98.318509] Allocated by task 5635: [ 98.322135] save_stack+0x43/0xd0 [ 98.325594] kasan_kmalloc+0xc7/0xe0 [ 98.329364] kasan_slab_alloc+0x12/0x20 [ 98.333342] kmem_cache_alloc+0x12e/0x730 [ 98.337473] sock_alloc_inode+0x1d/0x260 [ 98.341520] alloc_inode+0x63/0x190 [ 98.345132] new_inode_pseudo+0x71/0x1a0 [ 98.349181] sock_alloc+0x41/0x270 [ 98.352712] __sock_create+0x175/0x930 [ 98.356587] __sys_socket+0x106/0x260 [ 98.360372] __x64_sys_socket+0x73/0xb0 [ 98.364331] do_syscall_64+0x1b9/0x820 [ 98.368207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 98.373378] [ 98.375126] Freed by task 5634: [ 98.378388] save_stack+0x43/0xd0 [ 98.381828] __kasan_slab_free+0x102/0x150 [ 98.386057] kasan_slab_free+0xe/0x10 [ 98.389840] kmem_cache_free+0x83/0x290 [ 98.393813] sock_destroy_inode+0x51/0x60 [ 98.397941] destroy_inode+0x159/0x200 [ 98.401823] evict+0x5e0/0x980 [ 98.405012] iput+0x679/0xa90 [ 98.408102] dentry_unlink_inode+0x461/0x5e0 [ 98.412494] __dentry_kill+0x44c/0x7a0 [ 98.416365] dentry_kill+0xc9/0x5a0 [ 98.420010] dput.part.26+0x660/0x790 [ 98.423797] dput+0x15/0x20 [ 98.426728] __fput+0x4cf/0xa30 [ 98.429997] ____fput+0x15/0x20 [ 98.433286] task_work_run+0x1e8/0x2a0 [ 98.437158] exit_to_usermode_loop+0x318/0x380 [ 98.441723] do_syscall_64+0x6be/0x820 [ 98.445641] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 98.450820] [ 98.452431] The buggy address belongs to the object at ffff8801b3833040 [ 98.452431] which belongs to the cache sock_inode_cache(17:syz0) of size 984 [ 98.466288] The buggy address is located 112 bytes inside of [ 98.466288] 984-byte region [ffff8801b3833040, ffff8801b3833418) [ 98.478143] The buggy address belongs to the page: [ 98.483076] page:ffffea0006ce0cc0 count:1 mapcount:0 mapping:ffff8801ca015800 index:0xffff8801b3833ffd [ 98.492517] flags: 0x2fffc0000000100(slab) [ 98.496737] raw: 02fffc0000000100 ffffea0006ce0c08 ffffea0006ce0d08 ffff8801ca015800 [ 98.504600] raw: ffff8801b3833ffd ffff8801b3833040 0000000100000003 ffff8801ce8a4640 [ 98.512461] page dumped because: kasan: bad access detected [ 98.518162] page->mem_cgroup:ffff8801ce8a4640 [ 98.522641] [ 98.524247] Memory state around the buggy address: [ 98.529183] ffff8801b3832f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 98.536524] ffff8801b3833000: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 98.543867] >ffff8801b3833080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 98.551205] ^ [ 98.556141] ffff8801b3833100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 98.563502] ffff8801b3833180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 98.570837] ================================================================== [ 98.578174] Disabling lock debugging due to kernel taint [ 98.583694] Kernel panic - not syncing: panic_on_warn set ... [ 98.583694] [ 98.591106] CPU: 1 PID: 5635 Comm: syz-executor0 Tainted: G B 4.19.0-rc3+ #232 [ 98.599783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.609118] Call Trace: [ 98.611714] dump_stack+0x1c4/0x2b4 [ 98.615341] ? dump_stack_print_info.cold.2+0x52/0x52 [ 98.620524] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 98.625279] panic+0x238/0x4e7 [ 98.628468] ? add_taint.cold.5+0x16/0x16 [ 98.632602] ? trace_hardirqs_on+0x9a/0x310 [ 98.636912] ? trace_hardirqs_on+0xb4/0x310 [ 98.641231] ? trace_hardirqs_on+0xb4/0x310 [ 98.645556] kasan_end_report+0x47/0x4f [ 98.649518] kasan_report.cold.9+0x76/0x309 [ 98.653826] ? sock_i_ino+0x94/0xa0 [ 98.657448] __asan_report_load8_noabort+0x14/0x20 [ 98.662358] sock_i_ino+0x94/0xa0 [ 98.665813] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 98.670478] ? tipc_diag_dump+0x30/0x30 [ 98.674438] ? tipc_getname+0x7f0/0x7f0 [ 98.678420] ? graph_lock+0x170/0x170 [ 98.682204] ? __lock_sock+0x203/0x350 [ 98.686085] ? find_held_lock+0x36/0x1c0 [ 98.690154] ? mark_held_locks+0xc7/0x130 [ 98.694292] ? __local_bh_enable_ip+0x160/0x260 [ 98.698946] ? __local_bh_enable_ip+0x160/0x260 [ 98.703611] ? lockdep_hardirqs_on+0x421/0x5c0 [ 98.708283] ? trace_hardirqs_on+0xbd/0x310 [ 98.712584] ? lock_release+0x970/0x970 [ 98.716554] ? lock_sock_nested+0xe2/0x120 [ 98.720780] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 98.725779] ? skb_put+0x17b/0x1e0 [ 98.729299] ? memset+0x31/0x40 [ 98.732564] ? __nlmsg_put+0x14c/0x1b0 [ 98.736435] __tipc_add_sock_diag+0x233/0x360 [ 98.740913] tipc_nl_sk_walk+0x122/0x1d0 [ 98.744968] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 98.750224] tipc_diag_dump+0x24/0x30 [ 98.754006] netlink_dump+0x519/0xd50 [ 98.757807] ? netlink_broadcast+0x50/0x50 [ 98.762027] __netlink_dump_start+0x4f1/0x6f0 [ 98.766517] ? tipc_data_ready+0x3e0/0x3e0 [ 98.770764] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 98.775864] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 98.780533] ? tipc_data_ready+0x3e0/0x3e0 [ 98.784752] ? tipc_unregister_sysctl+0x20/0x20 [ 98.789406] ? tipc_ioctl+0x3a0/0x3a0 [ 98.793193] ? netlink_deliver_tap+0x355/0xf80 [ 98.797766] sock_diag_rcv_msg+0x31d/0x410 [ 98.801987] netlink_rcv_skb+0x172/0x440 [ 98.806032] ? sock_diag_bind+0x80/0x80 [ 98.809992] ? netlink_ack+0xb80/0xb80 [ 98.813899] sock_diag_rcv+0x2a/0x40 [ 98.817613] netlink_unicast+0x5a5/0x760 [ 98.821681] ? netlink_attachskb+0x9a0/0x9a0 [ 98.826091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.831625] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 98.836652] netlink_sendmsg+0xa18/0xfc0 [ 98.840699] ? netlink_unicast+0x760/0x760 [ 98.844921] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 98.849832] ? apparmor_socket_sendmsg+0x29/0x30 [ 98.854582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.860099] ? security_socket_sendmsg+0x94/0xc0 [ 98.864838] ? netlink_unicast+0x760/0x760 [ 98.869059] sock_sendmsg+0xd5/0x120 [ 98.872767] ___sys_sendmsg+0x7fd/0x930 [ 98.876729] ? __local_bh_enable_ip+0x160/0x260 [ 98.881403] ? copy_msghdr_from_user+0x580/0x580 [ 98.886154] ? kasan_check_write+0x14/0x20 [ 98.890374] ? _raw_spin_unlock_bh+0x30/0x40 [ 98.895060] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 98.900497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.906016] ? release_sock+0x1ec/0x2c0 [ 98.910003] ? __fget_light+0x2e9/0x430 [ 98.913977] ? fget_raw+0x20/0x20 [ 98.917417] ? __release_sock+0x3a0/0x3a0 [ 98.921552] ? tipc_nametbl_build_group+0x273/0x360 [ 98.926556] ? tipc_setsockopt+0x726/0xd70 [ 98.930796] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 98.936317] ? sockfd_lookup_light+0xc5/0x160 [ 98.940799] __sys_sendmsg+0x11d/0x280 [ 98.944692] ? __ia32_sys_shutdown+0x80/0x80 [ 98.949083] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 98.954603] ? fput+0x130/0x1a0 [ 98.957870] ? __x64_sys_futex+0x47f/0x6a0 [ 98.962102] ? do_syscall_64+0x9a/0x820 [ 98.966064] ? do_syscall_64+0x9a/0x820 [ 98.970041] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 98.975479] __x64_sys_sendmsg+0x78/0xb0 [ 98.979528] do_syscall_64+0x1b9/0x820 [ 98.983420] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 98.988768] ? syscall_return_slowpath+0x5e0/0x5e0 [ 98.993695] ? trace_hardirqs_on_caller+0x310/0x310 [ 98.998696] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 99.003696] ? recalc_sigpending_tsk+0x180/0x180 [ 99.008441] ? kasan_check_write+0x14/0x20 [ 99.012664] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 99.017494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 99.022675] RIP: 0033:0x4572d9 [ 99.025868] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 99.044755] RSP: 002b:00007f41f40adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 99.052453] RAX: ffffffffffffffda RBX: 00007f41f40ae6d4 RCX: 00000000004572d9 [ 99.059711] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 99.066974] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 99.074240] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 99.081493] R13: 00000000004d4f40 R14: 00000000004c941e R15: 0000000000000000 [ 99.089717] Kernel Offset: disabled [ 99.093341] Rebooting in 86400 seconds..