[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 24.390596] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 26.845207] random: sshd: uninitialized urandom read (32 bytes read) [ 27.219993] random: sshd: uninitialized urandom read (32 bytes read) [ 27.802604] random: sshd: uninitialized urandom read (32 bytes read) [ 100.332592] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.12' (ECDSA) to the list of known hosts. [ 106.001386] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/09 11:01:52 parsed 1 programs [ 107.217813] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/09 11:01:54 executed programs: 0 [ 108.283663] IPVS: ftp: loaded support on port[0] = 21 [ 108.397805] ip (5344) used greatest stack depth: 16664 bytes left [ 108.532483] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.539273] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.546730] device bridge_slave_0 entered promiscuous mode [ 108.565057] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.571423] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.579036] device bridge_slave_1 entered promiscuous mode [ 108.596429] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 108.613670] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 108.662134] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 108.681509] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 108.753987] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 108.761243] team0: Port device team_slave_0 added [ 108.777181] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 108.784517] team0: Port device team_slave_1 added [ 108.800310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.822792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 108.842539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.862148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.003485] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.009948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.016772] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.023112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.526395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.575886] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 109.627636] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 109.633788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.640860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.693692] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.008221] ================================================================== [ 110.015714] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 110.021686] Read of size 8 at addr ffff8801c3fd95b0 by task syz-executor0/5586 [ 110.029032] [ 110.030656] CPU: 1 PID: 5586 Comm: syz-executor0 Not tainted 4.19.0-rc2+ #229 [ 110.037912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.047254] Call Trace: [ 110.049841] dump_stack+0x1c4/0x2b4 [ 110.053465] ? dump_stack_print_info.cold.2+0x52/0x52 [ 110.058646] ? printk+0xa7/0xcf [ 110.061920] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 110.066673] print_address_description.cold.8+0x9/0x1ff [ 110.072024] kasan_report.cold.9+0x242/0x309 [ 110.076474] ? sock_i_ino+0x94/0xa0 [ 110.080099] __asan_report_load8_noabort+0x14/0x20 [ 110.085026] sock_i_ino+0x94/0xa0 [ 110.088489] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 110.093144] ? tipc_diag_dump+0x30/0x30 [ 110.097107] ? tipc_getname+0x7f0/0x7f0 [ 110.101081] ? graph_lock+0x170/0x170 [ 110.104874] ? __lock_sock+0x203/0x350 [ 110.108766] ? find_held_lock+0x36/0x1c0 [ 110.112860] ? mark_held_locks+0xc7/0x130 [ 110.117004] ? __local_bh_enable_ip+0x160/0x260 [ 110.121658] ? __local_bh_enable_ip+0x160/0x260 [ 110.126314] ? lockdep_hardirqs_on+0x421/0x5c0 [ 110.130900] ? trace_hardirqs_on+0xbd/0x310 [ 110.135211] ? lock_release+0x970/0x970 [ 110.139175] ? lock_sock_nested+0xe2/0x120 [ 110.143399] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 110.148404] ? skb_put+0x17b/0x1e0 [ 110.151938] ? memset+0x31/0x40 [ 110.155218] ? __nlmsg_put+0x14c/0x1b0 [ 110.159099] __tipc_add_sock_diag+0x233/0x360 [ 110.163729] tipc_nl_sk_walk+0x122/0x1d0 [ 110.167777] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 110.173040] tipc_diag_dump+0x24/0x30 [ 110.176830] netlink_dump+0x519/0xd50 [ 110.180635] ? netlink_broadcast+0x50/0x50 [ 110.184873] __netlink_dump_start+0x4f1/0x6f0 [ 110.189379] ? tipc_data_ready+0x3e0/0x3e0 [ 110.193617] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 110.198718] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 110.203378] ? tipc_data_ready+0x3e0/0x3e0 [ 110.207599] ? tipc_unregister_sysctl+0x20/0x20 [ 110.212253] ? tipc_ioctl+0x3a0/0x3a0 [ 110.216063] ? netlink_deliver_tap+0x355/0xf80 [ 110.220637] sock_diag_rcv_msg+0x31d/0x410 [ 110.224867] netlink_rcv_skb+0x172/0x440 [ 110.228913] ? sock_diag_bind+0x80/0x80 [ 110.232893] ? netlink_ack+0xb80/0xb80 [ 110.236779] sock_diag_rcv+0x2a/0x40 [ 110.240479] netlink_unicast+0x5a5/0x760 [ 110.244530] ? netlink_attachskb+0x9a0/0x9a0 [ 110.248926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.254454] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 110.259463] netlink_sendmsg+0xa18/0xfc0 [ 110.263521] ? netlink_unicast+0x760/0x760 [ 110.267742] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 110.272661] ? apparmor_socket_sendmsg+0x29/0x30 [ 110.277405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.282930] ? security_socket_sendmsg+0x94/0xc0 [ 110.287677] ? netlink_unicast+0x760/0x760 [ 110.291901] sock_sendmsg+0xd5/0x120 [ 110.295605] ___sys_sendmsg+0x7fd/0x930 [ 110.299583] ? __local_bh_enable_ip+0x160/0x260 [ 110.304257] ? copy_msghdr_from_user+0x580/0x580 [ 110.308999] ? kasan_check_write+0x14/0x20 [ 110.313217] ? _raw_spin_unlock_bh+0x30/0x40 [ 110.317616] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 110.323055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.328579] ? release_sock+0x1ec/0x2c0 [ 110.332542] ? __fget_light+0x2e9/0x430 [ 110.336501] ? fget_raw+0x20/0x20 [ 110.339941] ? __release_sock+0x3a0/0x3a0 [ 110.344086] ? tipc_nametbl_build_group+0x273/0x360 [ 110.349103] ? tipc_setsockopt+0x726/0xd70 [ 110.353336] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 110.358866] ? sockfd_lookup_light+0xc5/0x160 [ 110.363353] __sys_sendmsg+0x11d/0x280 [ 110.367232] ? __ia32_sys_shutdown+0x80/0x80 [ 110.371627] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 110.377168] ? fput+0x130/0x1a0 [ 110.380441] ? __x64_sys_futex+0x47f/0x6a0 [ 110.384671] ? do_syscall_64+0x9a/0x820 [ 110.388633] ? do_syscall_64+0x9a/0x820 [ 110.392598] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 110.398044] __x64_sys_sendmsg+0x78/0xb0 [ 110.402096] do_syscall_64+0x1b9/0x820 [ 110.405970] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 110.411321] ? syscall_return_slowpath+0x5e0/0x5e0 [ 110.416250] ? trace_hardirqs_on_caller+0x310/0x310 [ 110.421250] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 110.426253] ? recalc_sigpending_tsk+0x180/0x180 [ 110.431000] ? kasan_check_write+0x14/0x20 [ 110.435225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 110.440064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.445236] RIP: 0033:0x457099 [ 110.448437] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 110.467333] RSP: 002b:00007f1dcd12ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 110.475034] RAX: ffffffffffffffda RBX: 00007f1dcd12f6d4 RCX: 0000000000457099 [ 110.482286] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 110.489541] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 110.496794] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 110.504054] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 110.511334] [ 110.512946] Allocated by task 5586: [ 110.516561] save_stack+0x43/0xd0 [ 110.519996] kasan_kmalloc+0xc7/0xe0 [ 110.523691] kasan_slab_alloc+0x12/0x20 [ 110.527648] kmem_cache_alloc+0x12e/0x730 [ 110.531778] sock_alloc_inode+0x1d/0x260 [ 110.535821] alloc_inode+0x63/0x190 [ 110.539435] new_inode_pseudo+0x71/0x1a0 [ 110.543476] sock_alloc+0x41/0x270 [ 110.546998] __sock_create+0x175/0x930 [ 110.550870] __sys_socket+0x106/0x260 [ 110.554662] __x64_sys_socket+0x73/0xb0 [ 110.558639] do_syscall_64+0x1b9/0x820 [ 110.562514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.567679] [ 110.569288] Freed by task 5585: [ 110.572551] save_stack+0x43/0xd0 [ 110.575990] __kasan_slab_free+0x102/0x150 [ 110.580206] kasan_slab_free+0xe/0x10 [ 110.583992] kmem_cache_free+0x83/0x290 [ 110.587950] sock_destroy_inode+0x51/0x60 [ 110.592081] destroy_inode+0x159/0x200 [ 110.595954] evict+0x5e0/0x980 [ 110.599130] iput+0x679/0xa90 [ 110.602220] dentry_unlink_inode+0x461/0x5e0 [ 110.606611] __dentry_kill+0x44c/0x7a0 [ 110.610482] dentry_kill+0xc9/0x5a0 [ 110.614101] dput.part.26+0x660/0x790 [ 110.617896] dput+0x15/0x20 [ 110.620815] __fput+0x4cf/0xa30 [ 110.624079] ____fput+0x15/0x20 [ 110.627346] task_work_run+0x1e8/0x2a0 [ 110.631222] exit_to_usermode_loop+0x318/0x380 [ 110.635788] do_syscall_64+0x6be/0x820 [ 110.639664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.644830] [ 110.646445] The buggy address belongs to the object at ffff8801c3fd9540 [ 110.646445] which belongs to the cache sock_inode_cache(17:syz0) of size 984 [ 110.660300] The buggy address is located 112 bytes inside of [ 110.660300] 984-byte region [ffff8801c3fd9540, ffff8801c3fd9918) [ 110.672164] The buggy address belongs to the page: [ 110.677078] page:ffffea00070ff640 count:1 mapcount:0 mapping:ffff8801cfd2e800 index:0xffff8801c3fd9ffd [ 110.686506] flags: 0x2fffc0000000100(slab) [ 110.690727] raw: 02fffc0000000100 ffffea0006cd0848 ffffea0006dbfac8 ffff8801cfd2e800 [ 110.698591] raw: ffff8801c3fd9ffd ffff8801c3fd90c0 0000000100000003 ffff8801b8c1e880 [ 110.706450] page dumped because: kasan: bad access detected [ 110.712138] page->mem_cgroup:ffff8801b8c1e880 [ 110.716609] [ 110.718216] Memory state around the buggy address: [ 110.723132] ffff8801c3fd9480: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 110.730473] ffff8801c3fd9500: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 110.737816] >ffff8801c3fd9580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 110.745154] ^ [ 110.750065] ffff8801c3fd9600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 110.757415] ffff8801c3fd9680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 110.764754] ================================================================== [ 110.772096] Disabling lock debugging due to kernel taint [ 110.777595] Kernel panic - not syncing: panic_on_warn set ... [ 110.777595] [ 110.784967] CPU: 1 PID: 5586 Comm: syz-executor0 Tainted: G B 4.19.0-rc2+ #229 [ 110.793621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.802956] Call Trace: [ 110.805528] dump_stack+0x1c4/0x2b4 [ 110.809155] ? dump_stack_print_info.cold.2+0x52/0x52 [ 110.814352] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 110.819097] panic+0x238/0x4e7 [ 110.822275] ? add_taint.cold.5+0x16/0x16 [ 110.826414] ? trace_hardirqs_on+0x9a/0x310 [ 110.830718] ? trace_hardirqs_on+0xb4/0x310 [ 110.835026] ? trace_hardirqs_on+0xb4/0x310 [ 110.839548] kasan_end_report+0x47/0x4f [ 110.843509] kasan_report.cold.9+0x76/0x309 [ 110.847815] ? sock_i_ino+0x94/0xa0 [ 110.851426] __asan_report_load8_noabort+0x14/0x20 [ 110.856352] sock_i_ino+0x94/0xa0 [ 110.859810] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 110.864466] ? tipc_diag_dump+0x30/0x30 [ 110.868429] ? tipc_getname+0x7f0/0x7f0 [ 110.872393] ? graph_lock+0x170/0x170 [ 110.876204] ? __lock_sock+0x203/0x350 [ 110.880092] ? find_held_lock+0x36/0x1c0 [ 110.884141] ? mark_held_locks+0xc7/0x130 [ 110.888275] ? __local_bh_enable_ip+0x160/0x260 [ 110.892933] ? __local_bh_enable_ip+0x160/0x260 [ 110.897588] ? lockdep_hardirqs_on+0x421/0x5c0 [ 110.902154] ? trace_hardirqs_on+0xbd/0x310 [ 110.906479] ? lock_release+0x970/0x970 [ 110.910471] ? lock_sock_nested+0xe2/0x120 [ 110.914692] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 110.919701] ? skb_put+0x17b/0x1e0 [ 110.923225] ? memset+0x31/0x40 [ 110.926490] ? __nlmsg_put+0x14c/0x1b0 [ 110.930363] __tipc_add_sock_diag+0x233/0x360 [ 110.934853] tipc_nl_sk_walk+0x122/0x1d0 [ 110.938909] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 110.944194] tipc_diag_dump+0x24/0x30 [ 110.948011] netlink_dump+0x519/0xd50 [ 110.951799] ? netlink_broadcast+0x50/0x50 [ 110.956023] __netlink_dump_start+0x4f1/0x6f0 [ 110.960504] ? tipc_data_ready+0x3e0/0x3e0 [ 110.964744] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 110.969834] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 110.974492] ? tipc_data_ready+0x3e0/0x3e0 [ 110.978728] ? tipc_unregister_sysctl+0x20/0x20 [ 110.983380] ? tipc_ioctl+0x3a0/0x3a0 [ 110.987186] ? netlink_deliver_tap+0x355/0xf80 [ 110.991758] sock_diag_rcv_msg+0x31d/0x410 [ 110.995979] netlink_rcv_skb+0x172/0x440 [ 111.000028] ? sock_diag_bind+0x80/0x80 [ 111.003989] ? netlink_ack+0xb80/0xb80 [ 111.007865] sock_diag_rcv+0x2a/0x40 [ 111.011568] netlink_unicast+0x5a5/0x760 [ 111.015614] ? netlink_attachskb+0x9a0/0x9a0 [ 111.020009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 111.025530] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 111.030531] netlink_sendmsg+0xa18/0xfc0 [ 111.034580] ? netlink_unicast+0x760/0x760 [ 111.038819] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 111.043753] ? apparmor_socket_sendmsg+0x29/0x30 [ 111.048499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 111.054050] ? security_socket_sendmsg+0x94/0xc0 [ 111.058790] ? netlink_unicast+0x760/0x760 [ 111.063015] sock_sendmsg+0xd5/0x120 [ 111.066727] ___sys_sendmsg+0x7fd/0x930 [ 111.070689] ? __local_bh_enable_ip+0x160/0x260 [ 111.075353] ? copy_msghdr_from_user+0x580/0x580 [ 111.080098] ? kasan_check_write+0x14/0x20 [ 111.084319] ? _raw_spin_unlock_bh+0x30/0x40 [ 111.088724] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 111.094160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 111.099681] ? release_sock+0x1ec/0x2c0 [ 111.103649] ? __fget_light+0x2e9/0x430 [ 111.107606] ? fget_raw+0x20/0x20 [ 111.111044] ? __release_sock+0x3a0/0x3a0 [ 111.115179] ? tipc_nametbl_build_group+0x273/0x360 [ 111.120191] ? tipc_setsockopt+0x726/0xd70 [ 111.124427] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 111.129948] ? sockfd_lookup_light+0xc5/0x160 [ 111.134429] __sys_sendmsg+0x11d/0x280 [ 111.138311] ? __ia32_sys_shutdown+0x80/0x80 [ 111.142709] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 111.148231] ? fput+0x130/0x1a0 [ 111.151498] ? __x64_sys_futex+0x47f/0x6a0 [ 111.155716] ? do_syscall_64+0x9a/0x820 [ 111.159674] ? do_syscall_64+0x9a/0x820 [ 111.163637] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 111.169074] __x64_sys_sendmsg+0x78/0xb0 [ 111.173123] do_syscall_64+0x1b9/0x820 [ 111.176997] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 111.182357] ? syscall_return_slowpath+0x5e0/0x5e0 [ 111.187274] ? trace_hardirqs_on_caller+0x310/0x310 [ 111.192279] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 111.197287] ? recalc_sigpending_tsk+0x180/0x180 [ 111.202039] ? kasan_check_write+0x14/0x20 [ 111.206267] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 111.211117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 111.216294] RIP: 0033:0x457099 [ 111.219471] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 111.238362] RSP: 002b:00007f1dcd12ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 111.246057] RAX: ffffffffffffffda RBX: 00007f1dcd12f6d4 RCX: 0000000000457099 [ 111.253308] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 111.260567] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 111.267835] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 111.275095] R13: 00000000004d4bc0 R14: 00000000004c910b R15: 0000000000000000 [ 111.282705] Dumping ftrace buffer: [ 111.286231] (ftrace buffer empty) [ 111.290499] Kernel Offset: disabled [ 111.294119] Rebooting in 86400 seconds..