Warning: Permanently added '10.128.10.3' (ECDSA) to the list of known hosts. 2021/05/03 21:55:49 fuzzer started 2021/05/03 21:55:50 dialing manager at 10.128.0.169:34381 2021/05/03 21:55:50 syscalls: 3586 2021/05/03 21:55:50 code coverage: enabled 2021/05/03 21:55:50 comparison tracing: enabled 2021/05/03 21:55:50 extra coverage: enabled 2021/05/03 21:55:50 setuid sandbox: enabled 2021/05/03 21:55:50 namespace sandbox: enabled 2021/05/03 21:55:50 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/03 21:55:50 fault injection: enabled 2021/05/03 21:55:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/03 21:55:50 net packet injection: enabled 2021/05/03 21:55:50 net device setup: enabled 2021/05/03 21:55:50 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/03 21:55:50 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/03 21:55:50 USB emulation: enabled 2021/05/03 21:55:50 hci packet injection: enabled 2021/05/03 21:55:50 wifi device emulation: enabled 2021/05/03 21:55:50 802.15.4 emulation: enabled 2021/05/03 21:55:50 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/03 21:55:50 fetching corpus: 50, signal 48574/52235 (executing program) 2021/05/03 21:55:50 fetching corpus: 100, signal 74924/80116 (executing program) 2021/05/03 21:55:50 fetching corpus: 150, signal 102972/109485 (executing program) 2021/05/03 21:55:50 fetching corpus: 200, signal 128824/136519 (executing program) syzkaller login: [ 75.427848][ T8441] ================================================================== [ 75.437685][ T8441] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 75.445453][ T8441] Read of size 4 at addr ffff888027198004 by task syz-fuzzer/8441 [ 75.453254][ T8441] [ 75.455742][ T8441] CPU: 0 PID: 8441 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 75.465743][ T8441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.475799][ T8441] Call Trace: [ 75.479089][ T8441] dump_stack+0x141/0x1d7 [ 75.483890][ T8441] ? __skb_datagram_iter+0x6b8/0x770 [ 75.490515][ T8441] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 75.497670][ T8441] ? __skb_datagram_iter+0x6b8/0x770 [ 75.502969][ T8441] ? __skb_datagram_iter+0x6b8/0x770 [ 75.508250][ T8441] kasan_report.cold+0x7c/0xd8 [ 75.513118][ T8441] ? __skb_datagram_iter+0x6b8/0x770 [ 75.518462][ T8441] __skb_datagram_iter+0x6b8/0x770 [ 75.523599][ T8441] ? zerocopy_sg_from_iter+0x110/0x110 [ 75.529076][ T8441] skb_copy_datagram_iter+0x40/0x50 [ 75.534297][ T8441] tcp_recvmsg_locked+0x1048/0x22f0 [ 75.539692][ T8441] ? tcp_splice_read+0x8b0/0x8b0 [ 75.544905][ T8441] ? mark_held_locks+0x9f/0xe0 [ 75.550042][ T8441] ? __local_bh_enable_ip+0xa0/0x120 [ 75.555330][ T8441] tcp_recvmsg+0x134/0x550 [ 75.560116][ T8441] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 75.565665][ T8441] ? aa_sk_perm+0x311/0xab0 [ 75.570729][ T8441] inet_recvmsg+0x11b/0x5e0 [ 75.576015][ T8441] ? inet_sendpage+0x140/0x140 [ 75.581041][ T8441] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.588559][ T8441] ? security_socket_recvmsg+0x8f/0xc0 [ 75.594860][ T8441] sock_read_iter+0x33c/0x470 [ 75.600191][ T8441] ? ____sys_recvmsg+0x600/0x600 [ 75.606576][ T8441] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.614861][ T8441] ? fsnotify+0xa58/0x1060 [ 75.619294][ T8441] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.626113][ T8441] new_sync_read+0x5b7/0x6e0 [ 75.630716][ T8441] ? ksys_lseek+0x1b0/0x1b0 [ 75.635284][ T8441] vfs_read+0x35c/0x570 [ 75.639456][ T8441] ksys_read+0x1ee/0x250 [ 75.643700][ T8441] ? vfs_write+0xa40/0xa40 [ 75.648846][ T8441] ? syscall_enter_from_user_mode+0x27/0x70 [ 75.655540][ T8441] do_syscall_64+0x3a/0xb0 [ 75.660393][ T8441] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 75.666857][ T8441] RIP: 0033:0x4af19b [ 75.670790][ T8441] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 75.692166][ T8441] RSP: 002b:000000c0000ab828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 75.701163][ T8441] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 75.709275][ T8441] RDX: 0000000000001000 RSI: 000000c00021e000 RDI: 0000000000000006 [ 75.717462][ T8441] RBP: 000000c0000ab878 R08: 0000000000000001 R09: 0000000000000002 [ 75.725433][ T8441] R10: 00000000000076c8 R11: 0000000000000212 R12: 00000000000076c4 [ 75.733510][ T8441] R13: 0000000000000400 R14: 0000000000000020 R15: 0000000000000010 [ 75.741979][ T8441] [ 75.744331][ T8441] Allocated by task 1: [ 75.748514][ T8441] kasan_save_stack+0x1b/0x40 [ 75.753198][ T8441] __kasan_slab_alloc+0x84/0xa0 [ 75.758069][ T8441] kmem_cache_alloc+0x219/0x3a0 [ 75.762921][ T8441] getname_flags.part.0+0x50/0x4f0 [ 75.768400][ T8441] getname+0x8e/0xd0 [ 75.772370][ T8441] do_sys_openat2+0xf5/0x420 [ 75.776958][ T8441] __x64_sys_open+0x119/0x1c0 [ 75.781657][ T8441] do_syscall_64+0x3a/0xb0 [ 75.786071][ T8441] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 75.791974][ T8441] [ 75.794288][ T8441] Freed by task 78: [ 75.798076][ T8441] kasan_save_stack+0x1b/0x40 [ 75.803270][ T8441] kasan_set_track+0x1c/0x30 [ 75.807950][ T8441] kasan_set_free_info+0x20/0x30 [ 75.813099][ T8441] __kasan_slab_free+0xfb/0x130 [ 75.818434][ T8441] slab_free_freelist_hook+0xdf/0x240 [ 75.823910][ T8441] kmem_cache_free+0x97/0x750 [ 75.829317][ T8441] putname+0xe1/0x120 [ 75.833333][ T8441] do_sys_openat2+0x153/0x420 [ 75.838041][ T8441] __x64_sys_open+0x119/0x1c0 [ 75.842715][ T8441] do_syscall_64+0x3a/0xb0 [ 75.847303][ T8441] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 75.853395][ T8441] [ 75.855734][ T8441] The buggy address belongs to the object at ffff888027198000 [ 75.855734][ T8441] which belongs to the cache names_cache of size 4096 [ 75.870053][ T8441] The buggy address is located 4 bytes inside of [ 75.870053][ T8441] 4096-byte region [ffff888027198000, ffff888027199000) [ 75.883641][ T8441] The buggy address belongs to the page: [ 75.889275][ T8441] page:ffffea00009c6600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x27198 [ 75.900174][ T8441] head:ffffea00009c6600 order:3 compound_mapcount:0 compound_pincount:0 [ 75.908686][ T8441] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 75.917194][ T8441] raw: 00fff00000010200 0000000000000000 0000000100000001 ffff8880111be280 [ 75.926267][ T8441] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 75.934848][ T8441] page dumped because: kasan: bad access detected [ 75.941729][ T8441] [ 75.944244][ T8441] Memory state around the buggy address: [ 75.950057][ T8441] ffff888027197f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.958134][ T8441] ffff888027197f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.966244][ T8441] >ffff888027198000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.974495][ T8441] ^ [ 75.978573][ T8441] ffff888027198080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.986982][ T8441] ffff888027198100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.995141][ T8441] ================================================================== [ 76.003599][ T8441] Disabling lock debugging due to kernel taint [ 76.012475][ T8441] Kernel panic - not syncing: panic_on_warn set ... [ 76.019614][ T8441] CPU: 1 PID: 8441 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 76.031000][ T8441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.041159][ T8441] Call Trace: [ 76.044563][ T8441] dump_stack+0x141/0x1d7 [ 76.048930][ T8441] panic+0x306/0x73d [ 76.052977][ T8441] ? __warn_printk+0xf3/0xf3 [ 76.057797][ T8441] ? preempt_schedule_common+0x59/0xc0 [ 76.063294][ T8441] ? __skb_datagram_iter+0x6b8/0x770 [ 76.068688][ T8441] ? preempt_schedule_thunk+0x16/0x18 [ 76.074174][ T8441] ? trace_hardirqs_on+0x38/0x1c0 [ 76.079221][ T8441] ? trace_hardirqs_on+0x51/0x1c0 [ 76.084269][ T8441] ? __skb_datagram_iter+0x6b8/0x770 [ 76.090030][ T8441] ? __skb_datagram_iter+0x6b8/0x770 [ 76.095512][ T8441] end_report.cold+0x5a/0x5a [ 76.100128][ T8441] kasan_report.cold+0x6a/0xd8 [ 76.104923][ T8441] ? __skb_datagram_iter+0x6b8/0x770 [ 76.110321][ T8441] __skb_datagram_iter+0x6b8/0x770 [ 76.115461][ T8441] ? zerocopy_sg_from_iter+0x110/0x110 [ 76.120944][ T8441] skb_copy_datagram_iter+0x40/0x50 [ 76.126169][ T8441] tcp_recvmsg_locked+0x1048/0x22f0 [ 76.131423][ T8441] ? tcp_splice_read+0x8b0/0x8b0 [ 76.136388][ T8441] ? mark_held_locks+0x9f/0xe0 [ 76.141188][ T8441] ? __local_bh_enable_ip+0xa0/0x120 [ 76.146572][ T8441] tcp_recvmsg+0x134/0x550 [ 76.151017][ T8441] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 76.156419][ T8441] ? aa_sk_perm+0x311/0xab0 [ 76.160977][ T8441] inet_recvmsg+0x11b/0x5e0 [ 76.165595][ T8441] ? inet_sendpage+0x140/0x140 [ 76.170387][ T8441] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 76.176746][ T8441] ? security_socket_recvmsg+0x8f/0xc0 [ 76.182238][ T8441] sock_read_iter+0x33c/0x470 [ 76.187033][ T8441] ? ____sys_recvmsg+0x600/0x600 [ 76.192039][ T8441] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 76.198310][ T8441] ? fsnotify+0xa58/0x1060 [ 76.202751][ T8441] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 76.209032][ T8441] new_sync_read+0x5b7/0x6e0 [ 76.213653][ T8441] ? ksys_lseek+0x1b0/0x1b0 [ 76.218191][ T8441] vfs_read+0x35c/0x570 [ 76.222398][ T8441] ksys_read+0x1ee/0x250 [ 76.226658][ T8441] ? vfs_write+0xa40/0xa40 [ 76.231102][ T8441] ? syscall_enter_from_user_mode+0x27/0x70 [ 76.237023][ T8441] do_syscall_64+0x3a/0xb0 [ 76.241490][ T8441] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 76.247790][ T8441] RIP: 0033:0x4af19b [ 76.251829][ T8441] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 76.273837][ T8441] RSP: 002b:000000c0000ab828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 76.282276][ T8441] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 76.290457][ T8441] RDX: 0000000000001000 RSI: 000000c00021e000 RDI: 0000000000000006 [ 76.298800][ T8441] RBP: 000000c0000ab878 R08: 0000000000000001 R09: 0000000000000002 [ 76.306820][ T8441] R10: 00000000000076c8 R11: 0000000000000212 R12: 00000000000076c4 [ 76.314811][ T8441] R13: 0000000000000400 R14: 0000000000000020 R15: 0000000000000010 [ 76.323344][ T8441] Kernel Offset: disabled [ 76.327718][ T8441] Rebooting in 86400 seconds..