Warning: Permanently added '10.128.1.11' (ECDSA) to the list of known hosts. 2021/05/01 12:18:43 fuzzer started 2021/05/01 12:18:44 dialing manager at 10.128.0.169:44661 2021/05/01 12:18:44 syscalls: 3571 2021/05/01 12:18:44 code coverage: enabled 2021/05/01 12:18:44 comparison tracing: enabled 2021/05/01 12:18:44 extra coverage: enabled 2021/05/01 12:18:44 setuid sandbox: enabled 2021/05/01 12:18:44 namespace sandbox: enabled 2021/05/01 12:18:44 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/01 12:18:44 fault injection: enabled 2021/05/01 12:18:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/01 12:18:44 net packet injection: enabled 2021/05/01 12:18:44 net device setup: enabled 2021/05/01 12:18:44 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/01 12:18:44 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/01 12:18:44 USB emulation: enabled 2021/05/01 12:18:44 hci packet injection: enabled 2021/05/01 12:18:44 wifi device emulation: enabled 2021/05/01 12:18:44 802.15.4 emulation: enabled 2021/05/01 12:18:44 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/01 12:18:44 fetching corpus: 50, signal 44619/48407 (executing program) syzkaller login: [ 67.776334][ T8427] ================================================================== [ 67.784528][ T8427] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 67.792192][ T8427] Read of size 4 at addr ffff888030918004 by task syz-fuzzer/8427 [ 67.799972][ T8427] [ 67.802277][ T8427] CPU: 0 PID: 8427 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 67.811797][ T8427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.821948][ T8427] Call Trace: [ 67.825210][ T8427] dump_stack+0x141/0x1d7 [ 67.829532][ T8427] ? __skb_datagram_iter+0x6b8/0x770 [ 67.834801][ T8427] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 67.841811][ T8427] ? __skb_datagram_iter+0x6b8/0x770 [ 67.847100][ T8427] ? __skb_datagram_iter+0x6b8/0x770 [ 67.852364][ T8427] kasan_report.cold+0x7c/0xd8 [ 67.857112][ T8427] ? __skb_datagram_iter+0x6b8/0x770 [ 67.862378][ T8427] __skb_datagram_iter+0x6b8/0x770 [ 67.867681][ T8427] ? zerocopy_sg_from_iter+0x110/0x110 [ 67.873126][ T8427] skb_copy_datagram_iter+0x40/0x50 [ 67.878308][ T8427] tcp_recvmsg_locked+0x1048/0x22f0 [ 67.883501][ T8427] ? tcp_splice_read+0x8b0/0x8b0 [ 67.888422][ T8427] ? mark_held_locks+0x9f/0xe0 [ 67.893274][ T8427] ? __local_bh_enable_ip+0xa0/0x120 [ 67.898547][ T8427] tcp_recvmsg+0x134/0x550 [ 67.902946][ T8427] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 67.908305][ T8427] ? aa_sk_perm+0x311/0xab0 [ 67.912792][ T8427] inet_recvmsg+0x11b/0x5e0 [ 67.917280][ T8427] ? inet_sendpage+0x140/0x140 [ 67.922030][ T8427] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 67.928253][ T8427] ? security_socket_recvmsg+0x8f/0xc0 [ 67.933701][ T8427] sock_read_iter+0x33c/0x470 [ 67.938362][ T8427] ? ____sys_recvmsg+0x600/0x600 [ 67.943373][ T8427] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 67.949598][ T8427] ? fsnotify+0xa58/0x1060 [ 67.953996][ T8427] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 67.960223][ T8427] new_sync_read+0x5b7/0x6e0 [ 67.964795][ T8427] ? ksys_lseek+0x1b0/0x1b0 [ 67.969277][ T8427] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 67.975252][ T8427] vfs_read+0x35c/0x570 [ 67.979409][ T8427] ksys_read+0x1ee/0x250 [ 67.983630][ T8427] ? vfs_write+0xa40/0xa40 [ 67.988027][ T8427] ? syscall_enter_from_user_mode+0x27/0x70 [ 67.993909][ T8427] do_syscall_64+0x3a/0xb0 [ 67.998309][ T8427] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.004185][ T8427] RIP: 0033:0x4af19b [ 68.008066][ T8427] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 68.027659][ T8427] RSP: 002b:000000c0002bb850 EFLAGS: 00000206 ORIG_RAX: 0000000000000000 [ 68.036056][ T8427] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 68.044008][ T8427] RDX: 0000000000001000 RSI: 000000c00056a000 RDI: 0000000000000006 [ 68.051960][ T8427] RBP: 000000c0002bb8a0 R08: 0000000000000001 R09: 0000000000000002 [ 68.060000][ T8427] R10: 00000000000016d5 R11: 0000000000000206 R12: 00000000000016d1 [ 68.067952][ T8427] R13: 0000000000000080 R14: 0000000000000020 R15: 0000000000000008 [ 68.076013][ T8427] [ 68.078327][ T8427] Allocated by task 1: [ 68.082369][ T8427] kasan_save_stack+0x1b/0x40 [ 68.087030][ T8427] __kasan_slab_alloc+0x84/0xa0 [ 68.091864][ T8427] kmem_cache_alloc+0x219/0x3a0 [ 68.096701][ T8427] getname_flags.part.0+0x50/0x4f0 [ 68.101796][ T8427] user_path_at_empty+0xa1/0x100 [ 68.106729][ T8427] vfs_statx+0x142/0x390 [ 68.110953][ T8427] __do_sys_newlstat+0x91/0x110 [ 68.115788][ T8427] do_syscall_64+0x3a/0xb0 [ 68.120194][ T8427] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.126073][ T8427] [ 68.128379][ T8427] Freed by task 8270: [ 68.132335][ T8427] kasan_save_stack+0x1b/0x40 [ 68.136999][ T8427] kasan_set_track+0x1c/0x30 [ 68.141570][ T8427] kasan_set_free_info+0x20/0x30 [ 68.146487][ T8427] __kasan_slab_free+0xfb/0x130 [ 68.151321][ T8427] slab_free_freelist_hook+0xdf/0x240 [ 68.156697][ T8427] kmem_cache_free+0x97/0x750 [ 68.161365][ T8427] putname+0xe1/0x120 [ 68.165342][ T8427] filename_lookup+0x3c3/0x570 [ 68.170092][ T8427] vfs_statx+0x142/0x390 [ 68.175272][ T8427] __do_sys_newlstat+0x91/0x110 [ 68.180114][ T8427] do_syscall_64+0x3a/0xb0 [ 68.184521][ T8427] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.190397][ T8427] [ 68.192704][ T8427] The buggy address belongs to the object at ffff888030918000 [ 68.192704][ T8427] which belongs to the cache names_cache of size 4096 [ 68.206825][ T8427] The buggy address is located 4 bytes inside of [ 68.206825][ T8427] 4096-byte region [ffff888030918000, ffff888030919000) [ 68.220259][ T8427] The buggy address belongs to the page: [ 68.225871][ T8427] page:ffffea0000c24600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x30918 [ 68.236001][ T8427] head:ffffea0000c24600 order:3 compound_mapcount:0 compound_pincount:0 [ 68.244303][ T8427] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 68.252269][ T8427] raw: 00fff00000010200 0000000000000000 0000000200000001 ffff8880111be280 [ 68.260835][ T8427] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 68.269428][ T8427] page dumped because: kasan: bad access detected [ 68.275816][ T8427] [ 68.278116][ T8427] Memory state around the buggy address: [ 68.283720][ T8427] ffff888030917f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.291759][ T8427] ffff888030917f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.299799][ T8427] >ffff888030918000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.307833][ T8427] ^ [ 68.311897][ T8427] ffff888030918080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.319934][ T8427] ffff888030918100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.327974][ T8427] ================================================================== [ 68.336291][ T8427] Disabling lock debugging due to kernel taint [ 68.344010][ T8427] Kernel panic - not syncing: panic_on_warn set ... [ 68.350592][ T8427] CPU: 0 PID: 8427 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 68.361538][ T8427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.371587][ T8427] Call Trace: [ 68.374857][ T8427] dump_stack+0x141/0x1d7 [ 68.379171][ T8427] panic+0x306/0x73d [ 68.383059][ T8427] ? __warn_printk+0xf3/0xf3 [ 68.387632][ T8427] ? preempt_schedule_common+0x59/0xc0 [ 68.393071][ T8427] ? __skb_datagram_iter+0x6b8/0x770 [ 68.398334][ T8427] ? preempt_schedule_thunk+0x16/0x18 [ 68.403686][ T8427] ? trace_hardirqs_on+0x38/0x1c0 [ 68.408699][ T8427] ? trace_hardirqs_on+0x51/0x1c0 [ 68.413718][ T8427] ? __skb_datagram_iter+0x6b8/0x770 [ 68.418978][ T8427] ? __skb_datagram_iter+0x6b8/0x770 [ 68.424238][ T8427] end_report.cold+0x5a/0x5a [ 68.428807][ T8427] kasan_report.cold+0x6a/0xd8 [ 68.433548][ T8427] ? __skb_datagram_iter+0x6b8/0x770 [ 68.438812][ T8427] __skb_datagram_iter+0x6b8/0x770 [ 68.443900][ T8427] ? zerocopy_sg_from_iter+0x110/0x110 [ 68.449339][ T8427] skb_copy_datagram_iter+0x40/0x50 [ 68.454514][ T8427] tcp_recvmsg_locked+0x1048/0x22f0 [ 68.459708][ T8427] ? tcp_splice_read+0x8b0/0x8b0 [ 68.464623][ T8427] ? mark_held_locks+0x9f/0xe0 [ 68.469368][ T8427] ? __local_bh_enable_ip+0xa0/0x120 [ 68.474643][ T8427] tcp_recvmsg+0x134/0x550 [ 68.479040][ T8427] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 68.484391][ T8427] ? aa_sk_perm+0x311/0xab0 [ 68.488872][ T8427] inet_recvmsg+0x11b/0x5e0 [ 68.493377][ T8427] ? inet_sendpage+0x140/0x140 [ 68.498124][ T8427] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.504345][ T8427] ? security_socket_recvmsg+0x8f/0xc0 [ 68.509783][ T8427] sock_read_iter+0x33c/0x470 [ 68.514442][ T8427] ? ____sys_recvmsg+0x600/0x600 [ 68.519359][ T8427] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.525591][ T8427] ? fsnotify+0xa58/0x1060 [ 68.529985][ T8427] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.536206][ T8427] new_sync_read+0x5b7/0x6e0 [ 68.540774][ T8427] ? ksys_lseek+0x1b0/0x1b0 [ 68.545254][ T8427] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 68.551229][ T8427] vfs_read+0x35c/0x570 [ 68.555380][ T8427] ksys_read+0x1ee/0x250 [ 68.559601][ T8427] ? vfs_write+0xa40/0xa40 [ 68.563993][ T8427] ? syscall_enter_from_user_mode+0x27/0x70 [ 68.569863][ T8427] do_syscall_64+0x3a/0xb0 [ 68.574271][ T8427] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.580160][ T8427] RIP: 0033:0x4af19b [ 68.584033][ T8427] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 68.603616][ T8427] RSP: 002b:000000c0002bb850 EFLAGS: 00000206 ORIG_RAX: 0000000000000000 [ 68.612005][ T8427] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 68.619952][ T8427] RDX: 0000000000001000 RSI: 000000c00056a000 RDI: 0000000000000006 [ 68.627900][ T8427] RBP: 000000c0002bb8a0 R08: 0000000000000001 R09: 0000000000000002 [ 68.635856][ T8427] R10: 00000000000016d5 R11: 0000000000000206 R12: 00000000000016d1 [ 68.643803][ T8427] R13: 0000000000000080 R14: 0000000000000020 R15: 0000000000000008 [ 68.652231][ T8427] Kernel Offset: disabled [ 68.656537][ T8427] Rebooting in 86400 seconds..