[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.95' (ECDSA) to the list of known hosts. 2021/05/01 19:24:47 fuzzer started 2021/05/01 19:24:47 dialing manager at 10.128.0.169:44661 2021/05/01 19:24:48 syscalls: 3571 2021/05/01 19:24:48 code coverage: enabled 2021/05/01 19:24:48 comparison tracing: enabled 2021/05/01 19:24:48 extra coverage: enabled 2021/05/01 19:24:48 setuid sandbox: enabled 2021/05/01 19:24:48 namespace sandbox: enabled 2021/05/01 19:24:48 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/01 19:24:48 fault injection: enabled 2021/05/01 19:24:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/01 19:24:48 net packet injection: enabled 2021/05/01 19:24:48 net device setup: enabled 2021/05/01 19:24:48 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/01 19:24:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/01 19:24:48 USB emulation: enabled 2021/05/01 19:24:48 hci packet injection: enabled 2021/05/01 19:24:48 wifi device emulation: enabled 2021/05/01 19:24:48 802.15.4 emulation: enabled 2021/05/01 19:24:48 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/01 19:24:48 fetching corpus: 50, signal 67806/71454 (executing program) 2021/05/01 19:24:48 fetching corpus: 100, signal 93296/98565 (executing program) syzkaller login: [ 75.707704][ T8439] ================================================================== [ 75.716001][ T8439] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 75.723667][ T8439] Read of size 4 at addr ffff88802a398004 by task syz-fuzzer/8439 [ 75.731473][ T8439] [ 75.733796][ T8439] CPU: 0 PID: 8439 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 75.743496][ T8439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.753691][ T8439] Call Trace: [ 75.756985][ T8439] dump_stack+0x141/0x1d7 [ 75.761485][ T8439] ? __skb_datagram_iter+0x6b8/0x770 [ 75.766808][ T8439] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 75.773939][ T8439] ? __skb_datagram_iter+0x6b8/0x770 [ 75.779233][ T8439] ? __skb_datagram_iter+0x6b8/0x770 [ 75.784537][ T8439] kasan_report.cold+0x7c/0xd8 [ 75.789346][ T8439] ? __skb_datagram_iter+0x6b8/0x770 [ 75.794653][ T8439] __skb_datagram_iter+0x6b8/0x770 [ 75.799834][ T8439] ? zerocopy_sg_from_iter+0x110/0x110 [ 75.805423][ T8439] skb_copy_datagram_iter+0x40/0x50 [ 75.810649][ T8439] tcp_recvmsg_locked+0x1048/0x22f0 [ 75.815866][ T8439] ? tcp_splice_read+0x8b0/0x8b0 [ 75.820969][ T8439] ? mark_held_locks+0x9f/0xe0 [ 75.825807][ T8439] ? __local_bh_enable_ip+0xa0/0x120 [ 75.831116][ T8439] tcp_recvmsg+0x134/0x550 [ 75.835559][ T8439] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 75.840943][ T8439] ? aa_sk_perm+0x311/0xab0 [ 75.845471][ T8439] inet_recvmsg+0x11b/0x5e0 [ 75.850013][ T8439] ? inet_sendpage+0x140/0x140 [ 75.854790][ T8439] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.861055][ T8439] ? security_socket_recvmsg+0x8f/0xc0 [ 75.866634][ T8439] sock_read_iter+0x33c/0x470 [ 75.871322][ T8439] ? ____sys_recvmsg+0x600/0x600 [ 75.876285][ T8439] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.882544][ T8439] ? fsnotify+0xa58/0x1060 [ 75.887005][ T8439] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.893388][ T8439] new_sync_read+0x5b7/0x6e0 [ 75.897996][ T8439] ? ksys_lseek+0x1b0/0x1b0 [ 75.904572][ T8439] vfs_read+0x35c/0x570 [ 75.909106][ T8439] ksys_read+0x1ee/0x250 [ 75.913693][ T8439] ? vfs_write+0xa40/0xa40 [ 75.918163][ T8439] ? syscall_enter_from_user_mode+0x27/0x70 [ 75.924093][ T8439] do_syscall_64+0x3a/0xb0 [ 75.928521][ T8439] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 75.934419][ T8439] RIP: 0033:0x4af19b [ 75.938319][ T8439] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 75.957956][ T8439] RSP: 002b:000000c0000a1828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 75.966399][ T8439] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 75.974629][ T8439] RDX: 0000000000001000 RSI: 000000c000202000 RDI: 0000000000000006 [ 75.983421][ T8439] RBP: 000000c0000a1878 R08: 0000000000000001 R09: 0000000000000002 [ 75.993711][ T8439] R10: 00000000000057d4 R11: 0000000000000212 R12: 00000000000057d0 [ 76.002620][ T8439] R13: 0000000000000200 R14: 0000000000000020 R15: 0000000000000010 [ 76.011441][ T8439] [ 76.013764][ T8439] Allocated by task 1: [ 76.017824][ T8439] kasan_save_stack+0x1b/0x40 [ 76.025059][ T8439] __kasan_kmalloc+0x9b/0xd0 [ 76.030931][ T8439] tomoyo_realpath_from_path+0xc3/0x620 [ 76.036760][ T8439] tomoyo_path_perm+0x21b/0x400 [ 76.041632][ T8439] security_inode_getattr+0xcf/0x140 [ 76.047209][ T8439] vfs_statx+0x164/0x390 [ 76.051528][ T8439] __do_sys_newlstat+0x91/0x110 [ 76.056607][ T8439] do_syscall_64+0x3a/0xb0 [ 76.061219][ T8439] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 76.067563][ T8439] [ 76.069919][ T8439] Freed by task 4174: [ 76.074150][ T8439] kasan_save_stack+0x1b/0x40 [ 76.078899][ T8439] kasan_set_track+0x1c/0x30 [ 76.083508][ T8439] kasan_set_free_info+0x20/0x30 [ 76.088916][ T8439] __kasan_slab_free+0xfb/0x130 [ 76.094467][ T8439] slab_free_freelist_hook+0xdf/0x240 [ 76.099962][ T8439] kfree+0xe5/0x7f0 [ 76.103895][ T8439] tomoyo_realpath_from_path+0x191/0x620 [ 76.109656][ T8439] tomoyo_path_perm+0x21b/0x400 [ 76.114526][ T8439] security_inode_getattr+0xcf/0x140 [ 76.119828][ T8439] vfs_statx+0x164/0x390 [ 76.124167][ T8439] __do_sys_newlstat+0x91/0x110 [ 76.129089][ T8439] do_syscall_64+0x3a/0xb0 [ 76.134068][ T8439] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 76.140009][ T8439] [ 76.142424][ T8439] The buggy address belongs to the object at ffff88802a398000 [ 76.142424][ T8439] which belongs to the cache kmalloc-4k of size 4096 [ 76.157172][ T8439] The buggy address is located 4 bytes inside of [ 76.157172][ T8439] 4096-byte region [ffff88802a398000, ffff88802a399000) [ 76.170462][ T8439] The buggy address belongs to the page: [ 76.176100][ T8439] page:ffffea0000a8e600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a398 [ 76.186265][ T8439] head:ffffea0000a8e600 order:3 compound_mapcount:0 compound_pincount:0 [ 76.195306][ T8439] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 76.203412][ T8439] raw: 00fff00000010200 0000000000000000 0000000100000001 ffff888011042140 [ 76.212087][ T8439] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 [ 76.220683][ T8439] page dumped because: kasan: bad access detected [ 76.228055][ T8439] [ 76.230429][ T8439] Memory state around the buggy address: [ 76.236066][ T8439] ffff88802a397f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.244254][ T8439] ffff88802a397f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.252337][ T8439] >ffff88802a398000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.260409][ T8439] ^ [ 76.264475][ T8439] ffff88802a398080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.272979][ T8439] ffff88802a398100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.281128][ T8439] ================================================================== [ 76.289335][ T8439] Disabling lock debugging due to kernel taint [ 76.297251][ T8439] Kernel panic - not syncing: panic_on_warn set ... [ 76.303947][ T8439] CPU: 0 PID: 8439 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 76.315875][ T8439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.325952][ T8439] Call Trace: [ 76.329282][ T8439] dump_stack+0x141/0x1d7 [ 76.335528][ T8439] panic+0x306/0x73d [ 76.339451][ T8439] ? __warn_printk+0xf3/0xf3 [ 76.344047][ T8439] ? preempt_schedule_common+0x59/0xc0 [ 76.349531][ T8439] ? __skb_datagram_iter+0x6b8/0x770 [ 76.355457][ T8439] ? preempt_schedule_thunk+0x16/0x18 [ 76.360936][ T8439] ? trace_hardirqs_on+0x38/0x1c0 [ 76.365964][ T8439] ? trace_hardirqs_on+0x51/0x1c0 [ 76.371016][ T8439] ? __skb_datagram_iter+0x6b8/0x770 [ 76.376299][ T8439] ? __skb_datagram_iter+0x6b8/0x770 [ 76.382630][ T8439] end_report.cold+0x5a/0x5a [ 76.388006][ T8439] kasan_report.cold+0x6a/0xd8 [ 76.393476][ T8439] ? __skb_datagram_iter+0x6b8/0x770 [ 76.398894][ T8439] __skb_datagram_iter+0x6b8/0x770 [ 76.404035][ T8439] ? zerocopy_sg_from_iter+0x110/0x110 [ 76.409522][ T8439] skb_copy_datagram_iter+0x40/0x50 [ 76.415343][ T8439] tcp_recvmsg_locked+0x1048/0x22f0 [ 76.420718][ T8439] ? tcp_splice_read+0x8b0/0x8b0 [ 76.425778][ T8439] ? mark_held_locks+0x9f/0xe0 [ 76.431089][ T8439] ? __local_bh_enable_ip+0xa0/0x120 [ 76.436504][ T8439] tcp_recvmsg+0x134/0x550 [ 76.441031][ T8439] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 76.446694][ T8439] ? aa_sk_perm+0x311/0xab0 [ 76.452782][ T8439] inet_recvmsg+0x11b/0x5e0 [ 76.457437][ T8439] ? inet_sendpage+0x140/0x140 [ 76.462473][ T8439] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 76.468860][ T8439] ? security_socket_recvmsg+0x8f/0xc0 [ 76.474499][ T8439] sock_read_iter+0x33c/0x470 [ 76.479249][ T8439] ? ____sys_recvmsg+0x600/0x600 [ 76.484644][ T8439] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 76.490904][ T8439] ? fsnotify+0xa58/0x1060 [ 76.495334][ T8439] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 76.501597][ T8439] new_sync_read+0x5b7/0x6e0 [ 76.506220][ T8439] ? ksys_lseek+0x1b0/0x1b0 [ 76.510915][ T8439] vfs_read+0x35c/0x570 [ 76.515096][ T8439] ksys_read+0x1ee/0x250 [ 76.519504][ T8439] ? vfs_write+0xa40/0xa40 [ 76.523947][ T8439] ? syscall_enter_from_user_mode+0x27/0x70 [ 76.529849][ T8439] do_syscall_64+0x3a/0xb0 [ 76.534270][ T8439] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 76.540217][ T8439] RIP: 0033:0x4af19b [ 76.544126][ T8439] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 76.564585][ T8439] RSP: 002b:000000c0000a1828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 76.573115][ T8439] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 76.581186][ T8439] RDX: 0000000000001000 RSI: 000000c000202000 RDI: 0000000000000006 [ 76.589353][ T8439] RBP: 000000c0000a1878 R08: 0000000000000001 R09: 0000000000000002 [ 76.598455][ T8439] R10: 00000000000057d4 R11: 0000000000000212 R12: 00000000000057d0 [ 76.606439][ T8439] R13: 0000000000000200 R14: 0000000000000020 R15: 0000000000000010 [ 76.616072][ T8439] Kernel Offset: disabled [ 76.620454][ T8439] Rebooting in 86400 seconds..