Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.129' (ECDSA) to the list of known hosts. 2021/05/02 02:53:45 fuzzer started 2021/05/02 02:53:46 dialing manager at 10.128.0.169:44661 2021/05/02 02:53:46 syscalls: 3571 2021/05/02 02:53:46 code coverage: enabled 2021/05/02 02:53:46 comparison tracing: enabled 2021/05/02 02:53:46 extra coverage: enabled 2021/05/02 02:53:46 setuid sandbox: enabled 2021/05/02 02:53:46 namespace sandbox: enabled 2021/05/02 02:53:46 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/02 02:53:46 fault injection: enabled 2021/05/02 02:53:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/02 02:53:46 net packet injection: enabled 2021/05/02 02:53:46 net device setup: enabled 2021/05/02 02:53:46 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/02 02:53:46 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/02 02:53:46 USB emulation: enabled 2021/05/02 02:53:46 hci packet injection: enabled 2021/05/02 02:53:46 wifi device emulation: enabled 2021/05/02 02:53:46 802.15.4 emulation: enabled 2021/05/02 02:53:46 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/02 02:53:46 fetching corpus: 50, signal 49013/52740 (executing program) syzkaller login: [ 79.272288][ T8463] ================================================================== [ 79.282056][ T8463] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 79.290198][ T8463] Read of size 4 at addr ffff8880278e0004 by task syz-fuzzer/8463 [ 79.298583][ T8463] [ 79.301082][ T8463] CPU: 0 PID: 8463 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 79.311639][ T8463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.324479][ T8463] Call Trace: [ 79.328245][ T8463] dump_stack+0x141/0x1d7 [ 79.333200][ T8463] ? __skb_datagram_iter+0x6b8/0x770 [ 79.340155][ T8463] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 79.347286][ T8463] ? __skb_datagram_iter+0x6b8/0x770 [ 79.352963][ T8463] ? __skb_datagram_iter+0x6b8/0x770 [ 79.359112][ T8463] kasan_report.cold+0x7c/0xd8 [ 79.364167][ T8463] ? __skb_datagram_iter+0x6b8/0x770 [ 79.369642][ T8463] __skb_datagram_iter+0x6b8/0x770 [ 79.374937][ T8463] ? zerocopy_sg_from_iter+0x110/0x110 [ 79.380604][ T8463] skb_copy_datagram_iter+0x40/0x50 [ 79.385929][ T8463] tcp_recvmsg_locked+0x1048/0x22f0 [ 79.391771][ T8463] ? tcp_splice_read+0x8b0/0x8b0 [ 79.397098][ T8463] ? mark_held_locks+0x9f/0xe0 [ 79.402226][ T8463] ? __local_bh_enable_ip+0xa0/0x120 [ 79.407810][ T8463] tcp_recvmsg+0x134/0x550 [ 79.412465][ T8463] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 79.418068][ T8463] ? aa_sk_perm+0x311/0xab0 [ 79.422772][ T8463] inet_recvmsg+0x11b/0x5e0 [ 79.427642][ T8463] ? inet_sendpage+0x140/0x140 [ 79.433482][ T8463] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 79.440496][ T8463] ? security_socket_recvmsg+0x8f/0xc0 [ 79.446332][ T8463] sock_read_iter+0x33c/0x470 [ 79.451446][ T8463] ? ____sys_recvmsg+0x600/0x600 [ 79.457356][ T8463] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 79.463697][ T8463] ? fsnotify+0xa58/0x1060 [ 79.468858][ T8463] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 79.475720][ T8463] new_sync_read+0x5b7/0x6e0 [ 79.481303][ T8463] ? ksys_lseek+0x1b0/0x1b0 [ 79.487217][ T8463] vfs_read+0x35c/0x570 [ 79.491966][ T8463] ksys_read+0x1ee/0x250 [ 79.497099][ T8463] ? vfs_write+0xa40/0xa40 [ 79.501963][ T8463] ? syscall_enter_from_user_mode+0x27/0x70 [ 79.508537][ T8463] do_syscall_64+0x3a/0xb0 [ 79.514324][ T8463] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.520717][ T8463] RIP: 0033:0x4af19b [ 79.525279][ T8463] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 79.546899][ T8463] RSP: 002b:000000c000445820 EFLAGS: 00000206 ORIG_RAX: 0000000000000000 [ 79.560030][ T8463] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 79.569473][ T8463] RDX: 0000000000001000 RSI: 000000c0001dc000 RDI: 0000000000000006 [ 79.578325][ T8463] RBP: 000000c000445870 R08: 0000000000000001 R09: 0000000000000002 [ 79.586930][ T8463] R10: 0000000000000130 R11: 0000000000000206 R12: 0000000000b97a20 [ 79.595921][ T8463] R13: 0000000000000002 R14: 0000000000000002 R15: 0000000000000002 [ 79.606109][ T8463] [ 79.609127][ T8463] Allocated by task 1: [ 79.613582][ T8463] kasan_save_stack+0x1b/0x40 [ 79.620611][ T8463] __kasan_kmalloc+0x9b/0xd0 [ 79.625403][ T8463] tomoyo_realpath_from_path+0xc3/0x620 [ 79.631926][ T8463] tomoyo_path_perm+0x21b/0x400 [ 79.637272][ T8463] security_inode_getattr+0xcf/0x140 [ 79.643001][ T8463] vfs_statx+0x164/0x390 [ 79.648785][ T8463] __do_sys_newlstat+0x91/0x110 [ 79.654167][ T8463] do_syscall_64+0x3a/0xb0 [ 79.659778][ T8463] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.665930][ T8463] [ 79.668860][ T8463] Freed by task 78: [ 79.675433][ T8463] kasan_save_stack+0x1b/0x40 [ 79.680899][ T8463] kasan_set_track+0x1c/0x30 [ 79.685693][ T8463] kasan_set_free_info+0x20/0x30 [ 79.691956][ T8463] __kasan_slab_free+0xfb/0x130 [ 79.698952][ T8463] slab_free_freelist_hook+0xdf/0x240 [ 79.706073][ T8463] kfree+0xe5/0x7f0 [ 79.710389][ T8463] tomoyo_realpath_from_path+0x191/0x620 [ 79.717344][ T8463] tomoyo_path_perm+0x21b/0x400 [ 79.722283][ T8463] security_inode_getattr+0xcf/0x140 [ 79.727854][ T8463] vfs_statx+0x164/0x390 [ 79.732734][ T8463] __do_sys_newlstat+0x91/0x110 [ 79.738608][ T8463] do_syscall_64+0x3a/0xb0 [ 79.743769][ T8463] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.751607][ T8463] [ 79.754321][ T8463] The buggy address belongs to the object at ffff8880278e0000 [ 79.754321][ T8463] which belongs to the cache kmalloc-4k of size 4096 [ 79.770003][ T8463] The buggy address is located 4 bytes inside of [ 79.770003][ T8463] 4096-byte region [ffff8880278e0000, ffff8880278e1000) [ 79.785091][ T8463] The buggy address belongs to the page: [ 79.790809][ T8463] page:ffffea00009e3800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x278e0 [ 79.801781][ T8463] head:ffffea00009e3800 order:3 compound_mapcount:0 compound_pincount:0 [ 79.810855][ T8463] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 79.819115][ T8463] raw: 00fff00000010200 0000000000000000 0000000100000001 ffff888011042140 [ 79.829252][ T8463] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 [ 79.839931][ T8463] page dumped because: kasan: bad access detected [ 79.847472][ T8463] [ 79.850110][ T8463] Memory state around the buggy address: [ 79.856649][ T8463] ffff8880278dff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 79.866398][ T8463] ffff8880278dff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 79.875183][ T8463] >ffff8880278e0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.884109][ T8463] ^ [ 79.889089][ T8463] ffff8880278e0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.898571][ T8463] ffff8880278e0100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.907683][ T8463] ================================================================== [ 79.916084][ T8463] Disabling lock debugging due to kernel taint [ 79.925421][ T8463] Kernel panic - not syncing: panic_on_warn set ... [ 79.932511][ T8463] CPU: 1 PID: 8463 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 79.943627][ T8463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.955595][ T8463] Call Trace: [ 79.958884][ T8463] dump_stack+0x141/0x1d7 [ 79.963350][ T8463] panic+0x306/0x73d [ 79.967598][ T8463] ? __warn_printk+0xf3/0xf3 [ 79.973083][ T8463] ? preempt_schedule_common+0x59/0xc0 [ 79.980066][ T8463] ? __skb_datagram_iter+0x6b8/0x770 [ 79.986119][ T8463] ? preempt_schedule_thunk+0x16/0x18 [ 79.992167][ T8463] ? trace_hardirqs_on+0x38/0x1c0 [ 79.997470][ T8463] ? trace_hardirqs_on+0x51/0x1c0 [ 80.003122][ T8463] ? __skb_datagram_iter+0x6b8/0x770 [ 80.008661][ T8463] ? __skb_datagram_iter+0x6b8/0x770 [ 80.014385][ T8463] end_report.cold+0x5a/0x5a [ 80.019064][ T8463] kasan_report.cold+0x6a/0xd8 [ 80.024404][ T8463] ? __skb_datagram_iter+0x6b8/0x770 [ 80.030340][ T8463] __skb_datagram_iter+0x6b8/0x770 [ 80.035992][ T8463] ? zerocopy_sg_from_iter+0x110/0x110 [ 80.042041][ T8463] skb_copy_datagram_iter+0x40/0x50 [ 80.047676][ T8463] tcp_recvmsg_locked+0x1048/0x22f0 [ 80.053092][ T8463] ? tcp_splice_read+0x8b0/0x8b0 [ 80.058124][ T8463] ? mark_held_locks+0x9f/0xe0 [ 80.063492][ T8463] ? __local_bh_enable_ip+0xa0/0x120 [ 80.068977][ T8463] tcp_recvmsg+0x134/0x550 [ 80.074202][ T8463] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 80.079955][ T8463] ? aa_sk_perm+0x311/0xab0 [ 80.084888][ T8463] inet_recvmsg+0x11b/0x5e0 [ 80.090098][ T8463] ? inet_sendpage+0x140/0x140 [ 80.096212][ T8463] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 80.102846][ T8463] ? security_socket_recvmsg+0x8f/0xc0 [ 80.109094][ T8463] sock_read_iter+0x33c/0x470 [ 80.114146][ T8463] ? ____sys_recvmsg+0x600/0x600 [ 80.119870][ T8463] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 80.126501][ T8463] ? fsnotify+0xa58/0x1060 [ 80.131118][ T8463] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 80.137802][ T8463] new_sync_read+0x5b7/0x6e0 [ 80.142591][ T8463] ? ksys_lseek+0x1b0/0x1b0 [ 80.147403][ T8463] vfs_read+0x35c/0x570 [ 80.151835][ T8463] ksys_read+0x1ee/0x250 [ 80.157214][ T8463] ? vfs_write+0xa40/0xa40 [ 80.162178][ T8463] ? syscall_enter_from_user_mode+0x27/0x70 [ 80.169595][ T8463] do_syscall_64+0x3a/0xb0 [ 80.174532][ T8463] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.181515][ T8463] RIP: 0033:0x4af19b [ 80.185766][ T8463] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 80.207352][ T8463] RSP: 002b:000000c000445820 EFLAGS: 00000206 ORIG_RAX: 0000000000000000 [ 80.216304][ T8463] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 80.225190][ T8463] RDX: 0000000000001000 RSI: 000000c0001dc000 RDI: 0000000000000006 [ 80.233424][ T8463] RBP: 000000c000445870 R08: 0000000000000001 R09: 0000000000000002 [ 80.241922][ T8463] R10: 0000000000000130 R11: 0000000000000206 R12: 0000000000b97a20 [ 80.250342][ T8463] R13: 0000000000000002 R14: 0000000000000002 R15: 0000000000000002 [ 80.260783][ T8463] Kernel Offset: disabled [ 80.265477][ T8463] Rebooting in 86400 seconds..