[ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.247' (ECDSA) to the list of known hosts. 2021/05/03 05:10:51 fuzzer started 2021/05/03 05:10:52 dialing manager at 10.128.0.169:44661 2021/05/03 05:10:52 syscalls: 3571 2021/05/03 05:10:52 code coverage: enabled 2021/05/03 05:10:52 comparison tracing: enabled 2021/05/03 05:10:52 extra coverage: enabled 2021/05/03 05:10:52 setuid sandbox: enabled 2021/05/03 05:10:52 namespace sandbox: enabled 2021/05/03 05:10:52 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/03 05:10:52 fault injection: enabled 2021/05/03 05:10:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/03 05:10:52 net packet injection: enabled 2021/05/03 05:10:52 net device setup: enabled 2021/05/03 05:10:52 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/03 05:10:52 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/03 05:10:52 USB emulation: enabled 2021/05/03 05:10:52 hci packet injection: enabled 2021/05/03 05:10:52 wifi device emulation: enabled 2021/05/03 05:10:52 802.15.4 emulation: enabled 2021/05/03 05:10:52 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/03 05:10:52 fetching corpus: 50, signal 60290/63984 (executing program) syzkaller login: [ 71.575834][ T8443] ================================================================== [ 71.584802][ T8443] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 71.592941][ T8443] Read of size 4 at addr ffff888027160004 by task syz-fuzzer/8443 [ 71.600956][ T8443] [ 71.603389][ T8443] CPU: 1 PID: 8443 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 71.613182][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.623230][ T8443] Call Trace: [ 71.626578][ T8443] dump_stack+0x141/0x1d7 [ 71.631025][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 71.636695][ T8443] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 71.643980][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 71.649465][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 71.654870][ T8443] kasan_report.cold+0x7c/0xd8 [ 71.659653][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 71.665037][ T8443] __skb_datagram_iter+0x6b8/0x770 [ 71.670247][ T8443] ? zerocopy_sg_from_iter+0x110/0x110 [ 71.675994][ T8443] skb_copy_datagram_iter+0x40/0x50 [ 71.681646][ T8443] tcp_recvmsg_locked+0x1048/0x22f0 [ 71.687074][ T8443] ? tcp_splice_read+0x8b0/0x8b0 [ 71.692226][ T8443] ? mark_held_locks+0x9f/0xe0 [ 71.697361][ T8443] ? __local_bh_enable_ip+0xa0/0x120 [ 71.702816][ T8443] tcp_recvmsg+0x134/0x550 [ 71.707235][ T8443] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 71.713957][ T8443] ? aa_sk_perm+0x311/0xab0 [ 71.719055][ T8443] inet_recvmsg+0x11b/0x5e0 [ 71.724535][ T8443] ? inet_sendpage+0x140/0x140 [ 71.729522][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.736127][ T8443] ? security_socket_recvmsg+0x8f/0xc0 [ 71.741762][ T8443] sock_read_iter+0x33c/0x470 [ 71.746541][ T8443] ? ____sys_recvmsg+0x600/0x600 [ 71.751626][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.758043][ T8443] ? fsnotify+0xa58/0x1060 [ 71.762892][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.769336][ T8443] new_sync_read+0x5b7/0x6e0 [ 71.774115][ T8443] ? ksys_lseek+0x1b0/0x1b0 [ 71.778895][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 71.785002][ T8443] vfs_read+0x35c/0x570 [ 71.789367][ T8443] ksys_read+0x1ee/0x250 [ 71.793865][ T8443] ? vfs_write+0xa40/0xa40 [ 71.798367][ T8443] ? syscall_enter_from_user_mode+0x27/0x70 [ 71.804630][ T8443] do_syscall_64+0x3a/0xb0 [ 71.809249][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 71.815327][ T8443] RIP: 0033:0x4af19b [ 71.819233][ T8443] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 71.839472][ T8443] RSP: 002b:000000c0002bf828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 71.848112][ T8443] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 71.856530][ T8443] RDX: 0000000000001000 RSI: 000000c000170000 RDI: 0000000000000006 [ 71.864678][ T8443] RBP: 000000c0002bf878 R08: 0000000000000001 R09: 0000000000000002 [ 71.873123][ T8443] R10: 00000000000030a5 R11: 0000000000000212 R12: 00000000000030a1 [ 71.881174][ T8443] R13: 0000000000000400 R14: 0000000000000004 R15: 0000000000000002 [ 71.889163][ T8443] [ 71.891652][ T8443] Allocated by task 1: [ 71.895706][ T8443] kasan_save_stack+0x1b/0x40 [ 71.900474][ T8443] __kasan_slab_alloc+0x84/0xa0 [ 71.905494][ T8443] kmem_cache_alloc+0x219/0x3a0 [ 71.910628][ T8443] getname_flags.part.0+0x50/0x4f0 [ 71.917224][ T8443] getname+0x8e/0xd0 [ 71.921145][ T8443] do_sys_openat2+0xf5/0x420 [ 71.926361][ T8443] __x64_sys_open+0x119/0x1c0 [ 71.931120][ T8443] do_syscall_64+0x3a/0xb0 [ 71.935640][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 71.941552][ T8443] [ 71.943868][ T8443] Freed by task 8270: [ 71.948024][ T8443] kasan_save_stack+0x1b/0x40 [ 71.953031][ T8443] kasan_set_track+0x1c/0x30 [ 71.958475][ T8443] kasan_set_free_info+0x20/0x30 [ 71.963490][ T8443] __kasan_slab_free+0xfb/0x130 [ 71.968856][ T8443] slab_free_freelist_hook+0xdf/0x240 [ 71.974422][ T8443] kmem_cache_free+0x97/0x750 [ 71.979118][ T8443] putname+0xe1/0x120 [ 71.983304][ T8443] do_sys_openat2+0x153/0x420 [ 71.988079][ T8443] __x64_sys_open+0x119/0x1c0 [ 71.992753][ T8443] do_syscall_64+0x3a/0xb0 [ 71.997256][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 72.004182][ T8443] [ 72.006672][ T8443] The buggy address belongs to the object at ffff888027160000 [ 72.006672][ T8443] which belongs to the cache names_cache of size 4096 [ 72.020993][ T8443] The buggy address is located 4 bytes inside of [ 72.020993][ T8443] 4096-byte region [ffff888027160000, ffff888027161000) [ 72.034609][ T8443] The buggy address belongs to the page: [ 72.040474][ T8443] page:ffffea00009c5800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x27160 [ 72.051438][ T8443] head:ffffea00009c5800 order:3 compound_mapcount:0 compound_pincount:0 [ 72.059879][ T8443] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 72.068266][ T8443] raw: 00fff00000010200 dead000000000100 dead000000000122 ffff8880111be280 [ 72.077294][ T8443] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 72.085969][ T8443] page dumped because: kasan: bad access detected [ 72.092646][ T8443] [ 72.094967][ T8443] Memory state around the buggy address: [ 72.100986][ T8443] ffff88802715ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.109389][ T8443] ffff88802715ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.117893][ T8443] >ffff888027160000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.125945][ T8443] ^ [ 72.130087][ T8443] ffff888027160080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.138410][ T8443] ffff888027160100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.146556][ T8443] ================================================================== [ 72.155097][ T8443] Disabling lock debugging due to kernel taint [ 72.168903][ T8443] Kernel panic - not syncing: panic_on_warn set ... [ 72.175510][ T8443] CPU: 0 PID: 8443 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 72.186890][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.197306][ T8443] Call Trace: [ 72.201121][ T8443] dump_stack+0x141/0x1d7 [ 72.205840][ T8443] panic+0x306/0x73d [ 72.209861][ T8443] ? __warn_printk+0xf3/0xf3 [ 72.214534][ T8443] ? preempt_schedule_common+0x59/0xc0 [ 72.220286][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 72.225757][ T8443] ? preempt_schedule_thunk+0x16/0x18 [ 72.231524][ T8443] ? trace_hardirqs_on+0x38/0x1c0 [ 72.236717][ T8443] ? trace_hardirqs_on+0x51/0x1c0 [ 72.241739][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 72.247371][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 72.252828][ T8443] end_report.cold+0x5a/0x5a [ 72.257751][ T8443] kasan_report.cold+0x6a/0xd8 [ 72.263098][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 72.268772][ T8443] __skb_datagram_iter+0x6b8/0x770 [ 72.274207][ T8443] ? zerocopy_sg_from_iter+0x110/0x110 [ 72.280117][ T8443] skb_copy_datagram_iter+0x40/0x50 [ 72.285950][ T8443] tcp_recvmsg_locked+0x1048/0x22f0 [ 72.291670][ T8443] ? tcp_splice_read+0x8b0/0x8b0 [ 72.297061][ T8443] ? mark_held_locks+0x9f/0xe0 [ 72.302136][ T8443] ? __local_bh_enable_ip+0xa0/0x120 [ 72.307418][ T8443] tcp_recvmsg+0x134/0x550 [ 72.311918][ T8443] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 72.317836][ T8443] ? aa_sk_perm+0x311/0xab0 [ 72.322456][ T8443] inet_recvmsg+0x11b/0x5e0 [ 72.327306][ T8443] ? inet_sendpage+0x140/0x140 [ 72.332502][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.338966][ T8443] ? security_socket_recvmsg+0x8f/0xc0 [ 72.344869][ T8443] sock_read_iter+0x33c/0x470 [ 72.349979][ T8443] ? ____sys_recvmsg+0x600/0x600 [ 72.355086][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.361549][ T8443] ? fsnotify+0xa58/0x1060 [ 72.366160][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.372690][ T8443] new_sync_read+0x5b7/0x6e0 [ 72.377276][ T8443] ? ksys_lseek+0x1b0/0x1b0 [ 72.381792][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 72.387857][ T8443] vfs_read+0x35c/0x570 [ 72.392291][ T8443] ksys_read+0x1ee/0x250 [ 72.396641][ T8443] ? vfs_write+0xa40/0xa40 [ 72.401827][ T8443] ? syscall_enter_from_user_mode+0x27/0x70 [ 72.407897][ T8443] do_syscall_64+0x3a/0xb0 [ 72.412478][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 72.418948][ T8443] RIP: 0033:0x4af19b [ 72.423197][ T8443] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 72.443067][ T8443] RSP: 002b:000000c0002bf828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 72.451572][ T8443] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 72.459824][ T8443] RDX: 0000000000001000 RSI: 000000c000170000 RDI: 0000000000000006 [ 72.468691][ T8443] RBP: 000000c0002bf878 R08: 0000000000000001 R09: 0000000000000002 [ 72.477442][ T8443] R10: 00000000000030a5 R11: 0000000000000212 R12: 00000000000030a1 [ 72.485585][ T8443] R13: 0000000000000400 R14: 0000000000000004 R15: 0000000000000002 [ 72.495034][ T8443] Kernel Offset: disabled [ 72.499395][ T8443] Rebooting in 86400 seconds..