Warning: Permanently added '10.128.0.138' (ECDSA) to the list of known hosts. 2021/05/03 18:38:26 fuzzer started 2021/05/03 18:38:27 dialing manager at 10.128.0.169:34381 2021/05/03 18:38:27 syscalls: 3586 2021/05/03 18:38:27 code coverage: enabled 2021/05/03 18:38:27 comparison tracing: enabled 2021/05/03 18:38:27 extra coverage: enabled 2021/05/03 18:38:27 setuid sandbox: enabled 2021/05/03 18:38:27 namespace sandbox: enabled 2021/05/03 18:38:27 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/03 18:38:27 fault injection: enabled 2021/05/03 18:38:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/03 18:38:27 net packet injection: enabled 2021/05/03 18:38:27 net device setup: enabled 2021/05/03 18:38:27 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/03 18:38:27 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/03 18:38:27 USB emulation: enabled 2021/05/03 18:38:27 hci packet injection: enabled 2021/05/03 18:38:27 wifi device emulation: enabled 2021/05/03 18:38:27 802.15.4 emulation: enabled 2021/05/03 18:38:27 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/03 18:38:27 fetching corpus: 50, signal 64292/67838 (executing program) 2021/05/03 18:38:27 fetching corpus: 100, signal 83793/88869 (executing program) 2021/05/03 18:38:28 fetching corpus: 150, signal 114322/120608 (executing program) [ 77.930153][ T8460] ================================================================== [ 77.938681][ T8460] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 77.946852][ T8460] Read of size 4 at addr ffff88802a570004 by task syz-fuzzer/8460 [ 77.954666][ T8460] [ 77.957002][ T8460] CPU: 0 PID: 8460 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 77.966549][ T8460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.976623][ T8460] Call Trace: [ 77.979902][ T8460] dump_stack+0x141/0x1d7 [ 77.985451][ T8460] ? __skb_datagram_iter+0x6b8/0x770 [ 77.992335][ T8460] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 77.999385][ T8460] ? __skb_datagram_iter+0x6b8/0x770 [ 78.004692][ T8460] ? __skb_datagram_iter+0x6b8/0x770 [ 78.010167][ T8460] kasan_report.cold+0x7c/0xd8 [ 78.015048][ T8460] ? __skb_datagram_iter+0x6b8/0x770 [ 78.020527][ T8460] __skb_datagram_iter+0x6b8/0x770 [ 78.025656][ T8460] ? zerocopy_sg_from_iter+0x110/0x110 [ 78.032695][ T8460] skb_copy_datagram_iter+0x40/0x50 [ 78.037918][ T8460] tcp_recvmsg_locked+0x1048/0x22f0 [ 78.043218][ T8460] ? tcp_splice_read+0x8b0/0x8b0 [ 78.048245][ T8460] ? mark_held_locks+0x9f/0xe0 [ 78.053014][ T8460] ? __local_bh_enable_ip+0xa0/0x120 [ 78.058315][ T8460] tcp_recvmsg+0x134/0x550 [ 78.062744][ T8460] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 78.068135][ T8460] ? aa_sk_perm+0x311/0xab0 [ 78.072654][ T8460] inet_recvmsg+0x11b/0x5e0 [ 78.077175][ T8460] ? inet_sendpage+0x140/0x140 [ 78.081993][ T8460] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.088241][ T8460] ? security_socket_recvmsg+0x8f/0xc0 [ 78.093712][ T8460] sock_read_iter+0x33c/0x470 [ 78.098403][ T8460] ? ____sys_recvmsg+0x600/0x600 [ 78.103602][ T8460] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.110327][ T8460] ? fsnotify+0xa58/0x1060 [ 78.114765][ T8460] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.121022][ T8460] new_sync_read+0x5b7/0x6e0 [ 78.125633][ T8460] ? ksys_lseek+0x1b0/0x1b0 [ 78.130163][ T8460] vfs_read+0x35c/0x570 [ 78.134330][ T8460] ksys_read+0x1ee/0x250 [ 78.138582][ T8460] ? vfs_write+0xa40/0xa40 [ 78.143012][ T8460] ? syscall_enter_from_user_mode+0x27/0x70 [ 78.148924][ T8460] do_syscall_64+0x3a/0xb0 [ 78.153693][ T8460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 78.160631][ T8460] RIP: 0033:0x4af19b [ 78.164618][ T8460] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 78.184397][ T8460] RSP: 002b:000000c000095828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 78.192818][ T8460] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 78.201440][ T8460] RDX: 0000000000001000 RSI: 000000c000136000 RDI: 0000000000000006 [ 78.210043][ T8460] RBP: 000000c000095878 R08: 0000000000000001 R09: 0000000000000002 [ 78.218123][ T8460] R10: 00000000000011fd R11: 0000000000000212 R12: ffffffffffffffff [ 78.226113][ T8460] R13: 0000000000002000 R14: 0000000000000008 R15: 0000000000000008 [ 78.234104][ T8460] [ 78.236718][ T8460] Allocated by task 1: [ 78.240775][ T8460] kasan_save_stack+0x1b/0x40 [ 78.245725][ T8460] __kasan_slab_alloc+0x84/0xa0 [ 78.250578][ T8460] kmem_cache_alloc+0x219/0x3a0 [ 78.255430][ T8460] getname_flags.part.0+0x50/0x4f0 [ 78.260543][ T8460] getname+0x8e/0xd0 [ 78.264782][ T8460] do_sys_openat2+0xf5/0x420 [ 78.269380][ T8460] __x64_sys_open+0x119/0x1c0 [ 78.274048][ T8460] do_syscall_64+0x3a/0xb0 [ 78.278466][ T8460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 78.284376][ T8460] [ 78.286704][ T8460] Freed by task 8270: [ 78.290673][ T8460] kasan_save_stack+0x1b/0x40 [ 78.295350][ T8460] kasan_set_track+0x1c/0x30 [ 78.300695][ T8460] kasan_set_free_info+0x20/0x30 [ 78.305629][ T8460] __kasan_slab_free+0xfb/0x130 [ 78.310473][ T8460] slab_free_freelist_hook+0xdf/0x240 [ 78.315938][ T8460] kmem_cache_free+0x97/0x750 [ 78.320625][ T8460] putname+0xe1/0x120 [ 78.324955][ T8460] do_sys_openat2+0x153/0x420 [ 78.329627][ T8460] __x64_sys_open+0x119/0x1c0 [ 78.334297][ T8460] do_syscall_64+0x3a/0xb0 [ 78.338707][ T8460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 78.344595][ T8460] [ 78.346922][ T8460] The buggy address belongs to the object at ffff88802a570000 [ 78.346922][ T8460] which belongs to the cache names_cache of size 4096 [ 78.361059][ T8460] The buggy address is located 4 bytes inside of [ 78.361059][ T8460] 4096-byte region [ffff88802a570000, ffff88802a571000) [ 78.374555][ T8460] The buggy address belongs to the page: [ 78.380181][ T8460] page:ffffea0000a95c00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a570 [ 78.390356][ T8460] head:ffffea0000a95c00 order:3 compound_mapcount:0 compound_pincount:0 [ 78.398692][ T8460] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 78.406698][ T8460] raw: 00fff00000010200 ffffea00004e6800 0000000200000002 ffff8880111be280 [ 78.416071][ T8460] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 78.425576][ T8460] page dumped because: kasan: bad access detected [ 78.432172][ T8460] [ 78.434661][ T8460] Memory state around the buggy address: [ 78.440630][ T8460] ffff88802a56ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 78.449197][ T8460] ffff88802a56ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 78.457651][ T8460] >ffff88802a570000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.465897][ T8460] ^ [ 78.469960][ T8460] ffff88802a570080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.478817][ T8460] ffff88802a570100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.487068][ T8460] ================================================================== [ 78.495233][ T8460] Disabling lock debugging due to kernel taint [ 78.503983][ T8460] Kernel panic - not syncing: panic_on_warn set ... [ 78.511121][ T8460] CPU: 0 PID: 8460 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 78.522162][ T8460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.532419][ T8460] Call Trace: [ 78.536074][ T8460] dump_stack+0x141/0x1d7 [ 78.540410][ T8460] panic+0x306/0x73d [ 78.544307][ T8460] ? __warn_printk+0xf3/0xf3 [ 78.548920][ T8460] ? preempt_schedule_common+0x59/0xc0 [ 78.554396][ T8460] ? __skb_datagram_iter+0x6b8/0x770 [ 78.559674][ T8460] ? preempt_schedule_thunk+0x16/0x18 [ 78.565047][ T8460] ? trace_hardirqs_on+0x38/0x1c0 [ 78.570079][ T8460] ? trace_hardirqs_on+0x51/0x1c0 [ 78.575108][ T8460] ? __skb_datagram_iter+0x6b8/0x770 [ 78.580381][ T8460] ? __skb_datagram_iter+0x6b8/0x770 [ 78.585936][ T8460] end_report.cold+0x5a/0x5a [ 78.590630][ T8460] kasan_report.cold+0x6a/0xd8 [ 78.595425][ T8460] ? __skb_datagram_iter+0x6b8/0x770 [ 78.600708][ T8460] __skb_datagram_iter+0x6b8/0x770 [ 78.605838][ T8460] ? zerocopy_sg_from_iter+0x110/0x110 [ 78.611399][ T8460] skb_copy_datagram_iter+0x40/0x50 [ 78.616611][ T8460] tcp_recvmsg_locked+0x1048/0x22f0 [ 78.621837][ T8460] ? tcp_splice_read+0x8b0/0x8b0 [ 78.626923][ T8460] ? mark_held_locks+0x9f/0xe0 [ 78.633801][ T8460] ? __local_bh_enable_ip+0xa0/0x120 [ 78.640346][ T8460] tcp_recvmsg+0x134/0x550 [ 78.644782][ T8460] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 78.650664][ T8460] ? aa_sk_perm+0x311/0xab0 [ 78.655700][ T8460] inet_recvmsg+0x11b/0x5e0 [ 78.660328][ T8460] ? inet_sendpage+0x140/0x140 [ 78.665119][ T8460] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.671447][ T8460] ? security_socket_recvmsg+0x8f/0xc0 [ 78.677205][ T8460] sock_read_iter+0x33c/0x470 [ 78.681902][ T8460] ? ____sys_recvmsg+0x600/0x600 [ 78.688404][ T8460] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.694767][ T8460] ? fsnotify+0xa58/0x1060 [ 78.699206][ T8460] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.705593][ T8460] new_sync_read+0x5b7/0x6e0 [ 78.710342][ T8460] ? ksys_lseek+0x1b0/0x1b0 [ 78.714954][ T8460] vfs_read+0x35c/0x570 [ 78.719110][ T8460] ksys_read+0x1ee/0x250 [ 78.723353][ T8460] ? vfs_write+0xa40/0xa40 [ 78.727768][ T8460] ? syscall_enter_from_user_mode+0x27/0x70 [ 78.733655][ T8460] do_syscall_64+0x3a/0xb0 [ 78.739052][ T8460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 78.746274][ T8460] RIP: 0033:0x4af19b [ 78.750188][ T8460] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 78.771032][ T8460] RSP: 002b:000000c000095828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 78.779717][ T8460] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 78.789889][ T8460] RDX: 0000000000001000 RSI: 000000c000136000 RDI: 0000000000000006 [ 78.797874][ T8460] RBP: 000000c000095878 R08: 0000000000000001 R09: 0000000000000002 [ 78.805930][ T8460] R10: 00000000000011fd R11: 0000000000000212 R12: ffffffffffffffff [ 78.813919][ T8460] R13: 0000000000002000 R14: 0000000000000008 R15: 0000000000000008 [ 78.822348][ T8460] Kernel Offset: disabled [ 78.826694][ T8460] Rebooting in 86400 seconds..