Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.156' (ECDSA) to the list of known hosts. 2021/05/02 03:56:00 fuzzer started 2021/05/02 03:56:00 dialing manager at 10.128.0.169:44661 2021/05/02 03:56:01 syscalls: 3571 2021/05/02 03:56:01 code coverage: enabled 2021/05/02 03:56:01 comparison tracing: enabled 2021/05/02 03:56:01 extra coverage: enabled 2021/05/02 03:56:01 setuid sandbox: enabled 2021/05/02 03:56:01 namespace sandbox: enabled 2021/05/02 03:56:01 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/02 03:56:01 fault injection: enabled 2021/05/02 03:56:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/02 03:56:01 net packet injection: enabled 2021/05/02 03:56:01 net device setup: enabled 2021/05/02 03:56:01 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/02 03:56:01 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/02 03:56:01 USB emulation: enabled 2021/05/02 03:56:01 hci packet injection: enabled 2021/05/02 03:56:01 wifi device emulation: enabled 2021/05/02 03:56:01 802.15.4 emulation: enabled 2021/05/02 03:56:01 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/02 03:56:01 fetching corpus: 50, signal 66352/69985 (executing program) 2021/05/02 03:56:01 fetching corpus: 100, signal 95349/100594 (executing program) syzkaller login: [ 77.868503][ T8464] ================================================================== [ 77.876747][ T8464] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 77.884479][ T8464] Read of size 4 at addr ffff888014c10004 by task syz-fuzzer/8464 [ 77.892269][ T8464] [ 77.894609][ T8464] CPU: 0 PID: 8464 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 77.904143][ T8464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.914206][ T8464] Call Trace: [ 77.917483][ T8464] dump_stack+0x141/0x1d7 [ 77.922046][ T8464] ? __skb_datagram_iter+0x6b8/0x770 [ 77.927389][ T8464] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 77.934425][ T8464] ? __skb_datagram_iter+0x6b8/0x770 [ 77.939708][ T8464] ? __skb_datagram_iter+0x6b8/0x770 [ 77.945147][ T8464] kasan_report.cold+0x7c/0xd8 [ 77.950019][ T8464] ? __skb_datagram_iter+0x6b8/0x770 [ 77.955308][ T8464] __skb_datagram_iter+0x6b8/0x770 [ 77.960438][ T8464] ? zerocopy_sg_from_iter+0x110/0x110 [ 77.966369][ T8464] skb_copy_datagram_iter+0x40/0x50 [ 77.971658][ T8464] tcp_recvmsg_locked+0x1048/0x22f0 [ 77.976907][ T8464] ? tcp_splice_read+0x8b0/0x8b0 [ 77.981846][ T8464] ? mark_held_locks+0x9f/0xe0 [ 77.986648][ T8464] ? __local_bh_enable_ip+0xa0/0x120 [ 77.991948][ T8464] tcp_recvmsg+0x134/0x550 [ 77.996356][ T8464] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 78.001736][ T8464] ? aa_sk_perm+0x311/0xab0 [ 78.006251][ T8464] inet_recvmsg+0x11b/0x5e0 [ 78.010749][ T8464] ? inet_sendpage+0x140/0x140 [ 78.015497][ T8464] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.021740][ T8464] ? security_socket_recvmsg+0x8f/0xc0 [ 78.027188][ T8464] sock_read_iter+0x33c/0x470 [ 78.031852][ T8464] ? ____sys_recvmsg+0x600/0x600 [ 78.036781][ T8464] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.043251][ T8464] ? fsnotify+0xa58/0x1060 [ 78.051376][ T8464] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.057714][ T8464] new_sync_read+0x5b7/0x6e0 [ 78.062299][ T8464] ? ksys_lseek+0x1b0/0x1b0 [ 78.066790][ T8464] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 78.072789][ T8464] vfs_read+0x35c/0x570 [ 78.076933][ T8464] ksys_read+0x1ee/0x250 [ 78.081172][ T8464] ? vfs_write+0xa40/0xa40 [ 78.085578][ T8464] ? syscall_enter_from_user_mode+0x31/0x70 [ 78.091488][ T8464] do_syscall_64+0x3a/0xb0 [ 78.095895][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 78.101780][ T8464] RIP: 0033:0x4af19b [ 78.105669][ T8464] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 78.125257][ T8464] RSP: 002b:000000c000367828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 78.133663][ T8464] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 78.142074][ T8464] RDX: 0000000000001000 RSI: 000000c0001e9000 RDI: 0000000000000006 [ 78.150223][ T8464] RBP: 000000c000367878 R08: 0000000000000001 R09: 0000000000000002 [ 78.159365][ T8464] R10: 000000000000672c R11: 0000000000000212 R12: 0000000000006726 [ 78.167696][ T8464] R13: 0000000000001000 R14: 0000000000000040 R15: 0000000000000008 [ 78.175982][ T8464] [ 78.178404][ T8464] Allocated by task 8413: [ 78.182789][ T8464] kasan_save_stack+0x1b/0x40 [ 78.187738][ T8464] __kasan_slab_alloc+0x84/0xa0 [ 78.192609][ T8464] kmem_cache_alloc+0x219/0x3a0 [ 78.197477][ T8464] getname_flags.part.0+0x50/0x4f0 [ 78.202669][ T8464] user_path_at_empty+0xa1/0x100 [ 78.207605][ T8464] do_readlinkat+0xcd/0x2f0 [ 78.212108][ T8464] __x64_sys_readlinkat+0x93/0xf0 [ 78.217137][ T8464] do_syscall_64+0x3a/0xb0 [ 78.221543][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 78.227418][ T8464] [ 78.229731][ T8464] Freed by task 20558: [ 78.233774][ T8464] kasan_save_stack+0x1b/0x40 [ 78.238679][ T8464] kasan_set_track+0x1c/0x30 [ 78.243926][ T8464] kasan_set_free_info+0x20/0x30 [ 78.249504][ T8464] __kasan_slab_free+0xfb/0x130 [ 78.255055][ T8464] slab_free_freelist_hook+0xdf/0x240 [ 78.261000][ T8464] kmem_cache_free+0x97/0x750 [ 78.265985][ T8464] putname+0xe1/0x120 [ 78.270706][ T8464] filename_lookup+0x3c3/0x570 [ 78.276084][ T8464] do_readlinkat+0xcd/0x2f0 [ 78.280688][ T8464] __x64_sys_readlinkat+0x93/0xf0 [ 78.285821][ T8464] do_syscall_64+0x3a/0xb0 [ 78.290332][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 78.296242][ T8464] [ 78.298752][ T8464] The buggy address belongs to the object at ffff888014c10000 [ 78.298752][ T8464] which belongs to the cache names_cache of size 4096 [ 78.313290][ T8464] The buggy address is located 4 bytes inside of [ 78.313290][ T8464] 4096-byte region [ffff888014c10000, ffff888014c11000) [ 78.326493][ T8464] The buggy address belongs to the page: [ 78.332239][ T8464] page:ffffea0000530400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14c10 [ 78.343618][ T8464] head:ffffea0000530400 order:3 compound_mapcount:0 compound_pincount:0 [ 78.352178][ T8464] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 78.360167][ T8464] raw: 00fff00000010200 dead000000000100 dead000000000122 ffff8880111be280 [ 78.368851][ T8464] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 78.377546][ T8464] page dumped because: kasan: bad access detected [ 78.384126][ T8464] [ 78.386500][ T8464] Memory state around the buggy address: [ 78.394233][ T8464] ffff888014c0ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 78.402709][ T8464] ffff888014c0ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 78.411623][ T8464] >ffff888014c10000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.420582][ T8464] ^ [ 78.424641][ T8464] ffff888014c10080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.432811][ T8464] ffff888014c10100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.440879][ T8464] ================================================================== [ 78.448952][ T8464] Disabling lock debugging due to kernel taint [ 78.457758][ T8464] Kernel panic - not syncing: panic_on_warn set ... [ 78.464577][ T8464] CPU: 1 PID: 8464 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 78.476224][ T8464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.486279][ T8464] Call Trace: [ 78.489555][ T8464] dump_stack+0x141/0x1d7 [ 78.493971][ T8464] panic+0x306/0x73d [ 78.498087][ T8464] ? __warn_printk+0xf3/0xf3 [ 78.502679][ T8464] ? preempt_schedule_common+0x59/0xc0 [ 78.508149][ T8464] ? __skb_datagram_iter+0x6b8/0x770 [ 78.513446][ T8464] ? preempt_schedule_thunk+0x16/0x18 [ 78.518828][ T8464] ? trace_hardirqs_on+0x38/0x1c0 [ 78.523847][ T8464] ? trace_hardirqs_on+0x51/0x1c0 [ 78.528856][ T8464] ? __skb_datagram_iter+0x6b8/0x770 [ 78.534135][ T8464] ? __skb_datagram_iter+0x6b8/0x770 [ 78.539405][ T8464] end_report.cold+0x5a/0x5a [ 78.544071][ T8464] kasan_report.cold+0x6a/0xd8 [ 78.548997][ T8464] ? __skb_datagram_iter+0x6b8/0x770 [ 78.554269][ T8464] __skb_datagram_iter+0x6b8/0x770 [ 78.559366][ T8464] ? zerocopy_sg_from_iter+0x110/0x110 [ 78.564822][ T8464] skb_copy_datagram_iter+0x40/0x50 [ 78.570268][ T8464] tcp_recvmsg_locked+0x1048/0x22f0 [ 78.575463][ T8464] ? tcp_splice_read+0x8b0/0x8b0 [ 78.580390][ T8464] ? mark_held_locks+0x9f/0xe0 [ 78.585150][ T8464] ? __local_bh_enable_ip+0xa0/0x120 [ 78.590427][ T8464] tcp_recvmsg+0x134/0x550 [ 78.594846][ T8464] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 78.600209][ T8464] ? aa_sk_perm+0x311/0xab0 [ 78.604705][ T8464] inet_recvmsg+0x11b/0x5e0 [ 78.609202][ T8464] ? inet_sendpage+0x140/0x140 [ 78.613964][ T8464] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.620195][ T8464] ? security_socket_recvmsg+0x8f/0xc0 [ 78.625648][ T8464] sock_read_iter+0x33c/0x470 [ 78.630684][ T8464] ? ____sys_recvmsg+0x600/0x600 [ 78.635615][ T8464] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.642424][ T8464] ? fsnotify+0xa58/0x1060 [ 78.646948][ T8464] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.653228][ T8464] new_sync_read+0x5b7/0x6e0 [ 78.657826][ T8464] ? ksys_lseek+0x1b0/0x1b0 [ 78.662342][ T8464] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 78.668338][ T8464] vfs_read+0x35c/0x570 [ 78.672502][ T8464] ksys_read+0x1ee/0x250 [ 78.676755][ T8464] ? vfs_write+0xa40/0xa40 [ 78.681812][ T8464] ? syscall_enter_from_user_mode+0x31/0x70 [ 78.688594][ T8464] do_syscall_64+0x3a/0xb0 [ 78.693020][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 78.698908][ T8464] RIP: 0033:0x4af19b [ 78.702799][ T8464] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 78.722396][ T8464] RSP: 002b:000000c000367828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 78.730800][ T8464] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 78.738843][ T8464] RDX: 0000000000001000 RSI: 000000c0001e9000 RDI: 0000000000000006 [ 78.746811][ T8464] RBP: 000000c000367878 R08: 0000000000000001 R09: 0000000000000002 [ 78.754787][ T8464] R10: 000000000000672c R11: 0000000000000212 R12: 0000000000006726 [ 78.762934][ T8464] R13: 0000000000001000 R14: 0000000000000040 R15: 0000000000000008 [ 78.771802][ T8464] Kernel Offset: disabled [ 78.776123][ T8464] Rebooting in 86400 seconds..