Warning: Permanently added '10.128.0.133' (ECDSA) to the list of known hosts. 2021/05/02 14:08:49 fuzzer started 2021/05/02 14:08:49 dialing manager at 10.128.0.169:44661 2021/05/02 14:08:49 syscalls: 3571 2021/05/02 14:08:49 code coverage: enabled 2021/05/02 14:08:49 comparison tracing: enabled 2021/05/02 14:08:49 extra coverage: enabled 2021/05/02 14:08:49 setuid sandbox: enabled 2021/05/02 14:08:49 namespace sandbox: enabled 2021/05/02 14:08:49 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/02 14:08:49 fault injection: enabled 2021/05/02 14:08:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/02 14:08:49 net packet injection: enabled 2021/05/02 14:08:49 net device setup: enabled 2021/05/02 14:08:49 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/02 14:08:49 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/02 14:08:49 USB emulation: enabled 2021/05/02 14:08:49 hci packet injection: enabled 2021/05/02 14:08:49 wifi device emulation: enabled 2021/05/02 14:08:49 802.15.4 emulation: enabled 2021/05/02 14:08:49 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/02 14:08:50 fetching corpus: 50, signal 77756/81386 (executing program) 2021/05/02 14:08:50 fetching corpus: 100, signal 104173/109405 (executing program) 2021/05/02 14:08:50 fetching corpus: 150, signal 130558/137223 (executing program) 2021/05/02 14:08:50 fetching corpus: 200, signal 144639/152806 (executing program) 2021/05/02 14:08:50 fetching corpus: 250, signal 159319/168905 (executing program) 2021/05/02 14:08:50 fetching corpus: 300, signal 172082/183003 (executing program) 2021/05/02 14:08:50 fetching corpus: 350, signal 185719/197907 (executing program) [ 71.010766][ T8410] ================================================================== [ 71.019266][ T8410] BUG: KASAN: wild-memory-access in copyout.part.0+0xd7/0x110 [ 71.026750][ T8410] Read of size 480 at addr 108548c02eff0010 by task syz-fuzzer/8410 [ 71.034726][ T8410] [ 71.037035][ T8410] CPU: 1 PID: 8410 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 71.046584][ T8410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.056710][ T8410] Call Trace: [ 71.059979][ T8410] dump_stack+0x141/0x1d7 [ 71.064337][ T8410] ? copyout.part.0+0xd7/0x110 [ 71.069112][ T8410] kasan_report.cold+0x5f/0xd8 [ 71.073885][ T8410] ? copyout.part.0+0xd7/0x110 [ 71.078638][ T8410] kasan_check_range+0x13d/0x180 [ 71.083590][ T8410] copyout.part.0+0xd7/0x110 [ 71.088225][ T8410] _copy_to_iter+0x2b4/0x1850 [ 71.092915][ T8410] ? lock_chain_count+0x20/0x20 [ 71.097770][ T8410] ? ip_local_deliver_finish+0x240/0x370 [ 71.103426][ T8410] ? _copy_from_iter_nocache+0x1440/0x1440 [ 71.109237][ T8410] ? ip_local_deliver+0x195/0x200 [ 71.114268][ T8410] ? ip_sublist_rcv_finish+0x9a/0x2c0 [ 71.119732][ T8410] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 71.126005][ T8410] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 71.131814][ T8410] ? __virt_addr_valid+0x5d/0x2d0 [ 71.136876][ T8410] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 71.143120][ T8410] ? __phys_addr_symbol+0x2c/0x70 [ 71.148140][ T8410] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 71.153871][ T8410] ? __check_object_size+0x18a/0x3f0 [ 71.159163][ T8410] simple_copy_to_iter+0x4c/0x70 [ 71.164099][ T8410] __skb_datagram_iter+0x4a7/0x770 [ 71.169224][ T8410] ? zerocopy_sg_from_iter+0x110/0x110 [ 71.174684][ T8410] skb_copy_datagram_iter+0x40/0x50 [ 71.179877][ T8410] tcp_recvmsg_locked+0x1048/0x22f0 [ 71.185091][ T8410] ? tcp_splice_read+0x8b0/0x8b0 [ 71.190025][ T8410] ? mark_held_locks+0x9f/0xe0 [ 71.194790][ T8410] ? __local_bh_enable_ip+0xa0/0x120 [ 71.200085][ T8410] tcp_recvmsg+0x134/0x550 [ 71.204512][ T8410] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 71.209895][ T8410] ? aa_sk_perm+0x311/0xab0 [ 71.214407][ T8410] inet_recvmsg+0x11b/0x5e0 [ 71.218917][ T8410] ? inet_sendpage+0x140/0x140 [ 71.223683][ T8410] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.229929][ T8410] ? security_socket_recvmsg+0x8f/0xc0 [ 71.235389][ T8410] sock_read_iter+0x33c/0x470 [ 71.240064][ T8410] ? ____sys_recvmsg+0x600/0x600 [ 71.245006][ T8410] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.251243][ T8410] ? fsnotify+0xa58/0x1060 [ 71.255657][ T8410] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.261917][ T8410] new_sync_read+0x5b7/0x6e0 [ 71.267126][ T8410] ? ksys_lseek+0x1b0/0x1b0 [ 71.271640][ T8410] vfs_read+0x35c/0x570 [ 71.275791][ T8410] ksys_read+0x1ee/0x250 [ 71.280033][ T8410] ? vfs_write+0xa40/0xa40 [ 71.284454][ T8410] ? syscall_enter_from_user_mode+0x27/0x70 [ 71.290346][ T8410] do_syscall_64+0x3a/0xb0 [ 71.294760][ T8410] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 71.300648][ T8410] RIP: 0033:0x4af19b [ 71.304534][ T8410] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 71.324152][ T8410] RSP: 002b:000000c0004ad828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 71.332567][ T8410] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 71.340531][ T8410] RDX: 0000000000001000 RSI: 000000c000542000 RDI: 0000000000000006 [ 71.348496][ T8410] RBP: 000000c0004ad878 R08: 0000000000000001 R09: 0000000000000002 [ 71.356459][ T8410] R10: 0000000000007e28 R11: 0000000000000212 R12: 0000000000007e24 [ 71.364421][ T8410] R13: 0000000000000020 R14: 0000000000000020 R15: 0000000000000008 [ 71.372402][ T8410] ================================================================== [ 71.380446][ T8410] Disabling lock debugging due to kernel taint [ 71.388477][ T8410] Kernel panic - not syncing: panic_on_warn set ... [ 71.395077][ T8410] CPU: 0 PID: 8410 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 71.397943][ T3264] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.406009][ T8410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.413832][ T3264] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.422267][ T8410] Call Trace: [ 71.422275][ T8410] dump_stack+0x141/0x1d7 [ 71.422304][ T8410] panic+0x306/0x73d [ 71.439975][ T8410] ? __warn_printk+0xf3/0xf3 [ 71.444581][ T8410] ? preempt_schedule_common+0x59/0xc0 [ 71.450051][ T8410] ? copyout.part.0+0xd7/0x110 [ 71.454804][ T8410] ? preempt_schedule_thunk+0x16/0x18 [ 71.460178][ T8410] ? trace_hardirqs_on+0x38/0x1c0 [ 71.465215][ T8410] ? trace_hardirqs_on+0x51/0x1c0 [ 71.470308][ T8410] ? copyout.part.0+0xd7/0x110 [ 71.475661][ T8410] ? copyout.part.0+0xd7/0x110 [ 71.480407][ T8410] end_report.cold+0x5a/0x5a [ 71.484982][ T8410] kasan_report.cold+0x6a/0xd8 [ 71.489751][ T8410] ? copyout.part.0+0xd7/0x110 [ 71.494496][ T8410] kasan_check_range+0x13d/0x180 [ 71.499416][ T8410] copyout.part.0+0xd7/0x110 [ 71.503988][ T8410] _copy_to_iter+0x2b4/0x1850 [ 71.508647][ T8410] ? lock_chain_count+0x20/0x20 [ 71.513483][ T8410] ? ip_local_deliver_finish+0x240/0x370 [ 71.519117][ T8410] ? _copy_from_iter_nocache+0x1440/0x1440 [ 71.524906][ T8410] ? ip_local_deliver+0x195/0x200 [ 71.529914][ T8410] ? ip_sublist_rcv_finish+0x9a/0x2c0 [ 71.535269][ T8410] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 71.541493][ T8410] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 71.547195][ T8410] ? __virt_addr_valid+0x5d/0x2d0 [ 71.552199][ T8410] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 71.558437][ T8410] ? __phys_addr_symbol+0x2c/0x70 [ 71.563458][ T8410] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 71.569254][ T8410] ? __check_object_size+0x18a/0x3f0 [ 71.574533][ T8410] simple_copy_to_iter+0x4c/0x70 [ 71.579457][ T8410] __skb_datagram_iter+0x4a7/0x770 [ 71.584661][ T8410] ? zerocopy_sg_from_iter+0x110/0x110 [ 71.590108][ T8410] skb_copy_datagram_iter+0x40/0x50 [ 71.595292][ T8410] tcp_recvmsg_locked+0x1048/0x22f0 [ 71.600499][ T8410] ? tcp_splice_read+0x8b0/0x8b0 [ 71.605450][ T8410] ? mark_held_locks+0x9f/0xe0 [ 71.610223][ T8410] ? __local_bh_enable_ip+0xa0/0x120 [ 71.615492][ T8410] tcp_recvmsg+0x134/0x550 [ 71.619912][ T8410] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 71.625268][ T8410] ? aa_sk_perm+0x311/0xab0 [ 71.629767][ T8410] inet_recvmsg+0x11b/0x5e0 [ 71.634255][ T8410] ? inet_sendpage+0x140/0x140 [ 71.639088][ T8410] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.645321][ T8410] ? security_socket_recvmsg+0x8f/0xc0 [ 71.650765][ T8410] sock_read_iter+0x33c/0x470 [ 71.655426][ T8410] ? ____sys_recvmsg+0x600/0x600 [ 71.660348][ T8410] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.666574][ T8410] ? fsnotify+0xa58/0x1060 [ 71.670978][ T8410] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.677207][ T8410] new_sync_read+0x5b7/0x6e0 [ 71.681793][ T8410] ? ksys_lseek+0x1b0/0x1b0 [ 71.686298][ T8410] vfs_read+0x35c/0x570 [ 71.690433][ T8410] ksys_read+0x1ee/0x250 [ 71.694656][ T8410] ? vfs_write+0xa40/0xa40 [ 71.699068][ T8410] ? syscall_enter_from_user_mode+0x27/0x70 [ 71.704958][ T8410] do_syscall_64+0x3a/0xb0 [ 71.709356][ T8410] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 71.715248][ T8410] RIP: 0033:0x4af19b [ 71.719122][ T8410] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 71.738711][ T8410] RSP: 002b:000000c0004ad828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 71.747127][ T8410] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 71.755076][ T8410] RDX: 0000000000001000 RSI: 000000c000542000 RDI: 0000000000000006 [ 71.763042][ T8410] RBP: 000000c0004ad878 R08: 0000000000000001 R09: 0000000000000002 [ 71.770994][ T8410] R10: 0000000000007e28 R11: 0000000000000212 R12: 0000000000007e24 [ 71.778945][ T8410] R13: 0000000000000020 R14: 0000000000000020 R15: 0000000000000008 [ 71.787631][ T8410] Kernel Offset: disabled [ 71.791942][ T8410] Rebooting in 86400 seconds..