[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.222' (ECDSA) to the list of known hosts. 2021/05/02 02:03:15 fuzzer started 2021/05/02 02:03:15 dialing manager at 10.128.0.169:44661 2021/05/02 02:03:15 syscalls: 3571 2021/05/02 02:03:15 code coverage: enabled 2021/05/02 02:03:15 comparison tracing: enabled 2021/05/02 02:03:15 extra coverage: enabled 2021/05/02 02:03:15 setuid sandbox: enabled 2021/05/02 02:03:15 namespace sandbox: enabled 2021/05/02 02:03:15 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/02 02:03:15 fault injection: enabled 2021/05/02 02:03:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/02 02:03:15 net packet injection: enabled 2021/05/02 02:03:15 net device setup: enabled 2021/05/02 02:03:15 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/02 02:03:15 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/02 02:03:15 USB emulation: enabled 2021/05/02 02:03:15 hci packet injection: enabled 2021/05/02 02:03:15 wifi device emulation: enabled 2021/05/02 02:03:15 802.15.4 emulation: enabled 2021/05/02 02:03:15 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/02 02:03:16 fetching corpus: 50, signal 56081/59803 (executing program) syzkaller login: [ 68.630964][ T8443] ================================================================== [ 68.639202][ T8443] BUG: KASAN: wild-memory-access in copyout.part.0+0xd7/0x110 [ 68.646704][ T8443] Read of size 784 at addr 108548c026740010 by task syz-fuzzer/8443 [ 68.654693][ T8443] [ 68.657028][ T8443] CPU: 0 PID: 8443 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 68.666579][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.676639][ T8443] Call Trace: [ 68.679924][ T8443] dump_stack+0x141/0x1d7 [ 68.684288][ T8443] ? copyout.part.0+0xd7/0x110 [ 68.689068][ T8443] kasan_report.cold+0x5f/0xd8 [ 68.693855][ T8443] ? copyout.part.0+0xd7/0x110 [ 68.698650][ T8443] kasan_check_range+0x13d/0x180 [ 68.703605][ T8443] copyout.part.0+0xd7/0x110 [ 68.708237][ T8443] _copy_to_iter+0x2b4/0x1850 [ 68.712906][ T8443] ? lock_chain_count+0x20/0x20 [ 68.717745][ T8443] ? _copy_from_iter_nocache+0x1440/0x1440 [ 68.723540][ T8443] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 68.729770][ T8443] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 68.735520][ T8443] ? __virt_addr_valid+0x5d/0x2d0 [ 68.740562][ T8443] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 68.746807][ T8443] ? __phys_addr_symbol+0x2c/0x70 [ 68.751818][ T8443] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 68.757553][ T8443] ? __check_object_size+0x18a/0x3f0 [ 68.762860][ T8443] simple_copy_to_iter+0x4c/0x70 [ 68.767785][ T8443] __skb_datagram_iter+0x4a7/0x770 [ 68.772884][ T8443] ? zerocopy_sg_from_iter+0x110/0x110 [ 68.778334][ T8443] skb_copy_datagram_iter+0x40/0x50 [ 68.783544][ T8443] tcp_recvmsg_locked+0x1048/0x22f0 [ 68.788741][ T8443] ? tcp_splice_read+0x8b0/0x8b0 [ 68.793664][ T8443] ? mark_held_locks+0x9f/0xe0 [ 68.798415][ T8443] ? __local_bh_enable_ip+0xa0/0x120 [ 68.803701][ T8443] tcp_recvmsg+0x134/0x550 [ 68.808105][ T8443] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 68.813468][ T8443] ? aa_sk_perm+0x311/0xab0 [ 68.817958][ T8443] inet_recvmsg+0x11b/0x5e0 [ 68.822462][ T8443] ? inet_sendpage+0x140/0x140 [ 68.827215][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.833444][ T8443] ? security_socket_recvmsg+0x8f/0xc0 [ 68.838893][ T8443] sock_read_iter+0x33c/0x470 [ 68.843559][ T8443] ? ____sys_recvmsg+0x600/0x600 [ 68.848490][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.854733][ T8443] ? fsnotify+0xa58/0x1060 [ 68.859138][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.865388][ T8443] new_sync_read+0x5b7/0x6e0 [ 68.869965][ T8443] ? ksys_lseek+0x1b0/0x1b0 [ 68.874455][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 68.880457][ T8443] vfs_read+0x35c/0x570 [ 68.884620][ T8443] ksys_read+0x1ee/0x250 [ 68.888848][ T8443] ? vfs_write+0xa40/0xa40 [ 68.893247][ T8443] ? syscall_enter_from_user_mode+0x27/0x70 [ 68.899126][ T8443] do_syscall_64+0x3a/0xb0 [ 68.903530][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.909429][ T8443] RIP: 0033:0x4af19b [ 68.913308][ T8443] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 68.932913][ T8443] RSP: 002b:000000c00021d828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 68.941311][ T8443] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 68.949265][ T8443] RDX: 0000000000001000 RSI: 000000c000200000 RDI: 0000000000000006 [ 68.957233][ T8443] RBP: 000000c00021d878 R08: 0000000000000001 R09: 0000000000000002 [ 68.965186][ T8443] R10: 0000000000007cff R11: 0000000000000212 R12: 0000000000007cfb [ 68.973141][ T8443] R13: 0000000000000400 R14: 0000000000000004 R15: 0000000000000002 [ 68.981105][ T8443] ================================================================== [ 68.989142][ T8443] Disabling lock debugging due to kernel taint [ 68.996233][ T8443] Kernel panic - not syncing: panic_on_warn set ... [ 69.002831][ T8443] CPU: 1 PID: 8443 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 69.013777][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.023830][ T8443] Call Trace: [ 69.027122][ T8443] dump_stack+0x141/0x1d7 [ 69.031462][ T8443] panic+0x306/0x73d [ 69.035358][ T8443] ? __warn_printk+0xf3/0xf3 [ 69.039958][ T8443] ? preempt_schedule_common+0x59/0xc0 [ 69.045435][ T8443] ? copyout.part.0+0xd7/0x110 [ 69.050216][ T8443] ? preempt_schedule_thunk+0x16/0x18 [ 69.055628][ T8443] ? trace_hardirqs_on+0x38/0x1c0 [ 69.060673][ T8443] ? trace_hardirqs_on+0x51/0x1c0 [ 69.065716][ T8443] ? copyout.part.0+0xd7/0x110 [ 69.070509][ T8443] ? copyout.part.0+0xd7/0x110 [ 69.075294][ T8443] end_report.cold+0x5a/0x5a [ 69.079913][ T8443] kasan_report.cold+0x6a/0xd8 [ 69.084707][ T8443] ? copyout.part.0+0xd7/0x110 [ 69.089498][ T8443] kasan_check_range+0x13d/0x180 [ 69.094459][ T8443] copyout.part.0+0xd7/0x110 [ 69.099081][ T8443] _copy_to_iter+0x2b4/0x1850 [ 69.103786][ T8443] ? lock_chain_count+0x20/0x20 [ 69.108673][ T8443] ? _copy_from_iter_nocache+0x1440/0x1440 [ 69.114505][ T8443] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 69.120853][ T8443] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 69.126768][ T8443] ? __virt_addr_valid+0x5d/0x2d0 [ 69.131816][ T8443] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 69.138068][ T8443] ? __phys_addr_symbol+0x2c/0x70 [ 69.143096][ T8443] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 69.148836][ T8443] ? __check_object_size+0x18a/0x3f0 [ 69.154214][ T8443] simple_copy_to_iter+0x4c/0x70 [ 69.159178][ T8443] __skb_datagram_iter+0x4a7/0x770 [ 69.164290][ T8443] ? zerocopy_sg_from_iter+0x110/0x110 [ 69.169755][ T8443] skb_copy_datagram_iter+0x40/0x50 [ 69.174962][ T8443] tcp_recvmsg_locked+0x1048/0x22f0 [ 69.180200][ T8443] ? tcp_splice_read+0x8b0/0x8b0 [ 69.185141][ T8443] ? mark_held_locks+0x9f/0xe0 [ 69.189910][ T8443] ? __local_bh_enable_ip+0xa0/0x120 [ 69.195205][ T8443] tcp_recvmsg+0x134/0x550 [ 69.199641][ T8443] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 69.205020][ T8443] ? aa_sk_perm+0x311/0xab0 [ 69.209532][ T8443] inet_recvmsg+0x11b/0x5e0 [ 69.214050][ T8443] ? inet_sendpage+0x140/0x140 [ 69.218818][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 69.225092][ T8443] ? security_socket_recvmsg+0x8f/0xc0 [ 69.230562][ T8443] sock_read_iter+0x33c/0x470 [ 69.235266][ T8443] ? ____sys_recvmsg+0x600/0x600 [ 69.240210][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 69.246474][ T8443] ? fsnotify+0xa58/0x1060 [ 69.250899][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 69.257143][ T8443] new_sync_read+0x5b7/0x6e0 [ 69.261736][ T8443] ? ksys_lseek+0x1b0/0x1b0 [ 69.266253][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 69.272245][ T8443] vfs_read+0x35c/0x570 [ 69.276402][ T8443] ksys_read+0x1ee/0x250 [ 69.280645][ T8443] ? vfs_write+0xa40/0xa40 [ 69.285057][ T8443] ? syscall_enter_from_user_mode+0x27/0x70 [ 69.290952][ T8443] do_syscall_64+0x3a/0xb0 [ 69.295371][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 69.301268][ T8443] RIP: 0033:0x4af19b [ 69.305164][ T8443] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 69.324768][ T8443] RSP: 002b:000000c00021d828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 69.333194][ T8443] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 69.341174][ T8443] RDX: 0000000000001000 RSI: 000000c000200000 RDI: 0000000000000006 [ 69.349138][ T8443] RBP: 000000c00021d878 R08: 0000000000000001 R09: 0000000000000002 [ 69.357103][ T8443] R10: 0000000000007cff R11: 0000000000000212 R12: 0000000000007cfb [ 69.365069][ T8443] R13: 0000000000000400 R14: 0000000000000004 R15: 0000000000000002 [ 69.373593][ T8443] Kernel Offset: disabled [ 69.377954][ T8443] Rebooting in 86400 seconds..