Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.198' (ECDSA) to the list of known hosts. 2021/05/03 09:41:09 fuzzer started 2021/05/03 09:41:09 dialing manager at 10.128.0.169:44661 2021/05/03 09:41:09 syscalls: 3571 2021/05/03 09:41:09 code coverage: enabled 2021/05/03 09:41:09 comparison tracing: enabled 2021/05/03 09:41:09 extra coverage: enabled 2021/05/03 09:41:09 setuid sandbox: enabled 2021/05/03 09:41:09 namespace sandbox: enabled 2021/05/03 09:41:09 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/03 09:41:09 fault injection: enabled 2021/05/03 09:41:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/03 09:41:09 net packet injection: enabled 2021/05/03 09:41:09 net device setup: enabled 2021/05/03 09:41:09 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/03 09:41:09 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/03 09:41:09 USB emulation: enabled 2021/05/03 09:41:09 hci packet injection: enabled 2021/05/03 09:41:09 wifi device emulation: enabled 2021/05/03 09:41:09 802.15.4 emulation: enabled 2021/05/03 09:41:09 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/03 09:41:09 fetching corpus: 50, signal 44382/48143 (executing program) syzkaller login: [ 72.145436][ T8447] ================================================================== [ 72.153733][ T8447] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 72.161417][ T8447] Read of size 4 at addr ffff888034c98004 by task syz-fuzzer/8447 [ 72.169243][ T8447] [ 72.171750][ T8447] CPU: 0 PID: 8447 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 72.181307][ T8447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.191555][ T8447] Call Trace: [ 72.194881][ T8447] dump_stack+0x141/0x1d7 [ 72.199246][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 72.204551][ T8447] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 72.211618][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 72.216949][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 72.222264][ T8447] kasan_report.cold+0x7c/0xd8 [ 72.227085][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 72.232400][ T8447] __skb_datagram_iter+0x6b8/0x770 [ 72.237544][ T8447] ? zerocopy_sg_from_iter+0x110/0x110 [ 72.243035][ T8447] skb_copy_datagram_iter+0x40/0x50 [ 72.248263][ T8447] tcp_recvmsg_locked+0x1048/0x22f0 [ 72.253508][ T8447] ? tcp_splice_read+0x8b0/0x8b0 [ 72.258573][ T8447] ? mark_held_locks+0x9f/0xe0 [ 72.263386][ T8447] ? __local_bh_enable_ip+0xa0/0x120 [ 72.268717][ T8447] tcp_recvmsg+0x134/0x550 [ 72.273242][ T8447] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 72.278665][ T8447] ? aa_sk_perm+0x311/0xab0 [ 72.283214][ T8447] inet_recvmsg+0x11b/0x5e0 [ 72.287750][ T8447] ? inet_sendpage+0x140/0x140 [ 72.292562][ T8447] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.298842][ T8447] ? security_socket_recvmsg+0x8f/0xc0 [ 72.304342][ T8447] sock_read_iter+0x33c/0x470 [ 72.309055][ T8447] ? ____sys_recvmsg+0x600/0x600 [ 72.314046][ T8447] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.320336][ T8447] ? fsnotify+0xa58/0x1060 [ 72.324786][ T8447] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.331076][ T8447] new_sync_read+0x5b7/0x6e0 [ 72.335707][ T8447] ? ksys_lseek+0x1b0/0x1b0 [ 72.340280][ T8447] vfs_read+0x35c/0x570 [ 72.344546][ T8447] ksys_read+0x1ee/0x250 [ 72.348824][ T8447] ? vfs_write+0xa40/0xa40 [ 72.353260][ T8447] ? syscall_enter_from_user_mode+0x27/0x70 [ 72.359178][ T8447] do_syscall_64+0x3a/0xb0 [ 72.363617][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 72.369539][ T8447] RIP: 0033:0x4af19b [ 72.373464][ T8447] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 72.393094][ T8447] RSP: 002b:000000c000bd0828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 72.401711][ T8447] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 72.409706][ T8447] RDX: 0000000000001000 RSI: 000000c000548000 RDI: 0000000000000006 [ 72.417700][ T8447] RBP: 000000c000bd0878 R08: 0000000000000001 R09: 0000000000000002 [ 72.425775][ T8447] R10: 00000000000026c1 R11: 0000000000000212 R12: 00000000000026bd [ 72.433794][ T8447] R13: 0000000000000400 R14: 0000000000000004 R15: 0000000000000002 [ 72.441901][ T8447] [ 72.444240][ T8447] Allocated by task 1: [ 72.448401][ T8447] kasan_save_stack+0x1b/0x40 [ 72.453117][ T8447] __kasan_slab_alloc+0x84/0xa0 [ 72.457996][ T8447] kmem_cache_alloc+0x219/0x3a0 [ 72.462864][ T8447] getname_flags.part.0+0x50/0x4f0 [ 72.467998][ T8447] getname+0x8e/0xd0 [ 72.471998][ T8447] do_sys_openat2+0xf5/0x420 [ 72.476600][ T8447] __x64_sys_open+0x119/0x1c0 [ 72.481293][ T8447] do_syscall_64+0x3a/0xb0 [ 72.485739][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 72.491745][ T8447] [ 72.494075][ T8447] Freed by task 78: [ 72.497884][ T8447] kasan_save_stack+0x1b/0x40 [ 72.502586][ T8447] kasan_set_track+0x1c/0x30 [ 72.507206][ T8447] kasan_set_free_info+0x20/0x30 [ 72.512183][ T8447] __kasan_slab_free+0xfb/0x130 [ 72.517075][ T8447] slab_free_freelist_hook+0xdf/0x240 [ 72.522475][ T8447] kmem_cache_free+0x97/0x750 [ 72.527174][ T8447] putname+0xe1/0x120 [ 72.531179][ T8447] do_sys_openat2+0x153/0x420 [ 72.536494][ T8447] __x64_sys_open+0x119/0x1c0 [ 72.541283][ T8447] do_syscall_64+0x3a/0xb0 [ 72.545739][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 72.551791][ T8447] [ 72.554220][ T8447] The buggy address belongs to the object at ffff888034c98000 [ 72.554220][ T8447] which belongs to the cache names_cache of size 4096 [ 72.568393][ T8447] The buggy address is located 4 bytes inside of [ 72.568393][ T8447] 4096-byte region [ffff888034c98000, ffff888034c99000) [ 72.581605][ T8447] The buggy address belongs to the page: [ 72.587254][ T8447] page:ffffea0000d32600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x34c98 [ 72.597430][ T8447] head:ffffea0000d32600 order:3 compound_mapcount:0 compound_pincount:0 [ 72.606752][ T8447] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 72.614772][ T8447] raw: 00fff00000010200 0000000000000000 dead000000000122 ffff888140005280 [ 72.623395][ T8447] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 72.631990][ T8447] page dumped because: kasan: bad access detected [ 72.638413][ T8447] [ 72.640743][ T8447] Memory state around the buggy address: [ 72.646377][ T8447] ffff888034c97f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.654805][ T8447] ffff888034c97f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.662883][ T8447] >ffff888034c98000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.670978][ T8447] ^ [ 72.675667][ T8447] ffff888034c98080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.683777][ T8447] ffff888034c98100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.692034][ T8447] ================================================================== [ 72.700116][ T8447] Disabling lock debugging due to kernel taint [ 72.708885][ T8447] Kernel panic - not syncing: panic_on_warn set ... [ 72.715500][ T8447] CPU: 1 PID: 8447 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 72.726478][ T8447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.736638][ T8447] Call Trace: [ 72.739940][ T8447] dump_stack+0x141/0x1d7 [ 72.744293][ T8447] panic+0x306/0x73d [ 72.748205][ T8447] ? __warn_printk+0xf3/0xf3 [ 72.752814][ T8447] ? preempt_schedule_common+0x59/0xc0 [ 72.758533][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 72.763841][ T8447] ? preempt_schedule_thunk+0x16/0x18 [ 72.769230][ T8447] ? trace_hardirqs_on+0x38/0x1c0 [ 72.774263][ T8447] ? trace_hardirqs_on+0x51/0x1c0 [ 72.779306][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 72.784601][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 72.789893][ T8447] end_report.cold+0x5a/0x5a [ 72.794505][ T8447] kasan_report.cold+0x6a/0xd8 [ 72.799293][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 72.804604][ T8447] __skb_datagram_iter+0x6b8/0x770 [ 72.809724][ T8447] ? zerocopy_sg_from_iter+0x110/0x110 [ 72.815199][ T8447] skb_copy_datagram_iter+0x40/0x50 [ 72.820407][ T8447] tcp_recvmsg_locked+0x1048/0x22f0 [ 72.825632][ T8447] ? tcp_splice_read+0x8b0/0x8b0 [ 72.830602][ T8447] ? mark_held_locks+0x9f/0xe0 [ 72.835403][ T8447] ? __local_bh_enable_ip+0xa0/0x120 [ 72.840725][ T8447] tcp_recvmsg+0x134/0x550 [ 72.845172][ T8447] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 72.850676][ T8447] ? aa_sk_perm+0x311/0xab0 [ 72.855197][ T8447] inet_recvmsg+0x11b/0x5e0 [ 72.859733][ T8447] ? inet_sendpage+0x140/0x140 [ 72.864540][ T8447] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.870804][ T8447] ? security_socket_recvmsg+0x8f/0xc0 [ 72.876284][ T8447] sock_read_iter+0x33c/0x470 [ 72.880997][ T8447] ? ____sys_recvmsg+0x600/0x600 [ 72.886468][ T8447] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.892745][ T8447] ? fsnotify+0xa58/0x1060 [ 72.897182][ T8447] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.903442][ T8447] new_sync_read+0x5b7/0x6e0 [ 72.908047][ T8447] ? ksys_lseek+0x1b0/0x1b0 [ 72.912571][ T8447] vfs_read+0x35c/0x570 [ 72.916772][ T8447] ksys_read+0x1ee/0x250 [ 72.921032][ T8447] ? vfs_write+0xa40/0xa40 [ 72.925470][ T8447] ? syscall_enter_from_user_mode+0x27/0x70 [ 72.931394][ T8447] do_syscall_64+0x3a/0xb0 [ 72.935841][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 72.941754][ T8447] RIP: 0033:0x4af19b [ 72.945660][ T8447] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 72.965952][ T8447] RSP: 002b:000000c000bd0828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 72.974549][ T8447] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 72.982550][ T8447] RDX: 0000000000001000 RSI: 000000c000548000 RDI: 0000000000000006 [ 72.990563][ T8447] RBP: 000000c000bd0878 R08: 0000000000000001 R09: 0000000000000002 [ 72.998569][ T8447] R10: 00000000000026c1 R11: 0000000000000212 R12: 00000000000026bd [ 73.006557][ T8447] R13: 0000000000000400 R14: 0000000000000004 R15: 0000000000000002 [ 73.014989][ T8447] Kernel Offset: disabled [ 73.019469][ T8447] Rebooting in 86400 seconds..