[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.107' (ECDSA) to the list of known hosts. 2021/05/01 22:02:22 fuzzer started 2021/05/01 22:02:22 dialing manager at 10.128.0.169:44661 2021/05/01 22:02:22 syscalls: 3571 2021/05/01 22:02:22 code coverage: enabled 2021/05/01 22:02:22 comparison tracing: enabled 2021/05/01 22:02:22 extra coverage: enabled 2021/05/01 22:02:22 setuid sandbox: enabled 2021/05/01 22:02:22 namespace sandbox: enabled 2021/05/01 22:02:22 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/01 22:02:22 fault injection: enabled 2021/05/01 22:02:22 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/01 22:02:22 net packet injection: enabled 2021/05/01 22:02:22 net device setup: enabled 2021/05/01 22:02:22 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/01 22:02:22 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/01 22:02:22 USB emulation: enabled 2021/05/01 22:02:22 hci packet injection: enabled 2021/05/01 22:02:22 wifi device emulation: enabled 2021/05/01 22:02:22 802.15.4 emulation: enabled 2021/05/01 22:02:22 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/01 22:02:23 fetching corpus: 50, signal 44262/48035 (executing program) 2021/05/01 22:02:23 fetching corpus: 100, signal 75149/80556 (executing program) 2021/05/01 22:02:23 fetching corpus: 150, signal 102334/109284 (executing program) 2021/05/01 22:02:23 fetching corpus: 200, signal 125956/134306 (executing program) 2021/05/01 22:02:24 fetching corpus: 250, signal 142262/152020 (executing program) syzkaller login: [ 73.128754][ T8447] ================================================================== [ 73.137070][ T8447] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 73.145414][ T8447] Read of size 4 at addr ffff88802c068004 by task syz-fuzzer/8447 [ 73.153313][ T8447] [ 73.155637][ T8447] CPU: 1 PID: 8447 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 73.165163][ T8447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.175223][ T8447] Call Trace: [ 73.178503][ T8447] dump_stack+0x141/0x1d7 [ 73.182841][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 73.188124][ T8447] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 73.195244][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 73.200515][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 73.205801][ T8447] kasan_report.cold+0x7c/0xd8 [ 73.210749][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 73.216020][ T8447] __skb_datagram_iter+0x6b8/0x770 [ 73.221130][ T8447] ? zerocopy_sg_from_iter+0x110/0x110 [ 73.226769][ T8447] skb_copy_datagram_iter+0x40/0x50 [ 73.231964][ T8447] tcp_recvmsg_locked+0x1048/0x22f0 [ 73.237172][ T8447] ? tcp_splice_read+0x8b0/0x8b0 [ 73.242103][ T8447] ? mark_held_locks+0x9f/0xe0 [ 73.246862][ T8447] ? __local_bh_enable_ip+0xa0/0x120 [ 73.252164][ T8447] tcp_recvmsg+0x134/0x550 [ 73.256600][ T8447] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 73.261971][ T8447] ? aa_sk_perm+0x311/0xab0 [ 73.266464][ T8447] inet_recvmsg+0x11b/0x5e0 [ 73.272263][ T8447] ? inet_sendpage+0x140/0x140 [ 73.277032][ T8447] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.283269][ T8447] ? security_socket_recvmsg+0x8f/0xc0 [ 73.288724][ T8447] sock_read_iter+0x33c/0x470 [ 73.293504][ T8447] ? ____sys_recvmsg+0x600/0x600 [ 73.298451][ T8447] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.304691][ T8447] ? fsnotify+0xa58/0x1060 [ 73.309114][ T8447] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.315353][ T8447] new_sync_read+0x5b7/0x6e0 [ 73.320043][ T8447] ? ksys_lseek+0x1b0/0x1b0 [ 73.324544][ T8447] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 73.330527][ T8447] vfs_read+0x35c/0x570 [ 73.334681][ T8447] ksys_read+0x1ee/0x250 [ 73.338923][ T8447] ? vfs_write+0xa40/0xa40 [ 73.343677][ T8447] ? syscall_enter_from_user_mode+0x27/0x70 [ 73.349574][ T8447] do_syscall_64+0x3a/0xb0 [ 73.353993][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 73.359874][ T8447] RIP: 0033:0x4af19b [ 73.363753][ T8447] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 73.383366][ T8447] RSP: 002b:000000c00003b828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 73.391791][ T8447] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 73.399769][ T8447] RDX: 0000000000001000 RSI: 000000c0001ec000 RDI: 0000000000000006 [ 73.408099][ T8447] RBP: 000000c00003b878 R08: 0000000000000001 R09: 0000000000000002 [ 73.416063][ T8447] R10: 0000000000004478 R11: 0000000000000212 R12: ffffffffffffffff [ 73.424022][ T8447] R13: 0000000000002000 R14: 0000000000000040 R15: 0000000000000020 [ 73.431993][ T8447] [ 73.434301][ T8447] Allocated by task 8453: [ 73.438608][ T8447] kasan_save_stack+0x1b/0x40 [ 73.443626][ T8447] __kasan_kmalloc+0x9b/0xd0 [ 73.448224][ T8447] tomoyo_init_log+0x18a/0x1ec0 [ 73.453081][ T8447] tomoyo_supervisor+0x34d/0xf00 [ 73.459668][ T8447] tomoyo_path_permission+0x270/0x3a0 [ 73.465032][ T8447] tomoyo_check_open_permission+0x30f/0x380 [ 73.471034][ T8447] tomoyo_file_open+0xa3/0xd0 [ 73.475702][ T8447] security_file_open+0x52/0x4f0 [ 73.480629][ T8447] do_dentry_open+0x358/0x11b0 [ 73.485410][ T8447] path_openat+0x1c09/0x27d0 [ 73.489990][ T8447] do_filp_open+0x190/0x3d0 [ 73.494483][ T8447] do_sys_openat2+0x16d/0x420 [ 73.499147][ T8447] __x64_sys_openat+0x13f/0x1f0 [ 73.504159][ T8447] do_syscall_64+0x3a/0xb0 [ 73.508576][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 73.514543][ T8447] [ 73.516858][ T8447] Freed by task 11278: [ 73.521011][ T8447] kasan_save_stack+0x1b/0x40 [ 73.525686][ T8447] kasan_set_track+0x1c/0x30 [ 73.530379][ T8447] kasan_set_free_info+0x20/0x30 [ 73.535429][ T8447] __kasan_slab_free+0xfb/0x130 [ 73.540269][ T8447] slab_free_freelist_hook+0xdf/0x240 [ 73.546000][ T8447] kfree+0xe5/0x7f0 [ 73.549910][ T8447] tomoyo_init_log+0x13eb/0x1ec0 [ 73.554838][ T8447] tomoyo_supervisor+0x34d/0xf00 [ 73.560045][ T8447] tomoyo_path_permission+0x270/0x3a0 [ 73.565428][ T8447] tomoyo_check_open_permission+0x30f/0x380 [ 73.571336][ T8447] tomoyo_file_open+0xa3/0xd0 [ 73.576038][ T8447] security_file_open+0x52/0x4f0 [ 73.580963][ T8447] do_dentry_open+0x358/0x11b0 [ 73.585736][ T8447] path_openat+0x1c09/0x27d0 [ 73.591455][ T8447] do_filp_open+0x190/0x3d0 [ 73.595949][ T8447] do_sys_openat2+0x16d/0x420 [ 73.600614][ T8447] __x64_sys_openat+0x13f/0x1f0 [ 73.605497][ T8447] do_syscall_64+0x3a/0xb0 [ 73.609962][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 73.617019][ T8447] [ 73.619793][ T8447] The buggy address belongs to the object at ffff88802c068000 [ 73.619793][ T8447] which belongs to the cache kmalloc-4k of size 4096 [ 73.635625][ T8447] The buggy address is located 4 bytes inside of [ 73.635625][ T8447] 4096-byte region [ffff88802c068000, ffff88802c069000) [ 73.648826][ T8447] The buggy address belongs to the page: [ 73.654458][ T8447] page:ffffea0000b01a00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88802c06a000 pfn:0x2c068 [ 73.666261][ T8447] head:ffffea0000b01a00 order:3 compound_mapcount:0 compound_pincount:0 [ 73.675125][ T8447] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 73.683108][ T8447] raw: 00fff00000010200 ffffea000080f008 ffffea00006b7208 ffff888011042140 [ 73.691685][ T8447] raw: ffff88802c06a000 0000000000040003 00000001ffffffff 0000000000000000 [ 73.700257][ T8447] page dumped because: kasan: bad access detected [ 73.706672][ T8447] [ 73.708987][ T8447] Memory state around the buggy address: [ 73.714863][ T8447] ffff88802c067f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.723065][ T8447] ffff88802c067f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.731219][ T8447] >ffff88802c068000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.739487][ T8447] ^ [ 73.745938][ T8447] ffff88802c068080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.755198][ T8447] ffff88802c068100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.764665][ T8447] ================================================================== [ 73.772807][ T8447] Disabling lock debugging due to kernel taint [ 73.782865][ T8447] Kernel panic - not syncing: panic_on_warn set ... [ 73.789616][ T8447] CPU: 0 PID: 8447 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 73.800678][ T8447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.810857][ T8447] Call Trace: [ 73.814144][ T8447] dump_stack+0x141/0x1d7 [ 73.818496][ T8447] panic+0x306/0x73d [ 73.822497][ T8447] ? __warn_printk+0xf3/0xf3 [ 73.827113][ T8447] ? preempt_schedule_common+0x59/0xc0 [ 73.832614][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 73.837919][ T8447] ? preempt_schedule_thunk+0x16/0x18 [ 73.843665][ T8447] ? trace_hardirqs_on+0x38/0x1c0 [ 73.848938][ T8447] ? trace_hardirqs_on+0x51/0x1c0 [ 73.854057][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 73.859798][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 73.866204][ T8447] end_report.cold+0x5a/0x5a [ 73.873364][ T8447] kasan_report.cold+0x6a/0xd8 [ 73.879416][ T8447] ? __skb_datagram_iter+0x6b8/0x770 [ 73.885049][ T8447] __skb_datagram_iter+0x6b8/0x770 [ 73.890365][ T8447] ? zerocopy_sg_from_iter+0x110/0x110 [ 73.895848][ T8447] skb_copy_datagram_iter+0x40/0x50 [ 73.901078][ T8447] tcp_recvmsg_locked+0x1048/0x22f0 [ 73.906407][ T8447] ? tcp_splice_read+0x8b0/0x8b0 [ 73.911377][ T8447] ? mark_held_locks+0x9f/0xe0 [ 73.916169][ T8447] ? __local_bh_enable_ip+0xa0/0x120 [ 73.921578][ T8447] tcp_recvmsg+0x134/0x550 [ 73.926033][ T8447] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 73.931429][ T8447] ? aa_sk_perm+0x311/0xab0 [ 73.936050][ T8447] inet_recvmsg+0x11b/0x5e0 [ 73.941089][ T8447] ? inet_sendpage+0x140/0x140 [ 73.945955][ T8447] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.953268][ T8447] ? security_socket_recvmsg+0x8f/0xc0 [ 73.958939][ T8447] sock_read_iter+0x33c/0x470 [ 73.963666][ T8447] ? ____sys_recvmsg+0x600/0x600 [ 73.968627][ T8447] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.975597][ T8447] ? fsnotify+0xa58/0x1060 [ 73.980057][ T8447] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.986792][ T8447] new_sync_read+0x5b7/0x6e0 [ 73.991513][ T8447] ? ksys_lseek+0x1b0/0x1b0 [ 73.996037][ T8447] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 74.002158][ T8447] vfs_read+0x35c/0x570 [ 74.006342][ T8447] ksys_read+0x1ee/0x250 [ 74.010635][ T8447] ? vfs_write+0xa40/0xa40 [ 74.015078][ T8447] ? syscall_enter_from_user_mode+0x27/0x70 [ 74.021257][ T8447] do_syscall_64+0x3a/0xb0 [ 74.025700][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.031605][ T8447] RIP: 0033:0x4af19b [ 74.035508][ T8447] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 74.055474][ T8447] RSP: 002b:000000c00003b828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 74.063914][ T8447] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 74.071891][ T8447] RDX: 0000000000001000 RSI: 000000c0001ec000 RDI: 0000000000000006 [ 74.079871][ T8447] RBP: 000000c00003b878 R08: 0000000000000001 R09: 0000000000000002 [ 74.087854][ T8447] R10: 0000000000004478 R11: 0000000000000212 R12: ffffffffffffffff [ 74.095832][ T8447] R13: 0000000000002000 R14: 0000000000000040 R15: 0000000000000020 [ 74.104628][ T8447] Kernel Offset: disabled [ 74.108976][ T8447] Rebooting in 86400 seconds..