Warning: Permanently added '10.128.1.34' (ECDSA) to the list of known hosts. 2021/05/01 23:15:02 fuzzer started 2021/05/01 23:15:03 dialing manager at 10.128.0.169:44661 2021/05/01 23:15:03 syscalls: 3571 2021/05/01 23:15:03 code coverage: enabled 2021/05/01 23:15:03 comparison tracing: enabled 2021/05/01 23:15:03 extra coverage: enabled 2021/05/01 23:15:03 setuid sandbox: enabled 2021/05/01 23:15:03 namespace sandbox: enabled 2021/05/01 23:15:03 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/01 23:15:03 fault injection: enabled 2021/05/01 23:15:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/01 23:15:03 net packet injection: enabled 2021/05/01 23:15:03 net device setup: enabled 2021/05/01 23:15:03 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/01 23:15:03 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/01 23:15:03 USB emulation: enabled 2021/05/01 23:15:03 hci packet injection: enabled 2021/05/01 23:15:03 wifi device emulation: enabled 2021/05/01 23:15:03 802.15.4 emulation: enabled 2021/05/01 23:15:03 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/01 23:15:03 fetching corpus: 50, signal 63150/66812 (executing program) 2021/05/01 23:15:04 fetching corpus: 100, signal 90270/95573 (executing program) 2021/05/01 23:15:04 fetching corpus: 150, signal 110540/117362 (executing program) 2021/05/01 23:15:04 fetching corpus: 200, signal 128079/136390 (executing program) 2021/05/01 23:15:04 fetching corpus: 250, signal 142989/152748 (executing program) 2021/05/01 23:15:05 fetching corpus: 300, signal 162948/173975 (executing program) syzkaller login: [ 73.962226][ T8443] ================================================================== [ 73.970442][ T8443] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 73.978081][ T8443] Read of size 4 at addr ffff88802e7c0004 by task syz-fuzzer/8443 [ 73.985874][ T8443] [ 73.988198][ T8443] CPU: 1 PID: 8443 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 73.997727][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.007806][ T8443] Call Trace: [ 74.011077][ T8443] dump_stack+0x141/0x1d7 [ 74.015411][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 74.020691][ T8443] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 74.027762][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 74.033057][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 74.038353][ T8443] kasan_report.cold+0x7c/0xd8 [ 74.043144][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 74.048450][ T8443] __skb_datagram_iter+0x6b8/0x770 [ 74.053585][ T8443] ? zerocopy_sg_from_iter+0x110/0x110 [ 74.059068][ T8443] skb_copy_datagram_iter+0x40/0x50 [ 74.064476][ T8443] tcp_recvmsg_locked+0x1048/0x22f0 [ 74.069721][ T8443] ? tcp_splice_read+0x8b0/0x8b0 [ 74.074673][ T8443] ? mark_held_locks+0x9f/0xe0 [ 74.079454][ T8443] ? __local_bh_enable_ip+0xa0/0x120 [ 74.084770][ T8443] tcp_recvmsg+0x134/0x550 [ 74.089233][ T8443] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 74.094849][ T8443] ? aa_sk_perm+0x311/0xab0 [ 74.099381][ T8443] inet_recvmsg+0x11b/0x5e0 [ 74.103911][ T8443] ? inet_sendpage+0x140/0x140 [ 74.108703][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.114957][ T8443] ? security_socket_recvmsg+0x8f/0xc0 [ 74.120450][ T8443] sock_read_iter+0x33c/0x470 [ 74.125143][ T8443] ? ____sys_recvmsg+0x600/0x600 [ 74.130100][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.136352][ T8443] ? fsnotify+0xa58/0x1060 [ 74.140780][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.147400][ T8443] new_sync_read+0x5b7/0x6e0 [ 74.152004][ T8443] ? ksys_lseek+0x1b0/0x1b0 [ 74.156518][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 74.162659][ T8443] vfs_read+0x35c/0x570 [ 74.168572][ T8443] ksys_read+0x1ee/0x250 [ 74.172824][ T8443] ? vfs_write+0xa40/0xa40 [ 74.177265][ T8443] ? syscall_enter_from_user_mode+0x27/0x70 [ 74.183182][ T8443] do_syscall_64+0x3a/0xb0 [ 74.187618][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.193541][ T8443] RIP: 0033:0x4af19b [ 74.197442][ T8443] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 74.217151][ T8443] RSP: 002b:000000c00003b828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 74.225600][ T8443] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 74.233585][ T8443] RDX: 0000000000001000 RSI: 000000c0001a2000 RDI: 0000000000000006 [ 74.241565][ T8443] RBP: 000000c00003b878 R08: 0000000000000001 R09: 0000000000000002 [ 74.249544][ T8443] R10: 0000000000004af9 R11: 0000000000000212 R12: ffffffffffffffff [ 74.257547][ T8443] R13: 0000000000002000 R14: 0000000000000002 R15: 0000000000000002 [ 74.265639][ T8443] [ 74.267966][ T8443] The buggy address belongs to the page: [ 74.273676][ T8443] page:ffffea0000b9f000 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x2e7c0 [ 74.284103][ T8443] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 74.291239][ T8443] raw: 00fff00000000000 ffff88813fffb978 ffffea0000581208 0000000000000000 [ 74.300466][ T8443] raw: 0000000000000000 0000000000000003 00000000ffffff7f 0000000000000000 [ 74.309049][ T8443] page dumped because: kasan: bad access detected [ 74.315457][ T8443] [ 74.317795][ T8443] Memory state around the buggy address: [ 74.323422][ T8443] ffff88802e7bff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.331485][ T8443] ffff88802e7bff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.339567][ T8443] >ffff88802e7c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.347644][ T8443] ^ [ 74.351715][ T8443] ffff88802e7c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.359783][ T8443] ffff88802e7c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.367848][ T8443] ================================================================== [ 74.375904][ T8443] Disabling lock debugging due to kernel taint [ 74.382508][ T8443] Kernel panic - not syncing: panic_on_warn set ... [ 74.389100][ T8443] CPU: 0 PID: 8443 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 74.400045][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.410110][ T8443] Call Trace: [ 74.413393][ T8443] dump_stack+0x141/0x1d7 [ 74.417733][ T8443] panic+0x306/0x73d [ 74.421646][ T8443] ? __warn_printk+0xf3/0xf3 [ 74.426248][ T8443] ? preempt_schedule_common+0x59/0xc0 [ 74.431970][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 74.437257][ T8443] ? preempt_schedule_thunk+0x16/0x18 [ 74.442637][ T8443] ? trace_hardirqs_on+0x38/0x1c0 [ 74.447674][ T8443] ? trace_hardirqs_on+0x51/0x1c0 [ 74.452698][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 74.457983][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 74.463272][ T8443] end_report.cold+0x5a/0x5a [ 74.467867][ T8443] kasan_report.cold+0x6a/0xd8 [ 74.472657][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 74.478033][ T8443] __skb_datagram_iter+0x6b8/0x770 [ 74.483148][ T8443] ? zerocopy_sg_from_iter+0x110/0x110 [ 74.488612][ T8443] skb_copy_datagram_iter+0x40/0x50 [ 74.493812][ T8443] tcp_recvmsg_locked+0x1048/0x22f0 [ 74.499212][ T8443] ? tcp_splice_read+0x8b0/0x8b0 [ 74.504168][ T8443] ? mark_held_locks+0x9f/0xe0 [ 74.508943][ T8443] ? __local_bh_enable_ip+0xa0/0x120 [ 74.514239][ T8443] tcp_recvmsg+0x134/0x550 [ 74.518678][ T8443] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 74.524057][ T8443] ? aa_sk_perm+0x311/0xab0 [ 74.528566][ T8443] inet_recvmsg+0x11b/0x5e0 [ 74.533080][ T8443] ? inet_sendpage+0x140/0x140 [ 74.537859][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.544107][ T8443] ? security_socket_recvmsg+0x8f/0xc0 [ 74.549593][ T8443] sock_read_iter+0x33c/0x470 [ 74.554280][ T8443] ? ____sys_recvmsg+0x600/0x600 [ 74.559552][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.565850][ T8443] ? fsnotify+0xa58/0x1060 [ 74.570269][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.576528][ T8443] new_sync_read+0x5b7/0x6e0 [ 74.581120][ T8443] ? ksys_lseek+0x1b0/0x1b0 [ 74.585641][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 74.593134][ T8443] vfs_read+0x35c/0x570 [ 74.597327][ T8443] ksys_read+0x1ee/0x250 [ 74.601583][ T8443] ? vfs_write+0xa40/0xa40 [ 74.606031][ T8443] ? syscall_enter_from_user_mode+0x27/0x70 [ 74.611944][ T8443] do_syscall_64+0x3a/0xb0 [ 74.616370][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.622300][ T8443] RIP: 0033:0x4af19b [ 74.626195][ T8443] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 74.646332][ T8443] RSP: 002b:000000c00003b828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 74.654762][ T8443] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 74.663285][ T8443] RDX: 0000000000001000 RSI: 000000c0001a2000 RDI: 0000000000000006 [ 74.671262][ T8443] RBP: 000000c00003b878 R08: 0000000000000001 R09: 0000000000000002 [ 74.679251][ T8443] R10: 0000000000004af9 R11: 0000000000000212 R12: ffffffffffffffff [ 74.687311][ T8443] R13: 0000000000002000 R14: 0000000000000002 R15: 0000000000000002 [ 74.695618][ T8443] Kernel Offset: disabled [ 74.700092][ T8443] Rebooting in 86400 seconds..