Warning: Permanently added '10.128.0.236' (ECDSA) to the list of known hosts. 2021/05/01 13:31:45 fuzzer started 2021/05/01 13:31:45 dialing manager at 10.128.0.169:44661 2021/05/01 13:31:45 syscalls: 3571 2021/05/01 13:31:45 code coverage: enabled 2021/05/01 13:31:45 comparison tracing: enabled 2021/05/01 13:31:45 extra coverage: enabled 2021/05/01 13:31:45 setuid sandbox: enabled 2021/05/01 13:31:45 namespace sandbox: enabled 2021/05/01 13:31:45 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/01 13:31:45 fault injection: enabled 2021/05/01 13:31:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/01 13:31:45 net packet injection: enabled 2021/05/01 13:31:45 net device setup: enabled 2021/05/01 13:31:45 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/01 13:31:45 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/01 13:31:45 USB emulation: enabled 2021/05/01 13:31:45 hci packet injection: enabled 2021/05/01 13:31:45 wifi device emulation: enabled 2021/05/01 13:31:45 802.15.4 emulation: enabled 2021/05/01 13:31:45 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/01 13:31:46 fetching corpus: 50, signal 48168/51899 (executing program) 2021/05/01 13:31:46 fetching corpus: 100, signal 86379/91710 (executing program) syzkaller login: [ 70.934218][ T8430] ================================================================== [ 70.942428][ T8430] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 70.950065][ T8430] Read of size 4 at addr ffff888033e20004 by task syz-fuzzer/8430 [ 70.957848][ T8430] [ 70.960152][ T8430] CPU: 0 PID: 8430 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 70.969673][ T8430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.979710][ T8430] Call Trace: [ 70.982983][ T8430] dump_stack+0x141/0x1d7 [ 70.987313][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 70.992581][ T8430] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 70.999592][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 71.004915][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 71.010191][ T8430] kasan_report.cold+0x7c/0xd8 [ 71.014949][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 71.020222][ T8430] __skb_datagram_iter+0x6b8/0x770 [ 71.025321][ T8430] ? zerocopy_sg_from_iter+0x110/0x110 [ 71.030785][ T8430] skb_copy_datagram_iter+0x40/0x50 [ 71.035966][ T8430] tcp_recvmsg_locked+0x1048/0x22f0 [ 71.041174][ T8430] ? tcp_splice_read+0x8b0/0x8b0 [ 71.046121][ T8430] ? mark_held_locks+0x9f/0xe0 [ 71.050873][ T8430] ? __local_bh_enable_ip+0xa0/0x120 [ 71.056158][ T8430] tcp_recvmsg+0x134/0x550 [ 71.060578][ T8430] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 71.065950][ T8430] ? aa_sk_perm+0x311/0xab0 [ 71.070484][ T8430] inet_recvmsg+0x11b/0x5e0 [ 71.074990][ T8430] ? inet_sendpage+0x140/0x140 [ 71.079761][ T8430] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.085992][ T8430] ? security_socket_recvmsg+0x8f/0xc0 [ 71.091442][ T8430] sock_read_iter+0x33c/0x470 [ 71.096109][ T8430] ? ____sys_recvmsg+0x600/0x600 [ 71.101038][ T8430] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.107263][ T8430] ? fsnotify+0xa58/0x1060 [ 71.111662][ T8430] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.117889][ T8430] new_sync_read+0x5b7/0x6e0 [ 71.122485][ T8430] ? ksys_lseek+0x1b0/0x1b0 [ 71.126971][ T8430] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 71.132951][ T8430] vfs_read+0x35c/0x570 [ 71.137113][ T8430] ksys_read+0x1ee/0x250 [ 71.141338][ T8430] ? vfs_write+0xa40/0xa40 [ 71.145734][ T8430] ? syscall_enter_from_user_mode+0x27/0x70 [ 71.151613][ T8430] do_syscall_64+0x3a/0xb0 [ 71.156030][ T8430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 71.161941][ T8430] RIP: 0033:0x4af19b [ 71.165817][ T8430] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 71.185408][ T8430] RSP: 002b:000000c0002b7828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 71.193807][ T8430] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 71.201762][ T8430] RDX: 0000000000001000 RSI: 000000c000214000 RDI: 0000000000000006 [ 71.209716][ T8430] RBP: 000000c0002b7878 R08: 0000000000000001 R09: 0000000000000002 [ 71.217668][ T8430] R10: 00000000000063d4 R11: 0000000000000212 R12: 00000000000063bc [ 71.225622][ T8430] R13: 0000000000000080 R14: 0000000000000002 R15: 0000000000000002 [ 71.233585][ T8430] [ 71.235889][ T8430] Allocated by task 1: [ 71.239933][ T8430] kasan_save_stack+0x1b/0x40 [ 71.244600][ T8430] __kasan_slab_alloc+0x84/0xa0 [ 71.249432][ T8430] kmem_cache_alloc+0x219/0x3a0 [ 71.254266][ T8430] getname_flags.part.0+0x50/0x4f0 [ 71.259363][ T8430] getname+0x8e/0xd0 [ 71.263240][ T8430] do_sys_openat2+0xf5/0x420 [ 71.267812][ T8430] __x64_sys_open+0x119/0x1c0 [ 71.272468][ T8430] do_syscall_64+0x3a/0xb0 [ 71.276869][ T8430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 71.282744][ T8430] [ 71.285061][ T8430] Freed by task 78: [ 71.288842][ T8430] kasan_save_stack+0x1b/0x40 [ 71.293517][ T8430] kasan_set_track+0x1c/0x30 [ 71.298106][ T8430] kasan_set_free_info+0x20/0x30 [ 71.303026][ T8430] __kasan_slab_free+0xfb/0x130 [ 71.307855][ T8430] slab_free_freelist_hook+0xdf/0x240 [ 71.313223][ T8430] kmem_cache_free+0x97/0x750 [ 71.317899][ T8430] putname+0xe1/0x120 [ 71.321863][ T8430] do_sys_openat2+0x153/0x420 [ 71.326520][ T8430] __x64_sys_open+0x119/0x1c0 [ 71.331175][ T8430] do_syscall_64+0x3a/0xb0 [ 71.335588][ T8430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 71.341463][ T8430] [ 71.343766][ T8430] The buggy address belongs to the object at ffff888033e20000 [ 71.343766][ T8430] which belongs to the cache names_cache of size 4096 [ 71.357896][ T8430] The buggy address is located 4 bytes inside of [ 71.357896][ T8430] 4096-byte region [ffff888033e20000, ffff888033e21000) [ 71.371062][ T8430] The buggy address belongs to the page: [ 71.376669][ T8430] page:ffffea0000cf8800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x33e20 [ 71.386797][ T8430] head:ffffea0000cf8800 order:3 compound_mapcount:0 compound_pincount:0 [ 71.395098][ T8430] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 71.403062][ T8430] raw: 00fff00000010200 0000000000000000 dead000000000122 ffff8880111be280 [ 71.411625][ T8430] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 71.420182][ T8430] page dumped because: kasan: bad access detected [ 71.426583][ T8430] [ 71.428888][ T8430] Memory state around the buggy address: [ 71.434493][ T8430] ffff888033e1ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 71.442533][ T8430] ffff888033e1ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 71.450574][ T8430] >ffff888033e20000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 71.458609][ T8430] ^ [ 71.462654][ T8430] ffff888033e20080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 71.470695][ T8430] ffff888033e20100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 71.478731][ T8430] ================================================================== [ 71.486765][ T8430] Disabling lock debugging due to kernel taint [ 71.494165][ T8430] Kernel panic - not syncing: panic_on_warn set ... [ 71.500766][ T8430] CPU: 1 PID: 8430 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 71.511690][ T8430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.521753][ T8430] Call Trace: [ 71.525020][ T8430] dump_stack+0x141/0x1d7 [ 71.529358][ T8430] panic+0x306/0x73d [ 71.533246][ T8430] ? __warn_printk+0xf3/0xf3 [ 71.537826][ T8430] ? preempt_schedule_common+0x59/0xc0 [ 71.543277][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 71.548549][ T8430] ? preempt_schedule_thunk+0x16/0x18 [ 71.553912][ T8430] ? trace_hardirqs_on+0x38/0x1c0 [ 71.558921][ T8430] ? trace_hardirqs_on+0x51/0x1c0 [ 71.563932][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 71.569201][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 71.574471][ T8430] end_report.cold+0x5a/0x5a [ 71.579052][ T8430] kasan_report.cold+0x6a/0xd8 [ 71.583806][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 71.589078][ T8430] __skb_datagram_iter+0x6b8/0x770 [ 71.594178][ T8430] ? zerocopy_sg_from_iter+0x110/0x110 [ 71.599623][ T8430] skb_copy_datagram_iter+0x40/0x50 [ 71.604809][ T8430] tcp_recvmsg_locked+0x1048/0x22f0 [ 71.610011][ T8430] ? tcp_splice_read+0x8b0/0x8b0 [ 71.614937][ T8430] ? mark_held_locks+0x9f/0xe0 [ 71.619692][ T8430] ? __local_bh_enable_ip+0xa0/0x120 [ 71.624969][ T8430] tcp_recvmsg+0x134/0x550 [ 71.629373][ T8430] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 71.634745][ T8430] ? aa_sk_perm+0x311/0xab0 [ 71.639238][ T8430] inet_recvmsg+0x11b/0x5e0 [ 71.643733][ T8430] ? inet_sendpage+0x140/0x140 [ 71.648490][ T8430] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.654722][ T8430] ? security_socket_recvmsg+0x8f/0xc0 [ 71.660170][ T8430] sock_read_iter+0x33c/0x470 [ 71.664836][ T8430] ? ____sys_recvmsg+0x600/0x600 [ 71.669765][ T8430] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.676002][ T8430] ? fsnotify+0xa58/0x1060 [ 71.680409][ T8430] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 71.686641][ T8430] new_sync_read+0x5b7/0x6e0 [ 71.691304][ T8430] ? ksys_lseek+0x1b0/0x1b0 [ 71.695792][ T8430] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 71.701787][ T8430] vfs_read+0x35c/0x570 [ 71.705932][ T8430] ksys_read+0x1ee/0x250 [ 71.710160][ T8430] ? vfs_write+0xa40/0xa40 [ 71.714564][ T8430] ? syscall_enter_from_user_mode+0x27/0x70 [ 71.720465][ T8430] do_syscall_64+0x3a/0xb0 [ 71.724876][ T8430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 71.730779][ T8430] RIP: 0033:0x4af19b [ 71.734660][ T8430] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 71.754253][ T8430] RSP: 002b:000000c0002b7828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 71.762655][ T8430] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 71.770613][ T8430] RDX: 0000000000001000 RSI: 000000c000214000 RDI: 0000000000000006 [ 71.778584][ T8430] RBP: 000000c0002b7878 R08: 0000000000000001 R09: 0000000000000002 [ 71.786541][ T8430] R10: 00000000000063d4 R11: 0000000000000212 R12: 00000000000063bc [ 71.794499][ T8430] R13: 0000000000000080 R14: 0000000000000002 R15: 0000000000000002 [ 71.803103][ T8430] Kernel Offset: disabled [ 71.807415][ T8430] Rebooting in 86400 seconds..