Warning: Permanently added '10.128.10.5' (ECDSA) to the list of known hosts. 2021/05/01 20:49:30 fuzzer started 2021/05/01 20:49:31 dialing manager at 10.128.0.169:44661 2021/05/01 20:49:31 syscalls: 3571 2021/05/01 20:49:31 code coverage: enabled 2021/05/01 20:49:31 comparison tracing: enabled 2021/05/01 20:49:31 extra coverage: enabled 2021/05/01 20:49:31 setuid sandbox: enabled 2021/05/01 20:49:31 namespace sandbox: enabled 2021/05/01 20:49:31 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/01 20:49:31 fault injection: enabled 2021/05/01 20:49:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/01 20:49:31 net packet injection: enabled 2021/05/01 20:49:31 net device setup: enabled 2021/05/01 20:49:31 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/01 20:49:31 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/01 20:49:31 USB emulation: enabled 2021/05/01 20:49:31 hci packet injection: enabled 2021/05/01 20:49:31 wifi device emulation: enabled 2021/05/01 20:49:31 802.15.4 emulation: enabled 2021/05/01 20:49:31 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/01 20:49:31 fetching corpus: 50, signal 49929/53651 (executing program) 2021/05/01 20:49:31 fetching corpus: 100, signal 82779/88126 (executing program) 2021/05/01 20:49:32 fetching corpus: 150, signal 112946/119779 (executing program) 2021/05/01 20:49:32 fetching corpus: 200, signal 140284/148476 (executing program) 2021/05/01 20:49:32 fetching corpus: 250, signal 153484/163130 (executing program) 2021/05/01 20:49:32 fetching corpus: 300, signal 167163/178129 (executing program) 2021/05/01 20:49:32 fetching corpus: 350, signal 176356/188741 (executing program) 2021/05/01 20:49:32 fetching corpus: 400, signal 188624/202223 (executing program) 2021/05/01 20:49:32 fetching corpus: 450, signal 202151/216907 (executing program) syzkaller login: [ 73.310175][ T8442] ================================================================== [ 73.318424][ T8442] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 73.326098][ T8442] Read of size 4 at addr ffff88802ee80004 by task syz-fuzzer/8442 [ 73.333906][ T8442] [ 73.336246][ T8442] CPU: 1 PID: 8442 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 73.345827][ T8442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.355900][ T8442] Call Trace: [ 73.359197][ T8442] dump_stack+0x141/0x1d7 [ 73.363540][ T8442] ? __skb_datagram_iter+0x6b8/0x770 [ 73.369086][ T8442] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 73.376117][ T8442] ? __skb_datagram_iter+0x6b8/0x770 [ 73.382038][ T8442] ? __skb_datagram_iter+0x6b8/0x770 [ 73.387466][ T8442] kasan_report.cold+0x7c/0xd8 [ 73.392411][ T8442] ? __skb_datagram_iter+0x6b8/0x770 [ 73.398354][ T8442] __skb_datagram_iter+0x6b8/0x770 [ 73.403525][ T8442] ? zerocopy_sg_from_iter+0x110/0x110 [ 73.409169][ T8442] skb_copy_datagram_iter+0x40/0x50 [ 73.414426][ T8442] tcp_recvmsg_locked+0x1048/0x22f0 [ 73.419727][ T8442] ? tcp_splice_read+0x8b0/0x8b0 [ 73.424728][ T8442] ? mark_held_locks+0x9f/0xe0 [ 73.429590][ T8442] ? __local_bh_enable_ip+0xa0/0x120 [ 73.435118][ T8442] tcp_recvmsg+0x134/0x550 [ 73.439600][ T8442] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 73.445036][ T8442] ? aa_sk_perm+0x311/0xab0 [ 73.449612][ T8442] inet_recvmsg+0x11b/0x5e0 [ 73.454176][ T8442] ? inet_sendpage+0x140/0x140 [ 73.458990][ T8442] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.465285][ T8442] ? security_socket_recvmsg+0x8f/0xc0 [ 73.470793][ T8442] sock_read_iter+0x33c/0x470 [ 73.475511][ T8442] ? ____sys_recvmsg+0x600/0x600 [ 73.480587][ T8442] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.486974][ T8442] ? fsnotify+0xa58/0x1060 [ 73.491527][ T8442] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.497809][ T8442] new_sync_read+0x5b7/0x6e0 [ 73.502501][ T8442] ? ksys_lseek+0x1b0/0x1b0 [ 73.507058][ T8442] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 73.513103][ T8442] vfs_read+0x35c/0x570 [ 73.517311][ T8442] ksys_read+0x1ee/0x250 [ 73.521603][ T8442] ? vfs_write+0xa40/0xa40 [ 73.526052][ T8442] ? syscall_enter_from_user_mode+0x27/0x70 [ 73.531985][ T8442] do_syscall_64+0x3a/0xb0 [ 73.536441][ T8442] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 73.542379][ T8442] RIP: 0033:0x4af19b [ 73.546427][ T8442] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 73.566172][ T8442] RSP: 002b:000000c00009f850 EFLAGS: 00000206 ORIG_RAX: 0000000000000000 [ 73.574623][ T8442] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 73.582622][ T8442] RDX: 0000000000001000 RSI: 000000c00016c000 RDI: 0000000000000006 [ 73.590626][ T8442] RBP: 000000c00009f8a0 R08: 0000000000000001 R09: 0000000000000002 [ 73.598621][ T8442] R10: 00000000000006d6 R11: 0000000000000206 R12: 00000000000006d2 [ 73.606639][ T8442] R13: 0000000000000010 R14: 0000000000000004 R15: 0000000000000002 [ 73.614662][ T8442] [ 73.617001][ T8442] The buggy address belongs to the page: [ 73.622642][ T8442] page:ffffea0000bba000 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x2ee80 [ 73.633087][ T8442] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 73.640239][ T8442] raw: 00fff00000000000 ffffea0000bb7a08 ffff88813fffb978 0000000000000000 [ 73.648855][ T8442] raw: 0000000000000000 0000000000000003 00000000ffffff7f 0000000000000000 [ 73.657465][ T8442] page dumped because: kasan: bad access detected [ 73.663898][ T8442] [ 73.666235][ T8442] Memory state around the buggy address: [ 73.671964][ T8442] ffff88802ee7ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.680050][ T8442] ffff88802ee7ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.688137][ T8442] >ffff88802ee80000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.696213][ T8442] ^ [ 73.700309][ T8442] ffff88802ee80080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.708405][ T8442] ffff88802ee80100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.716487][ T8442] ================================================================== [ 73.724568][ T8442] Disabling lock debugging due to kernel taint [ 73.733514][ T8442] Kernel panic - not syncing: panic_on_warn set ... [ 73.740124][ T8442] CPU: 0 PID: 8442 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 73.751077][ T8442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.761144][ T8442] Call Trace: [ 73.764423][ T8442] dump_stack+0x141/0x1d7 [ 73.768783][ T8442] panic+0x306/0x73d [ 73.772695][ T8442] ? __warn_printk+0xf3/0xf3 [ 73.777381][ T8442] ? preempt_schedule_common+0x59/0xc0 [ 73.782896][ T8442] ? __skb_datagram_iter+0x6b8/0x770 [ 73.788186][ T8442] ? preempt_schedule_thunk+0x16/0x18 [ 73.793579][ T8442] ? trace_hardirqs_on+0x38/0x1c0 [ 73.798607][ T8442] ? trace_hardirqs_on+0x51/0x1c0 [ 73.803650][ T8442] ? __skb_datagram_iter+0x6b8/0x770 [ 73.808941][ T8442] ? __skb_datagram_iter+0x6b8/0x770 [ 73.814231][ T8442] end_report.cold+0x5a/0x5a [ 73.818828][ T8442] kasan_report.cold+0x6a/0xd8 [ 73.823598][ T8442] ? __skb_datagram_iter+0x6b8/0x770 [ 73.828884][ T8442] __skb_datagram_iter+0x6b8/0x770 [ 73.834100][ T8442] ? zerocopy_sg_from_iter+0x110/0x110 [ 73.839573][ T8442] skb_copy_datagram_iter+0x40/0x50 [ 73.844784][ T8442] tcp_recvmsg_locked+0x1048/0x22f0 [ 73.849996][ T8442] ? tcp_splice_read+0x8b0/0x8b0 [ 73.854955][ T8442] ? mark_held_locks+0x9f/0xe0 [ 73.859741][ T8442] ? __local_bh_enable_ip+0xa0/0x120 [ 73.865049][ T8442] tcp_recvmsg+0x134/0x550 [ 73.869474][ T8442] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 73.874849][ T8442] ? aa_sk_perm+0x311/0xab0 [ 73.879391][ T8442] inet_recvmsg+0x11b/0x5e0 [ 73.883896][ T8442] ? inet_sendpage+0x140/0x140 [ 73.888671][ T8442] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.894921][ T8442] ? security_socket_recvmsg+0x8f/0xc0 [ 73.900389][ T8442] sock_read_iter+0x33c/0x470 [ 73.905082][ T8442] ? ____sys_recvmsg+0x600/0x600 [ 73.910030][ T8442] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.916279][ T8442] ? fsnotify+0xa58/0x1060 [ 73.920705][ T8442] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.926953][ T8442] new_sync_read+0x5b7/0x6e0 [ 73.931560][ T8442] ? ksys_lseek+0x1b0/0x1b0 [ 73.936076][ T8442] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 73.942109][ T8442] vfs_read+0x35c/0x570 [ 73.946301][ T8442] ksys_read+0x1ee/0x250 [ 73.950556][ T8442] ? vfs_write+0xa40/0xa40 [ 73.954981][ T8442] ? syscall_enter_from_user_mode+0x27/0x70 [ 73.960906][ T8442] do_syscall_64+0x3a/0xb0 [ 73.965434][ T8442] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 73.971353][ T8442] RIP: 0033:0x4af19b [ 73.975243][ T8442] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 73.994847][ T8442] RSP: 002b:000000c00009f850 EFLAGS: 00000206 ORIG_RAX: 0000000000000000 [ 74.003279][ T8442] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 74.011262][ T8442] RDX: 0000000000001000 RSI: 000000c00016c000 RDI: 0000000000000006 [ 74.019253][ T8442] RBP: 000000c00009f8a0 R08: 0000000000000001 R09: 0000000000000002 [ 74.027240][ T8442] R10: 00000000000006d6 R11: 0000000000000206 R12: 00000000000006d2 [ 74.035209][ T8442] R13: 0000000000000010 R14: 0000000000000004 R15: 0000000000000002 [ 74.044029][ T8442] Kernel Offset: disabled [ 74.048370][ T8442] Rebooting in 86400 seconds..