Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.73' (ECDSA) to the list of known hosts. 2021/05/03 10:17:11 fuzzer started 2021/05/03 10:17:12 dialing manager at 10.128.0.169:44661 2021/05/03 10:17:12 syscalls: 3571 2021/05/03 10:17:12 code coverage: enabled 2021/05/03 10:17:12 comparison tracing: enabled 2021/05/03 10:17:12 extra coverage: enabled 2021/05/03 10:17:12 setuid sandbox: enabled 2021/05/03 10:17:12 namespace sandbox: enabled 2021/05/03 10:17:12 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/03 10:17:12 fault injection: enabled 2021/05/03 10:17:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/03 10:17:12 net packet injection: enabled 2021/05/03 10:17:12 net device setup: enabled 2021/05/03 10:17:12 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/03 10:17:12 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/03 10:17:12 USB emulation: enabled 2021/05/03 10:17:12 hci packet injection: enabled 2021/05/03 10:17:12 wifi device emulation: enabled 2021/05/03 10:17:12 802.15.4 emulation: enabled 2021/05/03 10:17:12 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/03 10:17:12 fetching corpus: 50, signal 51815/55551 (executing program) 2021/05/03 10:17:12 fetching corpus: 100, signal 81648/87048 (executing program) 2021/05/03 10:17:13 fetching corpus: 150, signal 106268/113191 (executing program) 2021/05/03 10:17:13 fetching corpus: 200, signal 126604/135007 (executing program) 2021/05/03 10:17:13 fetching corpus: 250, signal 141004/150835 (executing program) 2021/05/03 10:17:13 fetching corpus: 300, signal 156060/167235 (executing program) 2021/05/03 10:17:13 fetching corpus: 350, signal 176101/188440 (executing program) 2021/05/03 10:17:13 fetching corpus: 400, signal 185951/199599 (executing program) 2021/05/03 10:17:13 fetching corpus: 450, signal 197895/212815 (executing program) 2021/05/03 10:17:14 fetching corpus: 500, signal 206655/222815 (executing program) 2021/05/03 10:17:14 fetching corpus: 550, signal 212709/230182 (executing program) syzkaller login: [ 68.629144][ T8458] ================================================================== [ 68.637392][ T8458] BUG: KASAN: wild-memory-access in copyout.part.0+0xd7/0x110 [ 68.644864][ T8458] Read of size 240 at addr 108548c016768010 by task syz-fuzzer/8458 [ 68.652828][ T8458] [ 68.655136][ T8458] CPU: 0 PID: 8458 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 68.664659][ T8458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.674698][ T8458] Call Trace: [ 68.677968][ T8458] dump_stack+0x141/0x1d7 [ 68.682300][ T8458] ? copyout.part.0+0xd7/0x110 [ 68.687086][ T8458] kasan_report.cold+0x5f/0xd8 [ 68.691890][ T8458] ? copyout.part.0+0xd7/0x110 [ 68.696639][ T8458] kasan_check_range+0x13d/0x180 [ 68.701561][ T8458] copyout.part.0+0xd7/0x110 [ 68.706136][ T8458] _copy_to_iter+0x2b4/0x1850 [ 68.710813][ T8458] ? lock_chain_count+0x20/0x20 [ 68.715670][ T8458] ? _copy_from_iter_nocache+0x1440/0x1440 [ 68.721561][ T8458] ? tcp_mstamp_refresh+0x12/0xa0 [ 68.726574][ T8458] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 68.732799][ T8458] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 68.738500][ T8458] ? __virt_addr_valid+0x5d/0x2d0 [ 68.743508][ T8458] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 68.749732][ T8458] ? __phys_addr_symbol+0x2c/0x70 [ 68.754750][ T8458] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 68.760453][ T8458] ? __check_object_size+0x18a/0x3f0 [ 68.765778][ T8458] simple_copy_to_iter+0x4c/0x70 [ 68.770720][ T8458] __skb_datagram_iter+0x4a7/0x770 [ 68.775813][ T8458] ? zerocopy_sg_from_iter+0x110/0x110 [ 68.781255][ T8458] skb_copy_datagram_iter+0x40/0x50 [ 68.786549][ T8458] tcp_recvmsg_locked+0x1048/0x22f0 [ 68.791752][ T8458] ? tcp_splice_read+0x8b0/0x8b0 [ 68.796678][ T8458] ? mark_held_locks+0x9f/0xe0 [ 68.801467][ T8458] ? __local_bh_enable_ip+0xa0/0x120 [ 68.806743][ T8458] tcp_recvmsg+0x134/0x550 [ 68.811175][ T8458] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 68.816549][ T8458] ? aa_sk_perm+0x311/0xab0 [ 68.821040][ T8458] inet_recvmsg+0x11b/0x5e0 [ 68.825552][ T8458] ? inet_sendpage+0x140/0x140 [ 68.830306][ T8458] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.836537][ T8458] ? security_socket_recvmsg+0x8f/0xc0 [ 68.841983][ T8458] sock_read_iter+0x33c/0x470 [ 68.846656][ T8458] ? ____sys_recvmsg+0x600/0x600 [ 68.851684][ T8458] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.857917][ T8458] ? fsnotify+0xa58/0x1060 [ 68.862317][ T8458] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.868560][ T8458] new_sync_read+0x5b7/0x6e0 [ 68.873137][ T8458] ? ksys_lseek+0x1b0/0x1b0 [ 68.877622][ T8458] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 68.883598][ T8458] vfs_read+0x35c/0x570 [ 68.887736][ T8458] ksys_read+0x1ee/0x250 [ 68.891962][ T8458] ? vfs_write+0xa40/0xa40 [ 68.896370][ T8458] ? syscall_enter_from_user_mode+0x27/0x70 [ 68.902251][ T8458] do_syscall_64+0x3a/0xb0 [ 68.906651][ T8458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.912526][ T8458] RIP: 0033:0x4af19b [ 68.916400][ T8458] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 68.935986][ T8458] RSP: 002b:000000c0000af850 EFLAGS: 00000206 ORIG_RAX: 0000000000000000 [ 68.944380][ T8458] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 68.952332][ T8458] RDX: 0000000000001000 RSI: 000000c000202000 RDI: 0000000000000006 [ 68.960284][ T8458] RBP: 000000c0000af8a0 R08: 0000000000000001 R09: 0000000000000002 [ 68.968247][ T8458] R10: 0000000000001d6c R11: 0000000000000206 R12: 0000000000001d68 [ 68.976197][ T8458] R13: 0000000000000100 R14: 0000000000000004 R15: 0000000000000002 [ 68.984156][ T8458] ================================================================== [ 68.992195][ T8458] Disabling lock debugging due to kernel taint [ 69.000224][ T8458] Kernel panic - not syncing: panic_on_warn set ... [ 69.006820][ T8458] CPU: 0 PID: 8458 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 69.017753][ T8458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.027806][ T8458] Call Trace: [ 69.031065][ T8458] dump_stack+0x141/0x1d7 [ 69.035378][ T8458] panic+0x306/0x73d [ 69.039254][ T8458] ? __warn_printk+0xf3/0xf3 [ 69.043843][ T8458] ? preempt_schedule_common+0x59/0xc0 [ 69.049284][ T8458] ? copyout.part.0+0xd7/0x110 [ 69.054034][ T8458] ? preempt_schedule_thunk+0x16/0x18 [ 69.059387][ T8458] ? trace_hardirqs_on+0x38/0x1c0 [ 69.064400][ T8458] ? trace_hardirqs_on+0x51/0x1c0 [ 69.069412][ T8458] ? copyout.part.0+0xd7/0x110 [ 69.074154][ T8458] ? copyout.part.0+0xd7/0x110 [ 69.078897][ T8458] end_report.cold+0x5a/0x5a [ 69.083477][ T8458] kasan_report.cold+0x6a/0xd8 [ 69.088221][ T8458] ? copyout.part.0+0xd7/0x110 [ 69.092964][ T8458] kasan_check_range+0x13d/0x180 [ 69.097894][ T8458] copyout.part.0+0xd7/0x110 [ 69.102464][ T8458] _copy_to_iter+0x2b4/0x1850 [ 69.107120][ T8458] ? lock_chain_count+0x20/0x20 [ 69.111955][ T8458] ? _copy_from_iter_nocache+0x1440/0x1440 [ 69.117738][ T8458] ? tcp_mstamp_refresh+0x12/0xa0 [ 69.122740][ T8458] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 69.128962][ T8458] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 69.134662][ T8458] ? __virt_addr_valid+0x5d/0x2d0 [ 69.139662][ T8458] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 69.145886][ T8458] ? __phys_addr_symbol+0x2c/0x70 [ 69.150896][ T8458] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 69.156593][ T8458] ? __check_object_size+0x18a/0x3f0 [ 69.161876][ T8458] simple_copy_to_iter+0x4c/0x70 [ 69.166798][ T8458] __skb_datagram_iter+0x4a7/0x770 [ 69.171890][ T8458] ? zerocopy_sg_from_iter+0x110/0x110 [ 69.177326][ T8458] skb_copy_datagram_iter+0x40/0x50 [ 69.182510][ T8458] tcp_recvmsg_locked+0x1048/0x22f0 [ 69.187692][ T8458] ? tcp_splice_read+0x8b0/0x8b0 [ 69.192610][ T8458] ? mark_held_locks+0x9f/0xe0 [ 69.197356][ T8458] ? __local_bh_enable_ip+0xa0/0x120 [ 69.202634][ T8458] tcp_recvmsg+0x134/0x550 [ 69.207043][ T8458] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 69.212396][ T8458] ? aa_sk_perm+0x311/0xab0 [ 69.216896][ T8458] inet_recvmsg+0x11b/0x5e0 [ 69.221379][ T8458] ? inet_sendpage+0x140/0x140 [ 69.226121][ T8458] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 69.232344][ T8458] ? security_socket_recvmsg+0x8f/0xc0 [ 69.237782][ T8458] sock_read_iter+0x33c/0x470 [ 69.242539][ T8458] ? ____sys_recvmsg+0x600/0x600 [ 69.247566][ T8458] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 69.253790][ T8458] ? fsnotify+0xa58/0x1060 [ 69.258184][ T8458] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 69.264408][ T8458] new_sync_read+0x5b7/0x6e0 [ 69.268978][ T8458] ? ksys_lseek+0x1b0/0x1b0 [ 69.273463][ T8458] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 69.279457][ T8458] vfs_read+0x35c/0x570 [ 69.283688][ T8458] ksys_read+0x1ee/0x250 [ 69.287908][ T8458] ? vfs_write+0xa40/0xa40 [ 69.292311][ T8458] ? syscall_enter_from_user_mode+0x27/0x70 [ 69.298186][ T8458] do_syscall_64+0x3a/0xb0 [ 69.302606][ T8458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 69.308480][ T8458] RIP: 0033:0x4af19b [ 69.312366][ T8458] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 69.332210][ T8458] RSP: 002b:000000c0000af850 EFLAGS: 00000206 ORIG_RAX: 0000000000000000 [ 69.340611][ T8458] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 69.348562][ T8458] RDX: 0000000000001000 RSI: 000000c000202000 RDI: 0000000000000006 [ 69.356599][ T8458] RBP: 000000c0000af8a0 R08: 0000000000000001 R09: 0000000000000002 [ 69.364559][ T8458] R10: 0000000000001d6c R11: 0000000000000206 R12: 0000000000001d68 [ 69.372508][ T8458] R13: 0000000000000100 R14: 0000000000000004 R15: 0000000000000002 [ 69.381086][ T8458] Kernel Offset: disabled [ 69.385397][ T8458] Rebooting in 86400 seconds..