Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.218' (ECDSA) to the list of known hosts. 2021/05/02 15:29:05 fuzzer started 2021/05/02 15:29:06 dialing manager at 10.128.0.169:44661 2021/05/02 15:29:06 syscalls: 3571 2021/05/02 15:29:06 code coverage: enabled 2021/05/02 15:29:06 comparison tracing: enabled 2021/05/02 15:29:06 extra coverage: enabled 2021/05/02 15:29:06 setuid sandbox: enabled 2021/05/02 15:29:06 namespace sandbox: enabled 2021/05/02 15:29:06 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/02 15:29:06 fault injection: enabled 2021/05/02 15:29:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/02 15:29:06 net packet injection: enabled 2021/05/02 15:29:06 net device setup: enabled 2021/05/02 15:29:06 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/02 15:29:06 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/02 15:29:06 USB emulation: enabled 2021/05/02 15:29:06 hci packet injection: enabled 2021/05/02 15:29:06 wifi device emulation: enabled 2021/05/02 15:29:06 802.15.4 emulation: enabled 2021/05/02 15:29:06 fetching corpus: 0, signal 0/2000 (executing program) syzkaller login: [ 67.400447][ T8455] ================================================================== [ 67.408758][ T8455] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 67.416431][ T8455] Read of size 4 at addr ffff88801d2c8004 by task syz-fuzzer/8455 [ 67.424253][ T8455] [ 67.426586][ T8455] CPU: 1 PID: 8455 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 67.436143][ T8455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.446208][ T8455] Call Trace: [ 67.449496][ T8455] dump_stack+0x141/0x1d7 [ 67.453863][ T8455] ? __skb_datagram_iter+0x6b8/0x770 [ 67.459170][ T8455] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 67.466221][ T8455] ? __skb_datagram_iter+0x6b8/0x770 [ 67.471522][ T8455] ? __skb_datagram_iter+0x6b8/0x770 [ 67.476828][ T8455] kasan_report.cold+0x7c/0xd8 [ 67.481619][ T8455] ? __skb_datagram_iter+0x6b8/0x770 [ 67.486902][ T8455] __skb_datagram_iter+0x6b8/0x770 [ 67.492003][ T8455] ? zerocopy_sg_from_iter+0x110/0x110 [ 67.497450][ T8455] skb_copy_datagram_iter+0x40/0x50 [ 67.502638][ T8455] tcp_recvmsg_locked+0x1048/0x22f0 [ 67.507837][ T8455] ? tcp_splice_read+0x8b0/0x8b0 [ 67.512771][ T8455] ? mark_held_locks+0x9f/0xe0 [ 67.517525][ T8455] ? __local_bh_enable_ip+0xa0/0x120 [ 67.522807][ T8455] tcp_recvmsg+0x134/0x550 [ 67.527210][ T8455] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 67.532572][ T8455] ? aa_sk_perm+0x311/0xab0 [ 67.537062][ T8455] inet_recvmsg+0x11b/0x5e0 [ 67.541552][ T8455] ? inet_sendpage+0x140/0x140 [ 67.546303][ T8455] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 67.552535][ T8455] ? security_socket_recvmsg+0x8f/0xc0 [ 67.558006][ T8455] sock_read_iter+0x33c/0x470 [ 67.562667][ T8455] ? ____sys_recvmsg+0x600/0x600 [ 67.567593][ T8455] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 67.573816][ T8455] ? fsnotify+0xa58/0x1060 [ 67.578225][ T8455] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 67.584452][ T8455] new_sync_read+0x5b7/0x6e0 [ 67.589026][ T8455] ? ksys_lseek+0x1b0/0x1b0 [ 67.593511][ T8455] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 67.599489][ T8455] vfs_read+0x35c/0x570 [ 67.603628][ T8455] ksys_read+0x1ee/0x250 [ 67.607866][ T8455] ? vfs_write+0xa40/0xa40 [ 67.612272][ T8455] ? syscall_enter_from_user_mode+0x27/0x70 [ 67.618152][ T8455] do_syscall_64+0x3a/0xb0 [ 67.622556][ T8455] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 67.628436][ T8455] RIP: 0033:0x4af19b [ 67.632316][ T8455] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 67.651902][ T8455] RSP: 002b:000000c000311868 EFLAGS: 00000216 ORIG_RAX: 0000000000000000 [ 67.660296][ T8455] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 67.668266][ T8455] RDX: 0000000000001000 RSI: 000000c0001a4000 RDI: 0000000000000006 [ 67.676222][ T8455] RBP: 000000c0003118b8 R08: 0000000000000001 R09: 0000000000000002 [ 67.684174][ T8455] R10: 0000000000005c6e R11: 0000000000000216 R12: 0000000000005c69 [ 67.692128][ T8455] R13: 0000000000002000 R14: 0000000000000002 R15: 0000000000000002 [ 67.700091][ T8455] [ 67.702395][ T8455] Allocated by task 1: [ 67.706437][ T8455] kasan_save_stack+0x1b/0x40 [ 67.711106][ T8455] __kasan_kmalloc+0x9b/0xd0 [ 67.715679][ T8455] tomoyo_realpath_from_path+0xc3/0x620 [ 67.721206][ T8455] tomoyo_path_perm+0x21b/0x400 [ 67.726034][ T8455] security_inode_getattr+0xcf/0x140 [ 67.731304][ T8455] vfs_statx+0x164/0x390 [ 67.735534][ T8455] __do_sys_newlstat+0x91/0x110 [ 67.740371][ T8455] do_syscall_64+0x3a/0xb0 [ 67.744771][ T8455] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 67.750655][ T8455] [ 67.752958][ T8455] Freed by task 4174: [ 67.756914][ T8455] kasan_save_stack+0x1b/0x40 [ 67.761575][ T8455] kasan_set_track+0x1c/0x30 [ 67.766148][ T8455] kasan_set_free_info+0x20/0x30 [ 67.771065][ T8455] __kasan_slab_free+0xfb/0x130 [ 67.775897][ T8455] slab_free_freelist_hook+0xdf/0x240 [ 67.781249][ T8455] kfree+0xe5/0x7f0 [ 67.785039][ T8455] tomoyo_realpath_from_path+0x191/0x620 [ 67.790649][ T8455] tomoyo_path_perm+0x21b/0x400 [ 67.795530][ T8455] security_inode_getattr+0xcf/0x140 [ 67.800807][ T8455] vfs_statx+0x164/0x390 [ 67.805067][ T8455] __do_sys_newlstat+0x91/0x110 [ 67.809909][ T8455] do_syscall_64+0x3a/0xb0 [ 67.814316][ T8455] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 67.820202][ T8455] [ 67.822509][ T8455] The buggy address belongs to the object at ffff88801d2c8000 [ 67.822509][ T8455] which belongs to the cache kmalloc-4k of size 4096 [ 67.836731][ T8455] The buggy address is located 4 bytes inside of [ 67.836731][ T8455] 4096-byte region [ffff88801d2c8000, ffff88801d2c9000) [ 67.849953][ T8455] The buggy address belongs to the page: [ 67.855669][ T8455] page:ffffea000074b200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1d2c8 [ 67.865828][ T8455] head:ffffea000074b200 order:3 compound_mapcount:0 compound_pincount:0 [ 67.874157][ T8455] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 67.882147][ T8455] raw: 00fff00000010200 0000000000000000 0000000400000001 ffff888011042140 [ 67.890714][ T8455] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 [ 67.899274][ T8455] page dumped because: kasan: bad access detected [ 67.905700][ T8455] [ 67.908003][ T8455] Memory state around the buggy address: [ 67.913608][ T8455] ffff88801d2c7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 67.921661][ T8455] ffff88801d2c7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 67.929699][ T8455] >ffff88801d2c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.937738][ T8455] ^ [ 67.941781][ T8455] ffff88801d2c8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.949857][ T8455] ffff88801d2c8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.957901][ T8455] ================================================================== [ 67.965938][ T8455] Disabling lock debugging due to kernel taint [ 67.975299][ T8455] Kernel panic - not syncing: panic_on_warn set ... [ 67.981892][ T8455] CPU: 0 PID: 8455 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 67.993455][ T8455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.003552][ T8455] Call Trace: [ 68.006834][ T8455] dump_stack+0x141/0x1d7 [ 68.011151][ T8455] panic+0x306/0x73d [ 68.015029][ T8455] ? __warn_printk+0xf3/0xf3 [ 68.019599][ T8455] ? preempt_schedule_common+0x59/0xc0 [ 68.025041][ T8455] ? __skb_datagram_iter+0x6b8/0x770 [ 68.030307][ T8455] ? preempt_schedule_thunk+0x16/0x18 [ 68.035658][ T8455] ? trace_hardirqs_on+0x38/0x1c0 [ 68.040663][ T8455] ? trace_hardirqs_on+0x51/0x1c0 [ 68.045705][ T8455] ? __skb_datagram_iter+0x6b8/0x770 [ 68.050999][ T8455] ? __skb_datagram_iter+0x6b8/0x770 [ 68.056291][ T8455] end_report.cold+0x5a/0x5a [ 68.060874][ T8455] kasan_report.cold+0x6a/0xd8 [ 68.065622][ T8455] ? __skb_datagram_iter+0x6b8/0x770 [ 68.070889][ T8455] __skb_datagram_iter+0x6b8/0x770 [ 68.075992][ T8455] ? zerocopy_sg_from_iter+0x110/0x110 [ 68.081434][ T8455] skb_copy_datagram_iter+0x40/0x50 [ 68.086626][ T8455] tcp_recvmsg_locked+0x1048/0x22f0 [ 68.091821][ T8455] ? tcp_splice_read+0x8b0/0x8b0 [ 68.096745][ T8455] ? mark_held_locks+0x9f/0xe0 [ 68.101505][ T8455] ? __local_bh_enable_ip+0xa0/0x120 [ 68.106783][ T8455] tcp_recvmsg+0x134/0x550 [ 68.111182][ T8455] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 68.116537][ T8455] ? aa_sk_perm+0x311/0xab0 [ 68.121020][ T8455] inet_recvmsg+0x11b/0x5e0 [ 68.125509][ T8455] ? inet_sendpage+0x140/0x140 [ 68.130254][ T8455] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.136490][ T8455] ? security_socket_recvmsg+0x8f/0xc0 [ 68.141941][ T8455] sock_read_iter+0x33c/0x470 [ 68.146604][ T8455] ? ____sys_recvmsg+0x600/0x600 [ 68.151525][ T8455] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.157746][ T8455] ? fsnotify+0xa58/0x1060 [ 68.162152][ T8455] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.168376][ T8455] new_sync_read+0x5b7/0x6e0 [ 68.172973][ T8455] ? ksys_lseek+0x1b0/0x1b0 [ 68.177454][ T8455] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 68.183419][ T8455] vfs_read+0x35c/0x570 [ 68.187554][ T8455] ksys_read+0x1ee/0x250 [ 68.191774][ T8455] ? vfs_write+0xa40/0xa40 [ 68.196168][ T8455] ? syscall_enter_from_user_mode+0x27/0x70 [ 68.202041][ T8455] do_syscall_64+0x3a/0xb0 [ 68.206438][ T8455] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.212312][ T8455] RIP: 0033:0x4af19b [ 68.216187][ T8455] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 68.235774][ T8455] RSP: 002b:000000c000311868 EFLAGS: 00000216 ORIG_RAX: 0000000000000000 [ 68.244168][ T8455] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 68.252118][ T8455] RDX: 0000000000001000 RSI: 000000c0001a4000 RDI: 0000000000000006 [ 68.260101][ T8455] RBP: 000000c0003118b8 R08: 0000000000000001 R09: 0000000000000002 [ 68.268071][ T8455] R10: 0000000000005c6e R11: 0000000000000216 R12: 0000000000005c69 [ 68.276022][ T8455] R13: 0000000000002000 R14: 0000000000000002 R15: 0000000000000002 [ 68.284700][ T8455] Kernel Offset: disabled [ 68.289008][ T8455] Rebooting in 86400 seconds..