Warning: Permanently added '10.128.1.93' (ECDSA) to the list of known hosts. 2021/05/03 03:44:30 fuzzer started 2021/05/03 03:44:31 dialing manager at 10.128.0.169:44661 2021/05/03 03:44:31 syscalls: 3571 2021/05/03 03:44:31 code coverage: enabled 2021/05/03 03:44:31 comparison tracing: enabled 2021/05/03 03:44:31 extra coverage: enabled 2021/05/03 03:44:31 setuid sandbox: enabled 2021/05/03 03:44:31 namespace sandbox: enabled 2021/05/03 03:44:31 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/03 03:44:31 fault injection: enabled 2021/05/03 03:44:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/03 03:44:31 net packet injection: enabled 2021/05/03 03:44:31 net device setup: enabled 2021/05/03 03:44:31 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/03 03:44:31 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/03 03:44:31 USB emulation: enabled 2021/05/03 03:44:31 hci packet injection: enabled 2021/05/03 03:44:31 wifi device emulation: enabled 2021/05/03 03:44:31 802.15.4 emulation: enabled 2021/05/03 03:44:31 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/03 03:44:31 fetching corpus: 50, signal 51629/55366 (executing program) 2021/05/03 03:44:31 fetching corpus: 100, signal 88237/93543 (executing program) syzkaller login: [ 68.503730][ T8423] ================================================================== [ 68.512195][ T8423] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 68.519838][ T8423] Read of size 4 at addr ffff888028708004 by task syz-fuzzer/8423 [ 68.527718][ T8423] [ 68.530030][ T8423] CPU: 0 PID: 8423 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 68.539572][ T8423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.549638][ T8423] Call Trace: [ 68.552935][ T8423] dump_stack+0x141/0x1d7 [ 68.557436][ T8423] ? __skb_datagram_iter+0x6b8/0x770 [ 68.562722][ T8423] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 68.569778][ T8423] ? __skb_datagram_iter+0x6b8/0x770 [ 68.575173][ T8423] ? __skb_datagram_iter+0x6b8/0x770 [ 68.580449][ T8423] kasan_report.cold+0x7c/0xd8 [ 68.585206][ T8423] ? __skb_datagram_iter+0x6b8/0x770 [ 68.590481][ T8423] __skb_datagram_iter+0x6b8/0x770 [ 68.595584][ T8423] ? zerocopy_sg_from_iter+0x110/0x110 [ 68.601088][ T8423] skb_copy_datagram_iter+0x40/0x50 [ 68.606272][ T8423] tcp_recvmsg_locked+0x1048/0x22f0 [ 68.611474][ T8423] ? tcp_splice_read+0x8b0/0x8b0 [ 68.616401][ T8423] ? mark_held_locks+0x9f/0xe0 [ 68.621167][ T8423] ? __local_bh_enable_ip+0xa0/0x120 [ 68.626441][ T8423] tcp_recvmsg+0x134/0x550 [ 68.630863][ T8423] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 68.636231][ T8423] ? aa_sk_perm+0x311/0xab0 [ 68.640738][ T8423] inet_recvmsg+0x11b/0x5e0 [ 68.645247][ T8423] ? inet_sendpage+0x140/0x140 [ 68.650015][ T8423] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.656245][ T8423] ? security_socket_recvmsg+0x8f/0xc0 [ 68.661709][ T8423] sock_read_iter+0x33c/0x470 [ 68.666396][ T8423] ? ____sys_recvmsg+0x600/0x600 [ 68.671382][ T8423] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.677743][ T8423] ? fsnotify+0xa58/0x1060 [ 68.682156][ T8423] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.688405][ T8423] new_sync_read+0x5b7/0x6e0 [ 68.692998][ T8423] ? ksys_lseek+0x1b0/0x1b0 [ 68.697499][ T8423] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 68.703494][ T8423] vfs_read+0x35c/0x570 [ 68.707637][ T8423] ksys_read+0x1ee/0x250 [ 68.711879][ T8423] ? vfs_write+0xa40/0xa40 [ 68.716350][ T8423] ? syscall_enter_from_user_mode+0x27/0x70 [ 68.722230][ T8423] do_syscall_64+0x3a/0xb0 [ 68.726632][ T8423] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.732530][ T8423] RIP: 0033:0x4af19b [ 68.736412][ T8423] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 68.756001][ T8423] RSP: 002b:000000c0003a7828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 68.764400][ T8423] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 68.772359][ T8423] RDX: 0000000000001000 RSI: 000000c000072000 RDI: 0000000000000006 [ 68.780328][ T8423] RBP: 000000c0003a7878 R08: 0000000000000001 R09: 0000000000000002 [ 68.788290][ T8423] R10: 0000000000002365 R11: 0000000000000212 R12: 0000000000002361 [ 68.796253][ T8423] R13: 0000000000000200 R14: 0000000000000020 R15: 0000000000000004 [ 68.804237][ T8423] [ 68.806552][ T8423] Allocated by task 1: [ 68.810599][ T8423] kasan_save_stack+0x1b/0x40 [ 68.816138][ T8423] __kasan_slab_alloc+0x84/0xa0 [ 68.820988][ T8423] kmem_cache_alloc+0x219/0x3a0 [ 68.825822][ T8423] getname_flags.part.0+0x50/0x4f0 [ 68.831095][ T8423] getname+0x8e/0xd0 [ 68.834976][ T8423] do_sys_openat2+0xf5/0x420 [ 68.839547][ T8423] __x64_sys_open+0x119/0x1c0 [ 68.844205][ T8423] do_syscall_64+0x3a/0xb0 [ 68.848623][ T8423] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.854502][ T8423] [ 68.856807][ T8423] Freed by task 12366: [ 68.860853][ T8423] kasan_save_stack+0x1b/0x40 [ 68.865539][ T8423] kasan_set_track+0x1c/0x30 [ 68.870133][ T8423] kasan_set_free_info+0x20/0x30 [ 68.875071][ T8423] __kasan_slab_free+0xfb/0x130 [ 68.879902][ T8423] slab_free_freelist_hook+0xdf/0x240 [ 68.885259][ T8423] kmem_cache_free+0x97/0x750 [ 68.889921][ T8423] putname+0xe1/0x120 [ 68.893888][ T8423] do_sys_openat2+0x153/0x420 [ 68.898560][ T8423] __x64_sys_open+0x119/0x1c0 [ 68.903218][ T8423] do_syscall_64+0x3a/0xb0 [ 68.907620][ T8423] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.913497][ T8423] [ 68.915818][ T8423] The buggy address belongs to the object at ffff888028708000 [ 68.915818][ T8423] which belongs to the cache names_cache of size 4096 [ 68.929939][ T8423] The buggy address is located 4 bytes inside of [ 68.929939][ T8423] 4096-byte region [ffff888028708000, ffff888028709000) [ 68.943570][ T8423] The buggy address belongs to the page: [ 68.949188][ T8423] page:ffffea0000a1c200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x28708 [ 68.959319][ T8423] head:ffffea0000a1c200 order:3 compound_mapcount:0 compound_pincount:0 [ 68.967633][ T8423] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 68.975601][ T8423] raw: 00fff00000010200 dead000000000100 dead000000000122 ffff8880111be280 [ 68.984181][ T8423] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 68.992761][ T8423] page dumped because: kasan: bad access detected [ 68.999151][ T8423] [ 69.001454][ T8423] Memory state around the buggy address: [ 69.007076][ T8423] ffff888028707f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 69.015127][ T8423] ffff888028707f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 69.023170][ T8423] >ffff888028708000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.031213][ T8423] ^ [ 69.035278][ T8423] ffff888028708080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.043504][ T8423] ffff888028708100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.051573][ T8423] ================================================================== [ 69.059757][ T8423] Disabling lock debugging due to kernel taint [ 69.068450][ T8423] Kernel panic - not syncing: panic_on_warn set ... [ 69.075059][ T8423] CPU: 0 PID: 8423 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 69.086095][ T8423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.096253][ T8423] Call Trace: [ 69.100535][ T8423] dump_stack+0x141/0x1d7 [ 69.104887][ T8423] panic+0x306/0x73d [ 69.108850][ T8423] ? __warn_printk+0xf3/0xf3 [ 69.113431][ T8423] ? preempt_schedule_common+0x59/0xc0 [ 69.118915][ T8423] ? __skb_datagram_iter+0x6b8/0x770 [ 69.124362][ T8423] ? preempt_schedule_thunk+0x16/0x18 [ 69.129731][ T8423] ? trace_hardirqs_on+0x38/0x1c0 [ 69.134762][ T8423] ? trace_hardirqs_on+0x51/0x1c0 [ 69.139768][ T8423] ? __skb_datagram_iter+0x6b8/0x770 [ 69.145036][ T8423] ? __skb_datagram_iter+0x6b8/0x770 [ 69.150303][ T8423] end_report.cold+0x5a/0x5a [ 69.155056][ T8423] kasan_report.cold+0x6a/0xd8 [ 69.159805][ T8423] ? __skb_datagram_iter+0x6b8/0x770 [ 69.165078][ T8423] __skb_datagram_iter+0x6b8/0x770 [ 69.170173][ T8423] ? zerocopy_sg_from_iter+0x110/0x110 [ 69.175630][ T8423] skb_copy_datagram_iter+0x40/0x50 [ 69.180825][ T8423] tcp_recvmsg_locked+0x1048/0x22f0 [ 69.186028][ T8423] ? tcp_splice_read+0x8b0/0x8b0 [ 69.190966][ T8423] ? mark_held_locks+0x9f/0xe0 [ 69.195731][ T8423] ? __local_bh_enable_ip+0xa0/0x120 [ 69.200999][ T8423] tcp_recvmsg+0x134/0x550 [ 69.205398][ T8423] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 69.210754][ T8423] ? aa_sk_perm+0x311/0xab0 [ 69.215242][ T8423] inet_recvmsg+0x11b/0x5e0 [ 69.219731][ T8423] ? inet_sendpage+0x140/0x140 [ 69.224480][ T8423] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 69.230721][ T8423] ? security_socket_recvmsg+0x8f/0xc0 [ 69.236356][ T8423] sock_read_iter+0x33c/0x470 [ 69.241017][ T8423] ? ____sys_recvmsg+0x600/0x600 [ 69.245939][ T8423] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 69.252168][ T8423] ? fsnotify+0xa58/0x1060 [ 69.256568][ T8423] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 69.262793][ T8423] new_sync_read+0x5b7/0x6e0 [ 69.267369][ T8423] ? ksys_lseek+0x1b0/0x1b0 [ 69.271868][ T8423] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 69.277837][ T8423] vfs_read+0x35c/0x570 [ 69.282007][ T8423] ksys_read+0x1ee/0x250 [ 69.286247][ T8423] ? vfs_write+0xa40/0xa40 [ 69.290677][ T8423] ? syscall_enter_from_user_mode+0x27/0x70 [ 69.296588][ T8423] do_syscall_64+0x3a/0xb0 [ 69.301019][ T8423] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 69.306896][ T8423] RIP: 0033:0x4af19b [ 69.310773][ T8423] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 69.330449][ T8423] RSP: 002b:000000c0003a7828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 69.338844][ T8423] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 69.346796][ T8423] RDX: 0000000000001000 RSI: 000000c000072000 RDI: 0000000000000006 [ 69.355274][ T8423] RBP: 000000c0003a7878 R08: 0000000000000001 R09: 0000000000000002 [ 69.363241][ T8423] R10: 0000000000002365 R11: 0000000000000212 R12: 0000000000002361 [ 69.371194][ T8423] R13: 0000000000000200 R14: 0000000000000020 R15: 0000000000000004 [ 69.379941][ T8423] Kernel Offset: disabled [ 69.384434][ T8423] Rebooting in 86400 seconds..