Warning: Permanently added '10.128.0.83' (ECDSA) to the list of known hosts. 2021/05/01 15:09:40 fuzzer started 2021/05/01 15:09:40 dialing manager at 10.128.0.169:44661 2021/05/01 15:09:40 syscalls: 3571 2021/05/01 15:09:40 code coverage: enabled 2021/05/01 15:09:40 comparison tracing: enabled 2021/05/01 15:09:40 extra coverage: enabled 2021/05/01 15:09:40 setuid sandbox: enabled 2021/05/01 15:09:40 namespace sandbox: enabled 2021/05/01 15:09:40 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/01 15:09:40 fault injection: enabled 2021/05/01 15:09:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/01 15:09:40 net packet injection: enabled 2021/05/01 15:09:40 net device setup: enabled 2021/05/01 15:09:40 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/01 15:09:40 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/01 15:09:40 USB emulation: enabled 2021/05/01 15:09:40 hci packet injection: enabled 2021/05/01 15:09:40 wifi device emulation: enabled 2021/05/01 15:09:40 802.15.4 emulation: enabled 2021/05/01 15:09:40 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/01 15:09:40 fetching corpus: 50, signal 47668/51424 (executing program) 2021/05/01 15:09:41 fetching corpus: 100, signal 80076/85461 (executing program) 2021/05/01 15:09:41 fetching corpus: 150, signal 109614/116519 (executing program) 2021/05/01 15:09:41 fetching corpus: 200, signal 127456/135843 (executing program) 2021/05/01 15:09:41 fetching corpus: 250, signal 148749/158498 (executing program) syzkaller login: [ 75.654613][ T8443] ================================================================== [ 75.663060][ T8443] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 75.670718][ T8443] Read of size 4 at addr ffff88802e830004 by task syz-fuzzer/8443 [ 75.678539][ T8443] [ 75.680857][ T8443] CPU: 1 PID: 8443 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 75.690389][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.700695][ T8443] Call Trace: [ 75.703972][ T8443] dump_stack+0x141/0x1d7 [ 75.708315][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 75.713616][ T8443] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 75.720639][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 75.725916][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 75.731541][ T8443] kasan_report.cold+0x7c/0xd8 [ 75.736301][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 75.741582][ T8443] __skb_datagram_iter+0x6b8/0x770 [ 75.746710][ T8443] ? zerocopy_sg_from_iter+0x110/0x110 [ 75.752196][ T8443] skb_copy_datagram_iter+0x40/0x50 [ 75.757426][ T8443] tcp_recvmsg_locked+0x1048/0x22f0 [ 75.762674][ T8443] ? tcp_splice_read+0x8b0/0x8b0 [ 75.767637][ T8443] ? mark_held_locks+0x9f/0xe0 [ 75.772405][ T8443] ? __local_bh_enable_ip+0xa0/0x120 [ 75.777693][ T8443] tcp_recvmsg+0x134/0x550 [ 75.782107][ T8443] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 75.787514][ T8443] ? aa_sk_perm+0x311/0xab0 [ 75.792034][ T8443] inet_recvmsg+0x11b/0x5e0 [ 75.796547][ T8443] ? inet_sendpage+0x140/0x140 [ 75.801334][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.807662][ T8443] ? security_socket_recvmsg+0x8f/0xc0 [ 75.813123][ T8443] sock_read_iter+0x33c/0x470 [ 75.817805][ T8443] ? ____sys_recvmsg+0x600/0x600 [ 75.822768][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.829006][ T8443] ? fsnotify+0xa58/0x1060 [ 75.833432][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.839703][ T8443] new_sync_read+0x5b7/0x6e0 [ 75.844336][ T8443] ? ksys_lseek+0x1b0/0x1b0 [ 75.848840][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 75.854843][ T8443] vfs_read+0x35c/0x570 [ 75.858999][ T8443] ksys_read+0x1ee/0x250 [ 75.863253][ T8443] ? vfs_write+0xa40/0xa40 [ 75.867668][ T8443] ? syscall_enter_from_user_mode+0x27/0x70 [ 75.873561][ T8443] do_syscall_64+0x3a/0xb0 [ 75.877973][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 75.883879][ T8443] RIP: 0033:0x4af19b [ 75.887781][ T8443] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 75.907557][ T8443] RSP: 002b:000000c0003c3828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 75.915982][ T8443] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 75.924050][ T8443] RDX: 0000000000001000 RSI: 000000c0001b8000 RDI: 0000000000000006 [ 75.932149][ T8443] RBP: 000000c0003c3878 R08: 0000000000000001 R09: 0000000000000002 [ 75.940121][ T8443] R10: 00000000000062d5 R11: 0000000000000212 R12: 00000000000062cf [ 75.948084][ T8443] R13: 0000000000002000 R14: 0000000000000020 R15: 0000000000000004 [ 75.956079][ T8443] [ 75.958420][ T8443] The buggy address belongs to the page: [ 75.964045][ T8443] page:ffffea0000ba0c00 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x2e830 [ 75.974474][ T8443] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 75.981605][ T8443] raw: 00fff00000000000 ffffea0000abb008 ffffea0000ba0808 0000000000000000 [ 75.990183][ T8443] raw: 0000000000000000 0000000000000003 00000000ffffff7f 0000000000000000 [ 75.999042][ T8443] page dumped because: kasan: bad access detected [ 76.005468][ T8443] [ 76.007798][ T8443] Memory state around the buggy address: [ 76.013448][ T8443] ffff88802e82ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.021532][ T8443] ffff88802e82ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.029717][ T8443] >ffff88802e830000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.037899][ T8443] ^ [ 76.041977][ T8443] ffff88802e830080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.050038][ T8443] ffff88802e830100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.058096][ T8443] ================================================================== [ 76.066163][ T8443] Disabling lock debugging due to kernel taint [ 76.074605][ T8443] Kernel panic - not syncing: panic_on_warn set ... [ 76.081234][ T8443] CPU: 0 PID: 8443 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 76.092334][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.102415][ T8443] Call Trace: [ 76.105702][ T8443] dump_stack+0x141/0x1d7 [ 76.110058][ T8443] panic+0x306/0x73d [ 76.114136][ T8443] ? __warn_printk+0xf3/0xf3 [ 76.118755][ T8443] ? preempt_schedule_common+0x59/0xc0 [ 76.124244][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 76.129535][ T8443] ? preempt_schedule_thunk+0x16/0x18 [ 76.134926][ T8443] ? trace_hardirqs_on+0x38/0x1c0 [ 76.139936][ T8443] ? trace_hardirqs_on+0x51/0x1c0 [ 76.144948][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 76.150217][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 76.155584][ T8443] end_report.cold+0x5a/0x5a [ 76.160182][ T8443] kasan_report.cold+0x6a/0xd8 [ 76.165030][ T8443] ? __skb_datagram_iter+0x6b8/0x770 [ 76.170319][ T8443] __skb_datagram_iter+0x6b8/0x770 [ 76.175621][ T8443] ? zerocopy_sg_from_iter+0x110/0x110 [ 76.181083][ T8443] skb_copy_datagram_iter+0x40/0x50 [ 76.186903][ T8443] tcp_recvmsg_locked+0x1048/0x22f0 [ 76.192120][ T8443] ? tcp_splice_read+0x8b0/0x8b0 [ 76.197063][ T8443] ? mark_held_locks+0x9f/0xe0 [ 76.201838][ T8443] ? __local_bh_enable_ip+0xa0/0x120 [ 76.207115][ T8443] tcp_recvmsg+0x134/0x550 [ 76.211515][ T8443] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 76.216871][ T8443] ? aa_sk_perm+0x311/0xab0 [ 76.221385][ T8443] inet_recvmsg+0x11b/0x5e0 [ 76.225887][ T8443] ? inet_sendpage+0x140/0x140 [ 76.230675][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 76.236909][ T8443] ? security_socket_recvmsg+0x8f/0xc0 [ 76.242358][ T8443] sock_read_iter+0x33c/0x470 [ 76.247034][ T8443] ? ____sys_recvmsg+0x600/0x600 [ 76.251967][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 76.258330][ T8443] ? fsnotify+0xa58/0x1060 [ 76.262884][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 76.269243][ T8443] new_sync_read+0x5b7/0x6e0 [ 76.273839][ T8443] ? ksys_lseek+0x1b0/0x1b0 [ 76.278371][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 76.284495][ T8443] vfs_read+0x35c/0x570 [ 76.288701][ T8443] ksys_read+0x1ee/0x250 [ 76.293070][ T8443] ? vfs_write+0xa40/0xa40 [ 76.297754][ T8443] ? syscall_enter_from_user_mode+0x27/0x70 [ 76.303750][ T8443] do_syscall_64+0x3a/0xb0 [ 76.308275][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 76.314455][ T8443] RIP: 0033:0x4af19b [ 76.318374][ T8443] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 76.337989][ T8443] RSP: 002b:000000c0003c3828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 76.346395][ T8443] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 76.354375][ T8443] RDX: 0000000000001000 RSI: 000000c0001b8000 RDI: 0000000000000006 [ 76.362329][ T8443] RBP: 000000c0003c3878 R08: 0000000000000001 R09: 0000000000000002 [ 76.370281][ T8443] R10: 00000000000062d5 R11: 0000000000000212 R12: 00000000000062cf [ 76.378273][ T8443] R13: 0000000000002000 R14: 0000000000000020 R15: 0000000000000004 [ 76.387007][ T8443] Kernel Offset: disabled [ 76.391325][ T8443] Rebooting in 86400 seconds..