Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.118' (ECDSA) to the list of known hosts. 2021/05/02 19:53:33 fuzzer started 2021/05/02 19:53:33 dialing manager at 10.128.0.169:44661 2021/05/02 19:53:34 syscalls: 3571 2021/05/02 19:53:34 code coverage: enabled 2021/05/02 19:53:34 comparison tracing: enabled 2021/05/02 19:53:34 extra coverage: enabled 2021/05/02 19:53:34 setuid sandbox: enabled 2021/05/02 19:53:34 namespace sandbox: enabled 2021/05/02 19:53:34 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/02 19:53:34 fault injection: enabled 2021/05/02 19:53:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/02 19:53:34 net packet injection: enabled 2021/05/02 19:53:34 net device setup: enabled 2021/05/02 19:53:34 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/02 19:53:34 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/02 19:53:34 USB emulation: enabled 2021/05/02 19:53:34 hci packet injection: enabled 2021/05/02 19:53:34 wifi device emulation: enabled 2021/05/02 19:53:34 802.15.4 emulation: enabled 2021/05/02 19:53:34 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/02 19:53:34 fetching corpus: 50, signal 61821/65519 (executing program) 2021/05/02 19:53:34 fetching corpus: 100, signal 87012/92349 (executing program) 2021/05/02 19:53:34 fetching corpus: 150, signal 118207/124986 (executing program) 2021/05/02 19:53:34 fetching corpus: 200, signal 135234/143472 (executing program) 2021/05/02 19:53:35 fetching corpus: 250, signal 155737/165292 (executing program) 2021/05/02 19:53:35 fetching corpus: 300, signal 165370/176354 (executing program) 2021/05/02 19:53:35 fetching corpus: 350, signal 179616/191900 (executing program) 2021/05/02 19:53:35 fetching corpus: 400, signal 193493/206983 (executing program) syzkaller login: [ 74.725717][ T8452] ================================================================== [ 74.734078][ T8452] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 74.742254][ T8452] Read of size 4 at addr ffff88802f010004 by task syz-fuzzer/8452 [ 74.750869][ T8452] [ 74.753201][ T8452] CPU: 0 PID: 8452 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 74.762742][ T8452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.772808][ T8452] Call Trace: [ 74.776089][ T8452] dump_stack+0x141/0x1d7 [ 74.780436][ T8452] ? __skb_datagram_iter+0x6b8/0x770 [ 74.785741][ T8452] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 74.792805][ T8452] ? __skb_datagram_iter+0x6b8/0x770 [ 74.798090][ T8452] ? __skb_datagram_iter+0x6b8/0x770 [ 74.803369][ T8452] kasan_report.cold+0x7c/0xd8 [ 74.808138][ T8452] ? __skb_datagram_iter+0x6b8/0x770 [ 74.813436][ T8452] __skb_datagram_iter+0x6b8/0x770 [ 74.818560][ T8452] ? zerocopy_sg_from_iter+0x110/0x110 [ 74.825120][ T8452] skb_copy_datagram_iter+0x40/0x50 [ 74.831251][ T8452] tcp_recvmsg_locked+0x1048/0x22f0 [ 74.836557][ T8452] ? tcp_splice_read+0x8b0/0x8b0 [ 74.841686][ T8452] ? mark_held_locks+0x9f/0xe0 [ 74.846509][ T8452] ? __local_bh_enable_ip+0xa0/0x120 [ 74.851913][ T8452] tcp_recvmsg+0x134/0x550 [ 74.856355][ T8452] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 74.861754][ T8452] ? aa_sk_perm+0x311/0xab0 [ 74.866298][ T8452] inet_recvmsg+0x11b/0x5e0 [ 74.870844][ T8452] ? inet_sendpage+0x140/0x140 [ 74.875715][ T8452] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.882249][ T8452] ? security_socket_recvmsg+0x8f/0xc0 [ 74.887733][ T8452] sock_read_iter+0x33c/0x470 [ 74.893023][ T8452] ? ____sys_recvmsg+0x600/0x600 [ 74.897977][ T8452] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.904248][ T8452] ? fsnotify+0xa58/0x1060 [ 74.908948][ T8452] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.915731][ T8452] new_sync_read+0x5b7/0x6e0 [ 74.920415][ T8452] ? ksys_lseek+0x1b0/0x1b0 [ 74.924918][ T8452] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 74.930911][ T8452] vfs_read+0x35c/0x570 [ 74.935100][ T8452] ksys_read+0x1ee/0x250 [ 74.939355][ T8452] ? vfs_write+0xa40/0xa40 [ 74.943774][ T8452] ? syscall_enter_from_user_mode+0x27/0x70 [ 74.949709][ T8452] do_syscall_64+0x3a/0xb0 [ 74.954142][ T8452] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.960052][ T8452] RIP: 0033:0x4af19b [ 74.963963][ T8452] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 74.983630][ T8452] RSP: 002b:000000c00003b828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 74.992140][ T8452] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 75.000145][ T8452] RDX: 0000000000001000 RSI: 000000c00017a000 RDI: 0000000000000006 [ 75.008141][ T8452] RBP: 000000c00003b878 R08: 0000000000000001 R09: 0000000000000002 [ 75.016982][ T8452] R10: 0000000000004e85 R11: 0000000000000212 R12: 0000000000004e81 [ 75.025098][ T8452] R13: 0000000000000200 R14: 0000000000000004 R15: 0000000000000004 [ 75.033094][ T8452] [ 75.035416][ T8452] The buggy address belongs to the page: [ 75.041046][ T8452] page:ffffea0000bc0400 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x2f010 [ 75.051476][ T8452] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 75.058622][ T8452] raw: 00fff00000000000 ffffea0000bc0008 ffff88813fffb978 0000000000000000 [ 75.067232][ T8452] raw: 0000000000000000 0000000000000003 00000000ffffff7f 0000000000000000 [ 75.075839][ T8452] page dumped because: kasan: bad access detected [ 75.082345][ T8452] [ 75.084673][ T8452] Memory state around the buggy address: [ 75.090309][ T8452] ffff88802f00ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.098386][ T8452] ffff88802f00ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.107077][ T8452] >ffff88802f010000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.115138][ T8452] ^ [ 75.119211][ T8452] ffff88802f010080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.127276][ T8452] ffff88802f010100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.135455][ T8452] ================================================================== [ 75.143948][ T8452] Disabling lock debugging due to kernel taint [ 75.151941][ T8452] Kernel panic - not syncing: panic_on_warn set ... [ 75.158540][ T8452] CPU: 0 PID: 8452 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 75.169493][ T8452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.179573][ T8452] Call Trace: [ 75.182845][ T8452] dump_stack+0x141/0x1d7 [ 75.187184][ T8452] panic+0x306/0x73d [ 75.191083][ T8452] ? __warn_printk+0xf3/0xf3 [ 75.195662][ T8452] ? preempt_schedule_common+0x59/0xc0 [ 75.201131][ T8452] ? __skb_datagram_iter+0x6b8/0x770 [ 75.207025][ T8452] ? preempt_schedule_thunk+0x16/0x18 [ 75.212411][ T8452] ? trace_hardirqs_on+0x38/0x1c0 [ 75.217449][ T8452] ? trace_hardirqs_on+0x51/0x1c0 [ 75.222487][ T8452] ? __skb_datagram_iter+0x6b8/0x770 [ 75.227799][ T8452] ? __skb_datagram_iter+0x6b8/0x770 [ 75.233088][ T8452] end_report.cold+0x5a/0x5a [ 75.237698][ T8452] kasan_report.cold+0x6a/0xd8 [ 75.242477][ T8452] ? __skb_datagram_iter+0x6b8/0x770 [ 75.247773][ T8452] __skb_datagram_iter+0x6b8/0x770 [ 75.252886][ T8452] ? zerocopy_sg_from_iter+0x110/0x110 [ 75.258400][ T8452] skb_copy_datagram_iter+0x40/0x50 [ 75.263612][ T8452] tcp_recvmsg_locked+0x1048/0x22f0 [ 75.268833][ T8452] ? tcp_splice_read+0x8b0/0x8b0 [ 75.273785][ T8452] ? mark_held_locks+0x9f/0xe0 [ 75.278560][ T8452] ? __local_bh_enable_ip+0xa0/0x120 [ 75.284028][ T8452] tcp_recvmsg+0x134/0x550 [ 75.288541][ T8452] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 75.293941][ T8452] ? aa_sk_perm+0x311/0xab0 [ 75.298448][ T8452] inet_recvmsg+0x11b/0x5e0 [ 75.302974][ T8452] ? inet_sendpage+0x140/0x140 [ 75.308256][ T8452] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.314505][ T8452] ? security_socket_recvmsg+0x8f/0xc0 [ 75.319967][ T8452] sock_read_iter+0x33c/0x470 [ 75.324658][ T8452] ? ____sys_recvmsg+0x600/0x600 [ 75.329592][ T8452] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.335847][ T8452] ? fsnotify+0xa58/0x1060 [ 75.340290][ T8452] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.346535][ T8452] new_sync_read+0x5b7/0x6e0 [ 75.351121][ T8452] ? ksys_lseek+0x1b0/0x1b0 [ 75.355614][ T8452] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 75.361614][ T8452] vfs_read+0x35c/0x570 [ 75.365779][ T8452] ksys_read+0x1ee/0x250 [ 75.370020][ T8452] ? vfs_write+0xa40/0xa40 [ 75.374432][ T8452] ? syscall_enter_from_user_mode+0x27/0x70 [ 75.380369][ T8452] do_syscall_64+0x3a/0xb0 [ 75.384867][ T8452] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 75.390801][ T8452] RIP: 0033:0x4af19b [ 75.394712][ T8452] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 75.414449][ T8452] RSP: 002b:000000c00003b828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 75.422862][ T8452] RAX: ffffffffffffffda RBX: 000000c00001e800 RCX: 00000000004af19b [ 75.430854][ T8452] RDX: 0000000000001000 RSI: 000000c00017a000 RDI: 0000000000000006 [ 75.438847][ T8452] RBP: 000000c00003b878 R08: 0000000000000001 R09: 0000000000000002 [ 75.446820][ T8452] R10: 0000000000004e85 R11: 0000000000000212 R12: 0000000000004e81 [ 75.454803][ T8452] R13: 0000000000000200 R14: 0000000000000004 R15: 0000000000000004 [ 75.463375][ T8452] Kernel Offset: disabled [ 75.467722][ T8452] Rebooting in 86400 seconds..