Warning: Permanently added '10.128.1.37' (ECDSA) to the list of known hosts. 2021/05/01 09:33:35 fuzzer started 2021/05/01 09:33:35 dialing manager at 10.128.0.169:44661 2021/05/01 09:33:35 syscalls: 3571 2021/05/01 09:33:35 code coverage: enabled 2021/05/01 09:33:35 comparison tracing: enabled 2021/05/01 09:33:35 extra coverage: enabled 2021/05/01 09:33:35 setuid sandbox: enabled 2021/05/01 09:33:35 namespace sandbox: enabled 2021/05/01 09:33:35 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/01 09:33:35 fault injection: enabled 2021/05/01 09:33:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/01 09:33:35 net packet injection: enabled 2021/05/01 09:33:35 net device setup: enabled 2021/05/01 09:33:35 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/01 09:33:35 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/01 09:33:35 USB emulation: enabled 2021/05/01 09:33:35 hci packet injection: enabled 2021/05/01 09:33:35 wifi device emulation: enabled 2021/05/01 09:33:35 802.15.4 emulation: enabled 2021/05/01 09:33:35 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/01 09:33:35 fetching corpus: 50, signal 55597/59302 (executing program) 2021/05/01 09:33:36 fetching corpus: 100, signal 92133/97419 (executing program) 2021/05/01 09:33:36 fetching corpus: 150, signal 115912/122700 (executing program) 2021/05/01 09:33:36 fetching corpus: 200, signal 138100/146329 (executing program) 2021/05/01 09:33:36 fetching corpus: 250, signal 155470/165075 (executing program) 2021/05/01 09:33:36 fetching corpus: 300, signal 174658/185544 (executing program) 2021/05/01 09:33:36 fetching corpus: 350, signal 184991/197195 (executing program) 2021/05/01 09:33:36 fetching corpus: 400, signal 198165/211566 (executing program) 2021/05/01 09:33:37 fetching corpus: 450, signal 206122/220806 (executing program) [ 68.132286][ T8430] ================================================================== [ 68.140537][ T8430] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 68.148182][ T8430] Read of size 4 at addr ffff88802e910004 by task syz-fuzzer/8430 [ 68.155977][ T8430] [ 68.158291][ T8430] CPU: 0 PID: 8430 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 68.167821][ T8430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.177865][ T8430] Call Trace: [ 68.181141][ T8430] dump_stack+0x141/0x1d7 [ 68.185481][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 68.190756][ T8430] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 68.197877][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 68.203150][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 68.208426][ T8430] kasan_report.cold+0x7c/0xd8 [ 68.213190][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 68.218468][ T8430] __skb_datagram_iter+0x6b8/0x770 [ 68.223573][ T8430] ? zerocopy_sg_from_iter+0x110/0x110 [ 68.229025][ T8430] skb_copy_datagram_iter+0x40/0x50 [ 68.234217][ T8430] tcp_recvmsg_locked+0x1048/0x22f0 [ 68.239422][ T8430] ? tcp_splice_read+0x8b0/0x8b0 [ 68.244353][ T8430] ? mark_held_locks+0x9f/0xe0 [ 68.249115][ T8430] ? __local_bh_enable_ip+0xa0/0x120 [ 68.254396][ T8430] tcp_recvmsg+0x134/0x550 [ 68.258809][ T8430] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 68.264182][ T8430] ? aa_sk_perm+0x311/0xab0 [ 68.268685][ T8430] inet_recvmsg+0x11b/0x5e0 [ 68.273195][ T8430] ? inet_sendpage+0x140/0x140 [ 68.278112][ T8430] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.284356][ T8430] ? security_socket_recvmsg+0x8f/0xc0 [ 68.289816][ T8430] sock_read_iter+0x33c/0x470 [ 68.294494][ T8430] ? ____sys_recvmsg+0x600/0x600 [ 68.299433][ T8430] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.305690][ T8430] ? fsnotify+0xa58/0x1060 [ 68.310112][ T8430] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.316364][ T8430] new_sync_read+0x5b7/0x6e0 [ 68.320949][ T8430] ? ksys_lseek+0x1b0/0x1b0 [ 68.325443][ T8430] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 68.331436][ T8430] vfs_read+0x35c/0x570 [ 68.335587][ T8430] ksys_read+0x1ee/0x250 [ 68.339828][ T8430] ? vfs_write+0xa40/0xa40 [ 68.344239][ T8430] ? syscall_enter_from_user_mode+0x27/0x70 [ 68.350128][ T8430] do_syscall_64+0x3a/0xb0 [ 68.354544][ T8430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.360432][ T8430] RIP: 0033:0x4af19b [ 68.364326][ T8430] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 68.383923][ T8430] RSP: 002b:000000c000383828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 68.392325][ T8430] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 68.400283][ T8430] RDX: 0000000000001000 RSI: 000000c0001a4000 RDI: 0000000000000006 [ 68.408241][ T8430] RBP: 000000c000383878 R08: 0000000000000001 R09: 0000000000000002 [ 68.416210][ T8430] R10: 000000000000001d R11: 0000000000000212 R12: 0000000000b97a20 [ 68.424190][ T8430] R13: ffffffffffffffff R14: 0000000000000004 R15: 0000000000000004 [ 68.432252][ T8430] [ 68.434561][ T8430] The buggy address belongs to the page: [ 68.440173][ T8430] page:ffffea0000ba4400 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x2e910 [ 68.450575][ T8430] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 68.457695][ T8430] raw: 00fff00000000000 ffffea0000ba3a08 ffffea0000ba4008 0000000000000000 [ 68.466263][ T8430] raw: 0000000000000000 0000000000000003 00000000ffffff7f 0000000000000000 [ 68.474825][ T8430] page dumped because: kasan: bad access detected [ 68.481218][ T8430] [ 68.483526][ T8430] Memory state around the buggy address: [ 68.489138][ T8430] ffff88802e90ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.497182][ T8430] ffff88802e90ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.505234][ T8430] >ffff88802e910000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.513275][ T8430] ^ [ 68.517324][ T8430] ffff88802e910080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.525379][ T8430] ffff88802e910100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.533419][ T8430] ================================================================== [ 68.541459][ T8430] Disabling lock debugging due to kernel taint [ 68.548419][ T8430] Kernel panic - not syncing: panic_on_warn set ... [ 68.555003][ T8430] CPU: 0 PID: 8430 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 68.566024][ T8430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.576065][ T8430] Call Trace: [ 68.579329][ T8430] dump_stack+0x141/0x1d7 [ 68.583654][ T8430] panic+0x306/0x73d [ 68.587540][ T8430] ? __warn_printk+0xf3/0xf3 [ 68.592120][ T8430] ? preempt_schedule_common+0x59/0xc0 [ 68.597583][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 68.602853][ T8430] ? preempt_schedule_thunk+0x16/0x18 [ 68.608212][ T8430] ? trace_hardirqs_on+0x38/0x1c0 [ 68.613222][ T8430] ? trace_hardirqs_on+0x51/0x1c0 [ 68.618229][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 68.623501][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 68.628772][ T8430] end_report.cold+0x5a/0x5a [ 68.633349][ T8430] kasan_report.cold+0x6a/0xd8 [ 68.638103][ T8430] ? __skb_datagram_iter+0x6b8/0x770 [ 68.643377][ T8430] __skb_datagram_iter+0x6b8/0x770 [ 68.648481][ T8430] ? zerocopy_sg_from_iter+0x110/0x110 [ 68.653941][ T8430] skb_copy_datagram_iter+0x40/0x50 [ 68.659124][ T8430] tcp_recvmsg_locked+0x1048/0x22f0 [ 68.664313][ T8430] ? tcp_splice_read+0x8b0/0x8b0 [ 68.669324][ T8430] ? mark_held_locks+0x9f/0xe0 [ 68.674077][ T8430] ? __local_bh_enable_ip+0xa0/0x120 [ 68.679354][ T8430] tcp_recvmsg+0x134/0x550 [ 68.683758][ T8430] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 68.689121][ T8430] ? aa_sk_perm+0x311/0xab0 [ 68.693611][ T8430] inet_recvmsg+0x11b/0x5e0 [ 68.698103][ T8430] ? inet_sendpage+0x140/0x140 [ 68.702858][ T8430] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.709088][ T8430] ? security_socket_recvmsg+0x8f/0xc0 [ 68.714534][ T8430] sock_read_iter+0x33c/0x470 [ 68.719204][ T8430] ? ____sys_recvmsg+0x600/0x600 [ 68.724132][ T8430] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.730369][ T8430] ? fsnotify+0xa58/0x1060 [ 68.734802][ T8430] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.741038][ T8430] new_sync_read+0x5b7/0x6e0 [ 68.745625][ T8430] ? ksys_lseek+0x1b0/0x1b0 [ 68.750120][ T8430] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 68.756100][ T8430] vfs_read+0x35c/0x570 [ 68.760257][ T8430] ksys_read+0x1ee/0x250 [ 68.764486][ T8430] ? vfs_write+0xa40/0xa40 [ 68.768892][ T8430] ? syscall_enter_from_user_mode+0x27/0x70 [ 68.774773][ T8430] do_syscall_64+0x3a/0xb0 [ 68.779192][ T8430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.785077][ T8430] RIP: 0033:0x4af19b [ 68.788980][ T8430] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 68.808572][ T8430] RSP: 002b:000000c000383828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 68.816969][ T8430] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 68.824924][ T8430] RDX: 0000000000001000 RSI: 000000c0001a4000 RDI: 0000000000000006 [ 68.832876][ T8430] RBP: 000000c000383878 R08: 0000000000000001 R09: 0000000000000002 [ 68.840830][ T8430] R10: 000000000000001d R11: 0000000000000212 R12: 0000000000b97a20 [ 68.848782][ T8430] R13: ffffffffffffffff R14: 0000000000000004 R15: 0000000000000004 [ 68.857311][ T8430] Kernel Offset: disabled [ 68.861650][ T8430] Rebooting in 86400 seconds..