Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.0.94' (ECDSA) to the list of known hosts.
2021/05/02 13:20:16 fuzzer started
2021/05/02 13:20:17 dialing manager at 10.128.0.169:44661
2021/05/02 13:20:17 syscalls: 3571
2021/05/02 13:20:17 code coverage: enabled
2021/05/02 13:20:17 comparison tracing: enabled
2021/05/02 13:20:17 extra coverage: enabled
2021/05/02 13:20:17 setuid sandbox: enabled
2021/05/02 13:20:17 namespace sandbox: enabled
2021/05/02 13:20:17 Android sandbox: /sys/fs/selinux/policy does not exist
2021/05/02 13:20:17 fault injection: enabled
2021/05/02 13:20:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2021/05/02 13:20:17 net packet injection: enabled
2021/05/02 13:20:17 net device setup: enabled
2021/05/02 13:20:17 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2021/05/02 13:20:17 devlink PCI setup: PCI device 0000:00:10.0 is not available
2021/05/02 13:20:17 USB emulation: enabled
2021/05/02 13:20:17 hci packet injection: enabled
2021/05/02 13:20:17 wifi device emulation: enabled
2021/05/02 13:20:17 802.15.4 emulation: enabled
2021/05/02 13:20:17 fetching corpus: 0, signal 0/2000 (executing program)
2021/05/02 13:20:17 fetching corpus: 50, signal 47112/50849 (executing program)
2021/05/02 13:20:17 fetching corpus: 100, signal 71217/76661 (executing program)
2021/05/02 13:20:18 fetching corpus: 150, signal 97662/104627 (executing program)
2021/05/02 13:20:18 fetching corpus: 200, signal 118261/126724 (executing program)
2021/05/02 13:20:18 fetching corpus: 250, signal 139103/148947 (executing program)
syzkaller login: [   74.772884][ T8451] ==================================================================
[   74.781168][ T8451] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770
[   74.788842][ T8451] Read of size 4 at addr ffff888030ef0004 by task syz-fuzzer/8451
[   74.796641][ T8451] 
[   74.798955][ T8451] CPU: 0 PID: 8451 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0
[   74.808495][ T8451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   74.818660][ T8451] Call Trace:
[   74.821950][ T8451]  dump_stack+0x141/0x1d7
[   74.826310][ T8451]  ? __skb_datagram_iter+0x6b8/0x770
[   74.831624][ T8451]  print_address_description.constprop.0.cold+0x5b/0x2f8
[   74.838658][ T8451]  ? __skb_datagram_iter+0x6b8/0x770
[   74.843935][ T8451]  ? __skb_datagram_iter+0x6b8/0x770
[   74.849210][ T8451]  kasan_report.cold+0x7c/0xd8
[   74.853970][ T8451]  ? __skb_datagram_iter+0x6b8/0x770
[   74.859253][ T8451]  __skb_datagram_iter+0x6b8/0x770
[   74.864373][ T8451]  ? zerocopy_sg_from_iter+0x110/0x110
[   74.869854][ T8451]  skb_copy_datagram_iter+0x40/0x50
[   74.875069][ T8451]  tcp_recvmsg_locked+0x1048/0x22f0
[   74.880312][ T8451]  ? tcp_splice_read+0x8b0/0x8b0
[   74.885263][ T8451]  ? mark_held_locks+0x9f/0xe0
[   74.890031][ T8451]  ? __local_bh_enable_ip+0xa0/0x120
[   74.895318][ T8451]  tcp_recvmsg+0x134/0x550
[   74.899736][ T8451]  ? tcp_recvmsg_locked+0x22f0/0x22f0
[   74.905111][ T8451]  ? aa_sk_perm+0x311/0xab0
[   74.909614][ T8451]  inet_recvmsg+0x11b/0x5e0
[   74.914116][ T8451]  ? inet_sendpage+0x140/0x140
[   74.918879][ T8451]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   74.925118][ T8451]  ? security_socket_recvmsg+0x8f/0xc0
[   74.930575][ T8451]  sock_read_iter+0x33c/0x470
[   74.936037][ T8451]  ? ____sys_recvmsg+0x600/0x600
[   74.940977][ T8451]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   74.947216][ T8451]  ? fsnotify+0xa58/0x1060
[   74.951628][ T8451]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   74.957868][ T8451]  new_sync_read+0x5b7/0x6e0
[   74.962472][ T8451]  ? ksys_lseek+0x1b0/0x1b0
[   74.966969][ T8451]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[   74.972964][ T8451]  vfs_read+0x35c/0x570
[   74.977118][ T8451]  ksys_read+0x1ee/0x250
[   74.981370][ T8451]  ? vfs_write+0xa40/0xa40
[   74.985777][ T8451]  ? syscall_enter_from_user_mode+0x27/0x70
[   74.991684][ T8451]  do_syscall_64+0x3a/0xb0
[   74.996124][ T8451]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   75.002039][ T8451] RIP: 0033:0x4af19b
[   75.005938][ T8451] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30
[   75.026340][ T8451] RSP: 002b:000000c0000a9828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000
[   75.034769][ T8451] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b
[   75.042755][ T8451] RDX: 0000000000001000 RSI: 000000c0003d7000 RDI: 0000000000000006
[   75.050737][ T8451] RBP: 000000c0000a9878 R08: 0000000000000001 R09: 0000000000000002
[   75.058703][ T8451] R10: 0000000000003ab9 R11: 0000000000000212 R12: 0000000000003ab5
[   75.066666][ T8451] R13: 0000000000000400 R14: 0000000000000002 R15: 0000000000000002
[   75.074647][ T8451] 
[   75.076961][ T8451] Allocated by task 8398:
[   75.081276][ T8451]  kasan_save_stack+0x1b/0x40
[   75.085957][ T8451]  __kasan_slab_alloc+0x84/0xa0
[   75.090805][ T8451]  kmem_cache_alloc+0x219/0x3a0
[   75.095649][ T8451]  getname_flags.part.0+0x50/0x4f0
[   75.100760][ T8451]  user_path_at_empty+0xa1/0x100
[   75.105695][ T8451]  vfs_statx+0x142/0x390
[   75.109938][ T8451]  __do_sys_newlstat+0x91/0x110
[   75.114785][ T8451]  do_syscall_64+0x3a/0xb0
[   75.119200][ T8451]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   75.125104][ T8451] 
[   75.127417][ T8451] Freed by task 8270:
[   75.131404][ T8451]  kasan_save_stack+0x1b/0x40
[   75.136078][ T8451]  kasan_set_track+0x1c/0x30
[   75.140661][ T8451]  kasan_set_free_info+0x20/0x30
[   75.145604][ T8451]  __kasan_slab_free+0xfb/0x130
[   75.150447][ T8451]  slab_free_freelist_hook+0xdf/0x240
[   75.155821][ T8451]  kmem_cache_free+0x97/0x750
[   75.160491][ T8451]  putname+0xe1/0x120
[   75.164467][ T8451]  filename_lookup+0x3c3/0x570
[   75.169224][ T8451]  vfs_statx+0x142/0x390
[   75.173463][ T8451]  __do_sys_newlstat+0x91/0x110
[   75.178307][ T8451]  do_syscall_64+0x3a/0xb0
[   75.182716][ T8451]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   75.188602][ T8451] 
[   75.190911][ T8451] The buggy address belongs to the object at ffff888030ef0000
[   75.190911][ T8451]  which belongs to the cache names_cache of size 4096
[   75.205036][ T8451] The buggy address is located 4 bytes inside of
[   75.205036][ T8451]  4096-byte region [ffff888030ef0000, ffff888030ef1000)
[   75.218225][ T8451] The buggy address belongs to the page:
[   75.223839][ T8451] page:ffffea0000c3bc00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x30ef0
[   75.234002][ T8451] head:ffffea0000c3bc00 order:3 compound_mapcount:0 compound_pincount:0
[   75.242311][ T8451] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[   75.250290][ T8451] raw: 00fff00000010200 0000000000000000 0000000100000001 ffff8880111be280
[   75.258865][ T8451] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000
[   75.267434][ T8451] page dumped because: kasan: bad access detected
[   75.273834][ T8451] 
[   75.276140][ T8451] Memory state around the buggy address:
[   75.281778][ T8451]  ffff888030eeff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.289833][ T8451]  ffff888030eeff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.297881][ T8451] >ffff888030ef0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.305925][ T8451]                    ^
[   75.309977][ T8451]  ffff888030ef0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.318025][ T8451]  ffff888030ef0100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.326071][ T8451] ==================================================================
[   75.334114][ T8451] Disabling lock debugging due to kernel taint
[   75.347570][ T8451] Kernel panic - not syncing: panic_on_warn set ...
[   75.354187][ T8451] CPU: 1 PID: 8451 Comm: syz-fuzzer Tainted: G    B             5.12.0-rc8-next-20210423-syzkaller #0
[   75.365113][ T8451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   75.375161][ T8451] Call Trace:
[   75.378431][ T8451]  dump_stack+0x141/0x1d7
[   75.382762][ T8451]  panic+0x306/0x73d
[   75.386650][ T8451]  ? __warn_printk+0xf3/0xf3
[   75.391251][ T8451]  ? preempt_schedule_common+0x59/0xc0
[   75.396702][ T8451]  ? __skb_datagram_iter+0x6b8/0x770
[   75.401975][ T8451]  ? preempt_schedule_thunk+0x16/0x18
[   75.407337][ T8451]  ? trace_hardirqs_on+0x38/0x1c0
[   75.412354][ T8451]  ? trace_hardirqs_on+0x51/0x1c0
[   75.417365][ T8451]  ? __skb_datagram_iter+0x6b8/0x770
[   75.422658][ T8451]  ? __skb_datagram_iter+0x6b8/0x770
[   75.427930][ T8451]  end_report.cold+0x5a/0x5a
[   75.432515][ T8451]  kasan_report.cold+0x6a/0xd8
[   75.437270][ T8451]  ? __skb_datagram_iter+0x6b8/0x770
[   75.442544][ T8451]  __skb_datagram_iter+0x6b8/0x770
[   75.447646][ T8451]  ? zerocopy_sg_from_iter+0x110/0x110
[   75.453094][ T8451]  skb_copy_datagram_iter+0x40/0x50
[   75.458281][ T8451]  tcp_recvmsg_locked+0x1048/0x22f0
[   75.463476][ T8451]  ? tcp_splice_read+0x8b0/0x8b0
[   75.468421][ T8451]  ? mark_held_locks+0x9f/0xe0
[   75.473185][ T8451]  ? __local_bh_enable_ip+0xa0/0x120
[   75.478478][ T8451]  tcp_recvmsg+0x134/0x550
[   75.482887][ T8451]  ? tcp_recvmsg_locked+0x22f0/0x22f0
[   75.488291][ T8451]  ? aa_sk_perm+0x311/0xab0
[   75.492782][ T8451]  inet_recvmsg+0x11b/0x5e0
[   75.497278][ T8451]  ? inet_sendpage+0x140/0x140
[   75.502051][ T8451]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   75.508287][ T8451]  ? security_socket_recvmsg+0x8f/0xc0
[   75.513737][ T8451]  sock_read_iter+0x33c/0x470
[   75.518408][ T8451]  ? ____sys_recvmsg+0x600/0x600
[   75.523341][ T8451]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   75.529578][ T8451]  ? fsnotify+0xa58/0x1060
[   75.534014][ T8451]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   75.540251][ T8451]  new_sync_read+0x5b7/0x6e0
[   75.544833][ T8451]  ? ksys_lseek+0x1b0/0x1b0
[   75.549328][ T8451]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[   75.555308][ T8451]  vfs_read+0x35c/0x570
[   75.559457][ T8451]  ksys_read+0x1ee/0x250
[   75.563689][ T8451]  ? vfs_write+0xa40/0xa40
[   75.568094][ T8451]  ? syscall_enter_from_user_mode+0x27/0x70
[   75.573981][ T8451]  do_syscall_64+0x3a/0xb0
[   75.578388][ T8451]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   75.584273][ T8451] RIP: 0033:0x4af19b
[   75.588174][ T8451] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30
[   75.607772][ T8451] RSP: 002b:000000c0000a9828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000
[   75.616177][ T8451] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b
[   75.624136][ T8451] RDX: 0000000000001000 RSI: 000000c0003d7000 RDI: 0000000000000006
[   75.632093][ T8451] RBP: 000000c0000a9878 R08: 0000000000000001 R09: 0000000000000002
[   75.640066][ T8451] R10: 0000000000003ab9 R11: 0000000000000212 R12: 0000000000003ab5
[   75.648025][ T8451] R13: 0000000000000400 R14: 0000000000000002 R15: 0000000000000002
[   75.656905][ T8451] Kernel Offset: disabled
[   75.661471][ T8451] Rebooting in 86400 seconds..