syzbot


KASAN: wild-memory-access Read of size 208

Status: closed as invalid on 2017/10/18 09:01
First crash: 2387d, last: 2387d

Sample crash report:
netlink: 9 bytes leftover after parsing attributes in process `syz-executor4'.
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746fb21000
Read of size 208 by task syz-executor1/14626
CPU: 1 PID: 14626 Comm: syz-executor1 Not tainted 4.9.52-gc30c69c #54
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 ffff8801ad1279e8 ffffffff81d93149 ffe708746fb21000 00000000000000d0
 0000000000000000 ffff8801d015da20 ffe708746fb21000 ffff8801ad127a70
 ffffffff8153d08f 0000000000000000 0000000000000001 ffffffff826648db
Call Trace:
 [<ffffffff81d93149>] __dump_stack lib/dump_stack.c:15 [inline]
 [<ffffffff81d93149>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
 [<ffffffff8153d08f>] kasan_report_error mm/kasan/report.c:284 [inline]
 [<ffffffff8153d08f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
 [<ffffffff8153d460>] kasan_report+0x20/0x30 mm/kasan/report.c:296
 [<ffffffff8153bda7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
 [<ffffffff8153bda7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
 [<ffffffff8153be11>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
 [<ffffffff826648db>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
 [<ffffffff826648db>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
 [<ffffffff826648db>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
 [<ffffffff8156b741>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
 [<ffffffff8156f510>] do_loop_readv_writev fs/read_write.c:880 [inline]
 [<ffffffff8156f510>] do_readv_writev+0x520/0x750 fs/read_write.c:874
 [<ffffffff8156f7c4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
 [<ffffffff8156f8e6>] do_readv+0xe6/0x250 fs/read_write.c:924
 [<ffffffff81572ca7>] SYSC_readv fs/read_write.c:1011 [inline]
 [<ffffffff81572ca7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
 [<ffffffff838ac5c5>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
sd 0:0:1:0: [sg_rq_end_io] Sense Key : Illegal Request [current] 
sd 0:0:1:0: [sg_rq_end_io] Add. Sense: Invalid field in cdb
sd 0:0:1:0: [sg_rq_end_io] Sense Key : Illegal Request [current] 
sd 0:0:1:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
sg_write: data in/out 65500/34 bytes for SCSI command 0xfc-- guessing data in;
   program syz-executor1 not setting count and/or reply_len properly
sd 0:0:1:0: [sg_rq_end_io] Sense Key : Illegal Request [current] 
sd 0:0:1:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
sd 0:0:1:0: [sg_rq_end_io] Sense Key : Illegal Request [current] 
sd 0:0:1:0: [sg_rq_end_io] Add. Sense: Invalid field in cdb
netlink: 9 bytes leftover after parsing attributes in process `syz-executor4'.
sd 0:0:1:0: [sg_rq_end_io] Sense Key : Illegal Request [current] 
sd 0:0:1:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
device gre0 entered promiscuous mode
netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'.
netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'.
IPVS: Creating netns size=2536 id=40
sd 0:0:1:0: [sg_rq_end_io] Sense Key : Illegal Request [current] 
sd 0:0:1:0: [sg_rq_end_io] Add. Sense: Invalid command operation code
TCP: request_sock_TCP: Possible SYN flooding on port 20022. Sending cookies.  Check SNMP counters.
binder: 14776:14778 ioctl 560a 206afff4 returned -22
binder: 14776:14778 ioctl 560a 206afff4 returned -22
device syz7 left promiscuous mode
pktgen: kernel_thread() failed for cpu 0
pktgen: Cannot create thread for cpu 0 (-4)
pktgen: kernel_thread() failed for cpu 1
pktgen: Cannot create thread for cpu 1 (-4)
pktgen: Initialization failed for all threads
pktgen: kernel_thread() failed for cpu 0
pktgen: Cannot create thread for cpu 0 (-4)
pktgen: kernel_thread() failed for cpu 1
pktgen: Cannot create thread for cpu 1 (-4)
pktgen: Initialization failed for all threads
device syz4 entered promiscuous mode
netlink: 5 bytes leftover after parsing attributes in process `syz-executor4'.
device gre0 entered promiscuous mode
selinux_nlmsg_perm: 1 callbacks suppressed
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15100 comm=syz-executor4
netlink: 6 bytes leftover after parsing attributes in process `syz-executor1'.
netlink: 6 bytes leftover after parsing attributes in process `syz-executor1'.
netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'.
keychord: invalid keycode count 0
netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'.
keychord: invalid keycode count 0
binder: 15330:15331 ioctl 5411 20e73000 returned -22
binder: 15330:15348 ioctl 5411 20e73000 returned -22
device gre0 entered promiscuous mode
netlink: 5 bytes leftover after parsing attributes in process `syz-executor7'.
program syz-executor7 is using a deprecated SCSI ioctl, please convert it to SG_IO
sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0
program syz-executor7 is using a deprecated SCSI ioctl, please convert it to SG_IO
sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0
program syz-executor7 is using a deprecated SCSI ioctl, please convert it to SG_IO
sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0
program syz-executor7 is using a deprecated SCSI ioctl, please convert it to SG_IO
sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0
device lo entered promiscuous mode
FAULT_FLAG_ALLOW_RETRY missing 30
CPU: 1 PID: 15443 Comm: syz-executor1 Tainted: G    B           4.9.52-gc30c69c #54
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 ffff8801d8f879a0 ffffffff81d93149 ffff8801d8f87c80 0000000000000000
 ffff8801ac8faa10 ffff8801d8f87b70 ffff8801ac8fa900 ffff8801d8f87b98
 ffffffff81660dc8 ffff8801d8f87af0 ffff8801d06107f8 00000001c8dd7067
Call Trace:
 [<ffffffff81d93149>] __dump_stack lib/dump_stack.c:15 [inline]
 [<ffffffff81d93149>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
 [<ffffffff81660dc8>] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323
 [<ffffffff814cfd71>] do_anonymous_page mm/memory.c:2747 [inline]
 [<ffffffff814cfd71>] handle_pte_fault mm/memory.c:3488 [inline]
 [<ffffffff814cfd71>] __handle_mm_fault mm/memory.c:3577 [inline]
 [<ffffffff814cfd71>] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614
 [<ffffffff810e020b>] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397
 [<ffffffff810e0917>] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460
 [<ffffffff838ad798>] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012
 [<ffffffff838ac5c5>] entry_SYSCALL_64_fastpath+0x23/0xc6
FAULT_FLAG_ALLOW_RETRY missing 30
CPU: 1 PID: 15443 Comm: syz-executor1 Tainted: G    B           4.9.52-gc30c69c #54
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 ffff8801d8f879a0 ffffffff81d93149 ffff8801d8f87c80 0000000000000000
 ffff8801ac8fa290 ffff8801d8f87b70 ffff8801ac8fa180 ffff8801d8f87b98
 ffffffff81660dc8 ffff8801d8f87af0 ffff8801d8f87bb8 00000001c8dd7067
Call Trace:
 [<ffffffff81d93149>] __dump_stack lib/dump_stack.c:15 [inline]
 [<ffffffff81d93149>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
 [<ffffffff81660dc8>] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323
 [<ffffffff814cfd71>] do_anonymous_page mm/memory.c:2747 [inline]
 [<ffffffff814cfd71>] handle_pte_fault mm/memory.c:3488 [inline]
 [<ffffffff814cfd71>] __handle_mm_fault mm/memory.c:3577 [inline]
 [<ffffffff814cfd71>] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614
 [<ffffffff810e020b>] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397
 [<ffffffff810e0917>] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460
 [<ffffffff838ad798>] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012
 [<ffffffff838ac5c5>] entry_SYSCALL_64_fastpath+0x23/0xc6
device lo left promiscuous mode
IPVS: Creating netns size=2536 id=41
FAULT_FLAG_ALLOW_RETRY missing 30
CPU: 1 PID: 15499 Comm: syz-executor1 Tainted: G    B           4.9.52-gc30c69c #54
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 ffff8801cd43f9a0 ffffffff81d93149 ffff8801cd43fc80 0000000000000000
 ffff8801ac8fbf10 ffff8801cd43fb70 ffff8801ac8fbe00 ffff8801cd43fb98
 ffffffff81660dc8 ffff8801cd43faf0 ffff8801cd43fbb8 00000001a9857067
Call Trace:
 [<ffffffff81d93149>] __dump_stack lib/dump_stack.c:15 [inline]
 [<ffffffff81d93149>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
 [<ffffffff81660dc8>] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323
 [<ffffffff814cfd71>] do_anonymous_page mm/memory.c:2747 [inline]
 [<ffffffff814cfd71>] handle_pte_fault mm/memory.c:3488 [inline]
 [<ffffffff814cfd71>] __handle_mm_fault mm/memory.c:3577 [inline]
 [<ffffffff814cfd71>] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614
 [<ffffffff810e020b>] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397
 [<ffffffff810e0917>] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460
 [<ffffffff838ad798>] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012
 [<ffffffff838ac5c5>] entry_SYSCALL_64_fastpath+0x23/0xc6
FAULT_FLAG_ALLOW_RETRY missing 30
CPU: 1 PID: 15499 Comm: syz-executor1 Tainted: G    B           4.9.52-gc30c69c #54
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 ffff8801cd43f9a0 ffffffff81d93149 ffff8801cd43fc80 0000000000000000
 ffff8801ac8fb010 ffff8801cd43fb70 ffff8801ac8faf00 ffff8801cd43fb98
 ffffffff81660dc8 ffff8801cd43faf0 ffff8801cd43fbb8 00000001a9857067
Call Trace:
 [<ffffffff81d93149>] __dump_stack lib/dump_stack.c:15 [inline]
 [<ffffffff81d93149>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
 [<ffffffff81660dc8>] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323
 [<ffffffff814cfd71>] do_anonymous_page mm/memory.c:2747 [inline]
 [<ffffffff814cfd71>] handle_pte_fault mm/memory.c:3488 [inline]
 [<ffffffff814cfd71>] __handle_mm_fault mm/memory.c:3577 [inline]
 [<ffffffff814cfd71>] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614
 [<ffffffff810e020b>] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397
 [<ffffffff810e0917>] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460
 [<ffffffff838ad798>] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012
 [<ffffffff838ac5c5>] entry_SYSCALL_64_fastpath+0x23/0xc6
TCP: request_sock_TCP: Possible SYN flooding on port 20013. Sending cookies.  Check SNMP counters.
pktgen: kernel_thread() failed for cpu 0
pktgen: Cannot create thread for cpu 0 (-4)
pktgen: kernel_thread() failed for cpu 1
pktgen: Cannot create thread for cpu 1 (-4)
pktgen: Initialization failed for all threads
IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
binder: 15606:15607 ioctl 541b 20cf5000 returned -22
binder: 15606:15618 ioctl 541b 20cf5000 returned -22
tc_dump_action: action bad kind
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15716 comm=syz-executor4
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21199 sclass=netlink_audit_socket pig=15764 comm=syz-executor0
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=41 sclass=netlink_audit_socket pig=15764 comm=syz-executor0
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21199 sclass=netlink_audit_socket pig=15788 comm=syz-executor0
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=41 sclass=netlink_audit_socket pig=15788 comm=syz-executor0
sock: sock_set_timeout: `syz-executor5' (pid 15811) tries to set negative timeout
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pig=15837 comm=syz-executor6
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pig=15837 comm=syz-executor6
IPVS: Creating netns size=2536 id=42
IPVS: Creating netns size=2536 id=43

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2017/09/29 20:13 https://android.googlesource.com/kernel/common android-4.9 c30c69c76c1d c26ea367 .config console log report ci-android-49-kasan-gce
* Struck through repros no longer work on HEAD.