==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor7/7339
CPU: 1 PID: 7339 Comm: syz-executor7 Not tainted 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801ccb3f9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801c8039ea0 ffe708746f55d000 ffff8801ccb3fa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
pktgen: kernel_thread() failed for cpu 0
pktgen: Cannot create thread for cpu 0 (-4)
pktgen: kernel_thread() failed for cpu 1
pktgen: Cannot create thread for cpu 1 (-4)
pktgen: Initialization failed for all threads
pktgen: kernel_thread() failed for cpu 0
pktgen: Cannot create thread for cpu 0 (-4)
pktgen: kernel_thread() failed for cpu 1
pktgen: Cannot create thread for cpu 1 (-4)
pktgen: Initialization failed for all threads
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor7/7368
CPU: 1 PID: 7368 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801c8cbf9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801c8c9d5a0 ffe708746f55d000 ffff8801c8cbfa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor2/7376
CPU: 0 PID: 7376 Comm: syz-executor2 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801a737f9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801d4c577e0 ffe708746f55d000 ffff8801a737fa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor7/7381
CPU: 1 PID: 7381 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801a815f9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801c8c9d660 ffe708746f55d000 ffff8801a815fa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor2/7395
CPU: 0 PID: 7395 Comm: syz-executor2 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801d85479e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801abe6f1e0 ffe708746f55d000 ffff8801d8547a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor7/7413
CPU: 1 PID: 7413 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801a82779e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801ab2cdb40 ffe708746f55d000 ffff8801a8277a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
binder: 7433:7476 ioctl 4b60 205baf8c returned -22
device lo entered promiscuous mode
device lo left promiscuous mode
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor7/7513
CPU: 1 PID: 7513 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801d60ff9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801aab24120 ffe708746f55d000 ffff8801d60ffa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
binder: 7433:7460 ioctl 4b60 205baf8c returned -22
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor6/7543
CPU: 0 PID: 7543 Comm: syz-executor6 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801cddf79e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801a5c0dd20 ffe708746f55d000 ffff8801cddf7a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor6/7560
CPU: 0 PID: 7560 Comm: syz-executor6 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801d596f9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801a5ee9900 ffe708746f55d000 ffff8801d596fa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor6/7610
CPU: 1 PID: 7610 Comm: syz-executor6 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801d0b279e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801a6ac9540 ffe708746f55d000 ffff8801d0b27a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor6/7624
CPU: 0 PID: 7624 Comm: syz-executor6 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801d0b279e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801c45c3360 ffe708746f55d000 ffff8801d0b27a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
device lo entered promiscuous mode
device lo left promiscuous mode
device lo left promiscuous mode
device lo entered promiscuous mode
device lo left promiscuous mode
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor6/7647
device gre0 entered promiscuous mode
CPU: 1 PID: 7647 Comm: syz-executor6 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801d84cf9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801c7158780 ffe708746f55d000 ffff8801d84cfa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor6/7662
CPU: 0 PID: 7662 Comm: syz-executor6 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801d22d79e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801c677e5a0 ffe708746f55d000 ffff8801d22d7a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
sock: sock_set_timeout: `syz-executor3' (pid 7705) tries to set negative timeout
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor7/7725
CPU: 1 PID: 7725 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801ceda79e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801a3963240[ 69.102948] sock: sock_set_timeout: `syz-executor3' (pid 7705) tries to set negative timeout
ffe708746f55d000 ffff8801ceda7a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
nla_parse: 16 callbacks suppressed
netlink: 5 bytes leftover after parsing attributes in process `syz-executor2'.
netlink: 5 bytes leftover after parsing attributes in process `syz-executor2'.
==================================================================
PF_BRIDGE: RTM_SETLINK with unknown ifindex
BUG: KASAN: wild-memory-access on address ffe708746f55d000
PF_BRIDGE: RTM_SETLINK with unknown ifindex
Read of size 153 by task syz-executor7/7784
CPU: 1 PID: 7784 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801ce9479e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801a3963c00 ffe708746f55d000 ffff8801ce947a70
ffffffff8153d48f 0000000000000000[ 69.426845] device gre0 entered promiscuous mode
0000000000000001 ffffffff826651bb
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
device lo left promiscuous mode
==================================================================
BUG: KASAN: wild-memory-access on address ffe7086a16c84000
Read of size 153 by task syz-executor7/7836
CPU: 1 PID: 7836 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801c6a779e8 ffffffff81d93659 ffe7086a16c84000 0000000000000099
0000000000000000 ffff8801c7272ea0 ffe7086a16c84000 ffff8801c6a77a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
device gre0 left promiscuous mode
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
device lo entered promiscuous mode
Read of size 153 by task syz-executor7/7878
CPU: 0 PID: 7878 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801a3bdf9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801a5e400c0 ffe708746f55d000 ffff8801a3bdfa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe7086a7c308000
Read of size 153 by task syz-executor6/7875
CPU: 1 PID: 7875 Comm: syz-executor6 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801a3a2f9e8 ffffffff81d93659 ffe7086a7c308000 0000000000000099
0000000000000000 ffff8801a5ddeb40 ffe7086a7c308000 ffff8801a3a2fa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
device lo left promiscuous mode
device gre0 entered promiscuous mode
device gre0 left promiscuous mode
==================================================================
BUG: KASAN: wild-memory-access on address ffe7086ab2e00000
Read of size 153 by task syz-executor6/7895
CPU: 1 PID: 7895 Comm: syz-executor6 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801a9aef9e8 ffffffff81d93659 ffe7086ab2e00000 0000000000000099
0000000000000000 ffff8801a4e83120 ffe7086ab2e00000 ffff8801a9aefa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor7/7897
CPU: 0 PID: 7897 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801aaeaf9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801a99cf480 ffe708746f55d000 ffff8801aaeafa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor0/7904
CPU: 0 PID: 7904 Comm: syz-executor0 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801a9aef9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801a99cff00 ffe708746f55d000 ffff8801a9aefa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
device lo entered promiscuous mode
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor7/7917
CPU: 0 PID: 7917 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801c4e7f9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801a5df2420 ffe708746f55d000 ffff8801c4e7fa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor6/7926
CPU: 1 PID: 7926 Comm: syz-executor6 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801ce9379e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801c5e48ea0 ffe708746f55d000 ffff8801ce937a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
device lo left promiscuous mode
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor7/7966
CPU: 0 PID: 7966 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801cd0ff9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801c73d03c0 ffe708746f55d000 ffff8801cd0ffa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
device lo entered promiscuous mode
device lo left promiscuous mode
IPv6: ADDRCONF(NETDEV_CHANGE): syz1: link becomes ready
==================================================================
BUG: KASAN: wild-memory-access on address ffe70871ab600000
Read of size 153 by task syz-executor6/8021
CPU: 0 PID: 8021 Comm: syz-executor6 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801c983f9e8 ffffffff81d93659 ffe70871ab600000 0000000000000099
0000000000000000 ffff8801cdddfea0 ffe70871ab600000 ffff8801c983fa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor7/8022
CPU: 1 PID: 8022 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801a9c579e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801cabccc00 ffe708746f55d000 ffff8801a9c57a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor6/8060
CPU: 0 PID: 8060 Comm: syz-executor6 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801c3d9f9e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801da3a02a0 ffe708746f55d000 ffff8801c3d9fa70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor7/8077
FAULT_FLAG_ALLOW_RETRY missing 30
CPU: 1 PID: 8072 Comm: syz-executor0 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801abcaf660 ffffffff81d93659 ffff8801abcaf940 0000000000000000
ffff8801c65df790 ffff8801abcaf830 ffff8801c65df680 ffff8801abcaf858
ffffffff816611c8 ffff8801abcaf7b0 ffffffff81dfa93c 00000001cb139067
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff816611c8>] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323
[<ffffffff814d0171>] do_anonymous_page mm/memory.c:2747 [inline]
[<ffffffff814d0171>] handle_pte_fault mm/memory.c:3488 [inline]
[<ffffffff814d0171>] __handle_mm_fault mm/memory.c:3577 [inline]
[<ffffffff814d0171>] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614
[<ffffffff810e0437>] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1397
[<ffffffff810e0c17>] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1461
[<ffffffff838b0358>] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012
[<ffffffff832e5bc9>] inet_ioctl+0x89/0x1c0 net/ipv4/af_inet.c:878
[<ffffffff82ecbef5>] sock_do_ioctl+0x65/0xb0 net/socket.c:892
[<ffffffff82ecc940>] sock_ioctl+0x2e0/0x3d0 net/socket.c:978
[<ffffffff815ad20a>] vfs_ioctl fs/ioctl.c:43 [inline]
[<ffffffff815ad20a>] do_vfs_ioctl+0x1aa/0x10c0 fs/ioctl.c:679
[<ffffffff815ae1af>] SYSC_ioctl fs/ioctl.c:694 [inline]
[<ffffffff815ae1af>] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:685
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
FAULT_FLAG_ALLOW_RETRY missing 30
CPU: 1 PID: 8056 Comm: syz-executor0 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801c65e76a0 ffffffff81d93659 ffff8801c65e7980 0000000000000000
ffff8801c65df790 ffff8801c65e7870 ffff8801c65df680 ffff8801c65e7898
ffffffff816611c8 ffff8801c65e77f0 0000000000000400 00000001cb139067
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff816611c8>] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323
[<ffffffff814d0171>] do_anonymous_page mm/memory.c:2747 [inline]
[<ffffffff814d0171>] handle_pte_fault mm/memory.c:3488 [inline]
[<ffffffff814d0171>] __handle_mm_fault mm/memory.c:3577 [inline]
[<ffffffff814d0171>] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614
[<ffffffff810e0437>] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1397
[<ffffffff810e0c17>] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1461
[<ffffffff838b0358>] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012
[<ffffffff832e5c57>] inet_ioctl+0x117/0x1c0 net/ipv4/af_inet.c:891
[<ffffffff82ecbef5>] sock_do_ioctl+0x65/0xb0 net/socket.c:892
[<ffffffff82ecc940>] sock_ioctl+0x2e0/0x3d0 net/socket.c:978
[<ffffffff815ad20a>] vfs_ioctl fs/ioctl.c:43 [inline]
[<ffffffff815ad20a>] do_vfs_ioctl+0x1aa/0x10c0 fs/ioctl.c:679
[<ffffffff815ae1af>] SYSC_ioctl fs/ioctl.c:694 [inline]
[<ffffffff815ae1af>] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:685
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
FAULT_FLAG_ALLOW_RETRY missing 30
CPU: 1 PID: 8045 Comm: syz-executor0 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801a574f960 ffffffff81d93659 ffff8801a574fc40 0000000000000000
ffff8801c65df790 ffff8801a574fb30 ffff8801c65df680 ffff8801a574fb58
ffffffff816611c8 ffff8801a574fab0 0000000000000000 00000001cb139067
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff816611c8>] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323
[<ffffffff814d0171>] do_anonymous_page mm/memory.c:2747 [inline]
[<ffffffff814d0171>] handle_pte_fault mm/memory.c:3488 [inline]
[<ffffffff814d0171>] __handle_mm_fault mm/memory.c:3577 [inline]
[<ffffffff814d0171>] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614
[<ffffffff810e0437>] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1397
[<ffffffff810e0c17>] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1461
[<ffffffff838b0358>] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
CPU: 0 PID: 8077 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801cee679e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801da3a0780 ffe708746f55d000 ffff8801cee67a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 153 by task syz-executor6/8091
CPU: 1 PID: 8091 Comm: syz-executor6 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801a9c579e8 ffffffff81d93659 ffe708746f55d000 0000000000000099
0000000000000000 ffff8801abea2c60 ffe708746f55d000 ffff8801a9c57a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
pktgen: kernel_thread() failed for cpu 0
pktgen: Cannot create thread for cpu 0 (-4)
pktgen: kernel_thread() failed for cpu 1
pktgen: Cannot create thread for cpu 1 (-4)
==================================================================
BUG: KASAN: wild-memory-access on address ffe708746f55d000
Read of size 124 by task syz-executor7/8110
CPU: 0 PID: 8110 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801aac379e8 ffffffff81d93659 ffe708746f55d000 000000000000007c
0000000000000000 ffff8801c651d960 ffe708746f55d000 ffff8801aac37a70
ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb
Call Trace:
[<ffffffff81d93659>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d93659>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8153d48f>] kasan_report_error mm/kasan/report.c:284 [inline]
[<ffffffff8153d48f>] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309
[<ffffffff8153d860>] kasan_report+0x20/0x30 mm/kasan/report.c:296
[<ffffffff8153c1a7>] check_memory_region_inline mm/kasan/kasan.c:308 [inline]
[<ffffffff8153c1a7>] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315
[<ffffffff8153c211>] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320
[<ffffffff826651bb>] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline]
[<ffffffff826651bb>] sg_read_oxfer drivers/scsi/sg.c:1978 [inline]
[<ffffffff826651bb>] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
==================================================================
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Dumping ftrace buffer:
(ftrace buffer empty)
Modules linked in:
CPU: 0 PID: 8123 Comm: syz-executor7 Tainted: G B 4.9.54-g9add7c4 #63
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8801d6cd1800 task.stack: ffff8801ca440000
RIP: 0010:[<ffffffff8144e371>] [<ffffffff8144e371>] __read_once_size include/linux/compiler.h:243 [inline]
RIP: 0010:[<ffffffff8144e371>] [<ffffffff8144e371>] atomic_read arch/x86/include/asm/atomic.h:26 [inline]
RIP: 0010:[<ffffffff8144e371>] [<ffffffff8144e371>] page_ref_count include/linux/page_ref.h:66 [inline]
RIP: 0010:[<ffffffff8144e371>] [<ffffffff8144e371>] put_page_testzero include/linux/mm.h:445 [inline]
RIP: 0010:[<ffffffff8144e371>] [<ffffffff8144e371>] __free_pages+0x21/0x80 mm/page_alloc.c:3901
RSP: 0018:ffff8801ca447a00 EFLAGS: 00010a07
RAX: dffffc0000000000 RBX: dead4ead00000000 RCX: ffffc9000194b000
RDX: 1bd5a9d5a0000003 RSI: 0000000000000000 RDI: dead4ead0000001c
RBP: ffff8801ca447a10 R08: ffffed00355796a0 R09: ffff8801aabcb4e0
R10: 0000000000000005 R11: ffffed00355796a0 R12: 0000000000000004
R13: 0000000000000020 R14: ffff8801c98b8000 R15: dffffc0000000000
FS: 00007f52af433700(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000fd0 CR3: 00000001c7207000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Stack:
0000000000000000 ffff8801c98b8158 ffff8801ca447a70 ffffffff826627b1
ffff8801c98b8170 ffffed003931702b ffffed003931702e ffff8801c98b8168
dead4ead00000000 ffff8801c98b8140 0000000000000000 0000000000000000
Call Trace:
[<ffffffff826627b1>] sg_remove_scat.isra.20+0x1c1/0x2d0 drivers/scsi/sg.c:1954
[<ffffffff82662b75>] sg_finish_rem_req+0x2b5/0x340 drivers/scsi/sg.c:1836
[<ffffffff8266488c>] sg_read+0x91c/0x1400 drivers/scsi/sg.c:527
[<ffffffff8156bb41>] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714
[<ffffffff8156f910>] do_loop_readv_writev fs/read_write.c:880 [inline]
[<ffffffff8156f910>] do_readv_writev+0x520/0x750 fs/read_write.c:874
[<ffffffff8156fbc4>] vfs_readv+0x84/0xc0 fs/read_write.c:898
[<ffffffff8156fce6>] do_readv+0xe6/0x250 fs/read_write.c:924
[<ffffffff815730a7>] SYSC_readv fs/read_write.c:1011 [inline]
[<ffffffff815730a7>] SyS_readv+0x27/0x30 fs/read_write.c:1008
[<ffffffff838af185>] entry_SYSCALL_64_fastpath+0x23/0xc6
Code: ff 66 0f 1f 84 00 00 00 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 e5 53 48 89 fb 48 83 c7 1c 48 89 fa 48 83 ec 08 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 3d
RIP [<ffffffff8144e371>] __read_once_size include/linux/compiler.h:243 [inline]
RIP [<ffffffff8144e371>] atomic_read arch/x86/include/asm/atomic.h:26 [inline]
RIP [<ffffffff8144e371>] page_ref_count include/linux/page_ref.h:66 [inline]
RIP [<ffffffff8144e371>] put_page_testzero include/linux/mm.h:445 [inline]
RIP [<ffffffff8144e371>] __free_pages+0x21/0x80 mm/page_alloc.c:3901
RSP <ffff8801ca447a00>
---[ end trace 17aaf86f47759211 ]---