================================================================== BUG: KASAN: wild-memory-access in do_select+0x6ee/0xeb4 fs/select.c:520 Read of size 8 at addr 2f8c1d029c594400 by task sshd/2016 CPU: 1 PID: 2016 Comm: sshd Not tainted 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:113 [] show_stack+0x34/0x40 arch/riscv/kernel/stacktrace.c:119 [] __dump_stack lib/dump_stack.c:88 [inline] [] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:106 [] __kasan_report mm/kasan/report.c:446 [inline] [] kasan_report+0x1de/0x1e0 mm/kasan/report.c:459 [] check_region_inline mm/kasan/generic.c:183 [inline] [] __asan_load8+0x6e/0x96 mm/kasan/generic.c:256 [] do_select+0x6ee/0xeb4 fs/select.c:520 [] core_sys_select+0x364/0x8c8 fs/select.c:681 ==================================================================