device syz3 left promiscuous mode ================================================================== BUG: KASAN: wild-memory-access on address ffe7087460053000 Read of size 37 by task syz-executor7/12325 CPU: 0 PID: 12325 Comm: syz-executor7 Not tainted 4.9.54-g34e23de #62 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801c7547ae8 ffffffff81d93659 ffe7087460053000 0000000000000025 0000000000000000 ffff8801abf25240 ffe7087460053000 ffff8801c7547b70 ffffffff8153d48f 0000000000000000 0000000000000001 ffffffff826651bb Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] kasan_report_error mm/kasan/report.c:284 [inline] [] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309 [] kasan_report+0x20/0x30 mm/kasan/report.c:296 [] check_memory_region_inline mm/kasan/kasan.c:308 [inline] [] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315 [] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320 [] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline] [] sg_read_oxfer drivers/scsi/sg.c:1978 [inline] [] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520 [] __vfs_read+0x103/0x670 fs/read_write.c:452 [] vfs_read+0x107/0x330 fs/read_write.c:475 [] SYSC_read fs/read_write.c:591 [inline] [] SyS_read+0xd9/0x1b0 fs/read_write.c:584 [] entry_SYSCALL_64_fastpath+0x23/0xc6 ================================================================== binder: 12412:12413 ioctl 4b3b 1 returned -22 binder: 12412:12418 ioctl 4b3b 1 returned -22 IPVS: Creating netns size=2536 id=30 IPVS: Creating netns size=2536 id=31 selinux_nlmsg_perm: 255 callbacks suppressed loop_reread_partitions: partition scan of loop5 (t?`JzP[ p>TK6C="L l!V #F-') failed (rc=-13) SELinux: unrecognized netlink message: protocol=9 nlmsg_type=37422 sclass=netlink_audit_socket pig=12514 comm=syz-executor1 device gre0 entered promiscuous mode SELinux: unrecognized netlink message: protocol=9 nlmsg_type=37422 sclass=netlink_audit_socket pig=12543 comm=syz-executor1 devpts: called with bogus options devpts: called with bogus options SELinux: unrecognized netlink message: protocol=4 nlmsg_type=770 sclass=netlink_tcpdiag_socket pig=12614 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=770 sclass=netlink_tcpdiag_socket pig=12614 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=770 sclass=netlink_tcpdiag_socket pig=12639 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=770 sclass=netlink_tcpdiag_socket pig=12639 comm=syz-executor4 binder_alloc: binder_alloc_mmap_handler: 12657 204f0000-204f4000 already mapped failed -16 binder_alloc: binder_alloc_mmap_handler: 12657 204f0000-204f4000 already mapped failed -16 binder: 12677:12678 ioctl 4b4c 20000ff8 returned -22 binder: 12677:12683 ioctl 4b4c 20000ff8 returned -22 netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. FAULT_FLAG_ALLOW_RETRY missing 30 netlink: 11 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor2'. CPU: 1 PID: 12724 Comm: syz-executor1 Tainted: G B 4.9.54-g34e23de #62 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d839f940 ffffffff81d93659 ffff8801d839fc20 0000000000000000 ffff8801d6062b90 ffff8801d839fb10 ffff8801d6062a80 ffff8801d839fb38 ffffffff816611c8 ffff8801d839fa90 0000000000000000 00000001a6b8b067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1461 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 netlink: 5 bytes leftover after parsing attributes in process `syz-executor3'. device gre0 entered promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode SELinux: unrecognized netlink message: protocol=6 nlmsg_type=3131 sclass=netlink_xfrm_socket pig=13020 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=3131 sclass=netlink_xfrm_socket pig=13036 comm=syz-executor5 device syz2 left promiscuous mode binder: 13128:13130 ioctl 40084504 20386ff8 returned -22 binder: 13128:13130 ioctl 40bc5311 20e40000 returned -22 binder: 13128:13142 ioctl 40084504 20386ff8 returned -22 binder: 13128:13142 ioctl 40bc5311 20e40000 returned -22 binder: 13174:13177 ioctl c08c5335 209dcf74 returned -22 mmap: syz-executor7 (13176): VmData 18767872 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. binder: 13174:13190 ioctl 80404532 200f2f20 returned -22 binder: 13174:13190 ioctl c08c5335 209dcf74 returned -22 device lo entered promiscuous mode binder: 13174:13177 ioctl 80404532 200f2f20 returned -22 netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. binder: 13285:13286 ioctl c0286404 20c0dfd8 returned -22 binder: 13285:13286 ioctl c0286404 20c0dfd8 returned -22 keychord: keycode 29282 out of range keychord: keycode 29282 out of range binder_alloc: binder_alloc_mmap_handler: 13357 204f0000-204f4000 already mapped failed -16 binder_alloc: binder_alloc_mmap_handler: 13357 204f0000-204f4000 already mapped failed -16 binder: 13458:13459 ioctl 2401 6 returned -22 netlink: 6 bytes leftover after parsing attributes in process `syz-executor5'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1023 sclass=netlink_route_socket pig=13471 comm=syz-executor3 binder: 13458:13474 ioctl 2401 6 returned -22 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1023 sclass=netlink_route_socket pig=13490 comm=syz-executor3 device gre0 entered promiscuous mode device gre0 left promiscuous mode netlink: 2 bytes leftover after parsing attributes in process `syz-executor3'. IPv6: NLM_F_CREATE should be specified when creating new route binder: 13665:13678 ioctl 5402 20bce000 returned -22 binder: 13665:13692 ioctl 5402 20bce000 returned -22 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 IPVS: Creating netns size=2536 id=32 IPVS: Creating netns size=2536 id=33 device gre0 entered promiscuous mode ?: renamed from tunl0 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 device syz6 left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode binder: 14217:14235 ioctl 4b60 205baf8c returned -22 binder: 14217:14235 ioctl 8934 20448000 returned -22 device lo entered promiscuous mode FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 14249 Comm: syz-executor1 Tainted: G B 4.9.54-g34e23de #62 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 binder: 14217:14235 ioctl 8934 20448000 returned -22 binder: 14217:14226 ioctl 4b60 205baf8c returned -22 ffff8801a5317470 ffffffff81d93659 ffff8801a5317750 0000000000000000 ffff8801c80c9310 ffff8801a5317640 ffff8801c80c9200 ffff8801a5317668 ffffffff816611c8 ffff8801a53175c0 0000000000000000 00000001aa876067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1461 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] do_ip_setsockopt.isra.11+0x1977/0x2960 net/ipv4/ip_sockglue.c:1146 [] ip_setsockopt+0x3a/0xb0 net/ipv4/ip_sockglue.c:1235 [] tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2705 [] sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2705 [] SYSC_setsockopt net/socket.c:1771 [inline] [] SyS_setsockopt+0x160/0x250 net/socket.c:1750 [] entry_SYSCALL_64_fastpath+0x23/0xc6 nla_parse: 11 callbacks suppressed netlink: 1 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor3'. pktgen: kernel_thread() failed for cpu 0 pktgen: Cannot create thread for cpu 0 (-4) pktgen: kernel_thread() failed for cpu 1 pktgen: Cannot create thread for cpu 1 (-4) pktgen: Initialization failed for all threads pktgen: kernel_thread() failed for cpu 0 pktgen: Cannot create thread for cpu 0 (-4) pktgen: kernel_thread() failed for cpu 1 pktgen: Cannot create thread for cpu 1 (-4) pktgen: Initialization failed for all threads IPVS: Creating netns size=2536 id=34 selinux_nlmsg_perm: 132 callbacks suppressed SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=14504 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=14504 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14513 comm=syz-executor4 pktgen: kernel_thread() failed for cpu 0 pktgen: Cannot create thread for cpu 0 (-4) pktgen: kernel_thread() failed for cpu 1 pktgen: Cannot create thread for cpu 1 (-4) pktgen: Initialization failed for all threads pktgen: kernel_thread() failed for cpu 0 pktgen: Cannot create thread for cpu 0 (-4) pktgen: kernel_thread() failed for cpu 1 pktgen: Cannot create thread for cpu 1 (-4) pktgen: Initialization failed for all threads pktgen: kernel_thread() failed for cpu 0 pktgen: Cannot create thread for cpu 0 (-4) pktgen: kernel_thread() failed for cpu 1 netlink: 3817 bytes leftover after parsing attributes in process `syz-executor2'. pktgen: Cannot create thread for cpu 1 (-4) pktgen: Initialization failed for all threads netlink: 13 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 3817 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 13 bytes leftover after parsing attributes in process `syz-executor3'. IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready syz-executor5 (14546) used greatest stack depth: 25088 bytes left netlink: 1 bytes leftover after parsing attributes in process `syz-executor1'. device syz1 entered promiscuous mode netlink: 1 bytes leftover after parsing attributes in process `syz-executor1'. device syz1 left promiscuous mode device syz1 entered promiscuous mode TCP: request_sock_TCP: Possible SYN flooding on port 20009. Sending cookies. Check SNMP counters. binder: 14676:14686 ioctl 401845c0 203ec000 returned -22 binder: 14676:14686 ioctl 401845c0 203ec000 returned -22 keychord: Insufficient bytes present for keycount 186 keychord: Insufficient bytes present for keycount 186 device syz1 left promiscuous mode FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 14775 Comm: syz-executor5 Tainted: G B 4.9.54-g34e23de #62 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801a590f470 ffffffff81d93659 ffff8801a590f750 0000000000000000 ffff8801d6063f10 ffff8801a590f640 ffff8801d6063e00 ffff8801a590f668 ffffffff816611c8 ffff8801a590f5c0 0000000000000000 00000001cc9b3067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1461 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] do_ip_setsockopt.isra.11+0x1977/0x2960 net/ipv4/ip_sockglue.c:1146 [] ip_setsockopt+0x3a/0xb0 net/ipv4/ip_sockglue.c:1235 [] tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2705 [] sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2705 [] SYSC_setsockopt net/socket.c:1771 [inline] [] SyS_setsockopt+0x160/0x250 net/socket.c:1750 [] entry_SYSCALL_64_fastpath+0x23/0xc6 device syz1 entered promiscuous mode binder: 14804:14809 ioctl 4c82 0 returned -22 binder: 14804:14809 ioctl 4c80 ffffffffffffffff returned -22 device syz1 left promiscuous mode binder: 14804:14814 ioctl 400454d9 20167fd8 returned -22 binder: 14804:14809 ioctl 4c82 0 returned -22 binder: 14804:14814 ioctl 4c80 ffffffffffffffff returned -22 binder: 14804:14818 ioctl 400454d9 20167fd8 returned -22 device syz1 entered promiscuous mode device syz1 left promiscuous mode netlink: 1 bytes leftover after parsing attributes in process `syz-executor4'. device syz1 entered promiscuous mode device syz1 left promiscuous mode netlink: 1 bytes leftover after parsing attributes in process `syz-executor4'. device gre0 entered promiscuous mode device gre0 entered promiscuous mode loop_reread_partitions: partition scan of loop0 (t?`JzP[ p>TK6C="L l!V #F-') failed (rc=-13)