device syz4 left promiscuous mode ================================================================== BUG: KASAN: wild-memory-access on address ffe7087450821000 Read of size 37 by task syz-executor7/27703 CPU: 0 PID: 27703 Comm: syz-executor7 Not tainted 4.9.52-gc30c69c #54 device syz4 entered promiscuous mode Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801c7157ae8 ffffffff81d93149 ffe7087450821000 0000000000000025 0000000000000000 ffff8801c867cc60 ffe7087450821000 ffff8801c7157b70 ffffffff8153d08f 0000000000000000 0000000000000001 ffffffff826648db Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] kasan_report_error mm/kasan/report.c:284 [inline] [] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309 [] kasan_report+0x20/0x30 mm/kasan/report.c:296 [] check_memory_region_inline mm/kasan/kasan.c:308 [inline] [] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315 [] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320 [] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline] [] sg_read_oxfer drivers/scsi/sg.c:1978 [inline] [] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520 [] __vfs_read+0x103/0x670 fs/read_write.c:452 [] vfs_read+0x107/0x330 fs/read_write.c:475 [] SYSC_read fs/read_write.c:591 [inline] [] SyS_read+0xd9/0x1b0 fs/read_write.c:584 [] entry_SYSCALL_64_fastpath+0x23/0xc6 ================================================================== device syz4 left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode selinux_nlmsg_perm: 2 callbacks suppressed SELinux: unrecognized netlink message: protocol=4 nlmsg_type=36 sclass=netlink_tcpdiag_socket pig=27792 comm=syz-executor5 device lo entered promiscuous mode device lo left promiscuous mode FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 27789 Comm: syz-executor4 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801c7ed7920 ffffffff81d93149 ffff8801c7ed7c00 0000000000000000 ffff8801ca56f610 ffff8801c7ed7af0 ffff8801ca56f500 ffff8801c7ed7b18 ffffffff81660dc8 ffff8801c7ed7a70 ffff8801c7ed7998 00000001c8714067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] seccomp_prepare_filter kernel/seccomp.c:373 [inline] [] seccomp_prepare_user_filter kernel/seccomp.c:408 [inline] [] seccomp_set_mode_filter kernel/seccomp.c:741 [inline] [] do_seccomp+0x632/0x1810 kernel/seccomp.c:791 [] SYSC_seccomp kernel/seccomp.c:800 [inline] [] SyS_seccomp+0x24/0x30 kernel/seccomp.c:797 [] entry_SYSCALL_64_fastpath+0x23/0xc6 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=36 sclass=netlink_tcpdiag_socket pig=27821 comm=syz-executor5 device lo entered promiscuous mode device lo left promiscuous mode CPU: 1 PID: 27801 Comm: syz-executor4 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cbebf9a0 ffffffff81d93149 ffff8801cbebfc80 0000000000000000 ffff8801ca56f610 ffff8801cbebfb70 ffff8801ca56f500 ffff8801cbebfb98 ffffffff81660dc8 ffff8801cbebfaf0 ffff8801cbebfbb8 00000001c8714067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 27789 Comm: syz-executor4 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801c7ed7920 ffffffff81d93149 ffff8801c7ed7c00 0000000000000000 ffff8801a871eb90 ffff8801c7ed7af0 ffff8801a871ea80 ffff8801c7ed7b18 ffffffff81660dc8 ffff8801c7ed7a70 ffff8801c7ed7998 00000001c8714067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] seccomp_prepare_filter kernel/seccomp.c:373 [inline] [] seccomp_prepare_user_filter kernel/seccomp.c:408 [inline] [] seccomp_set_mode_filter kernel/seccomp.c:741 [inline] [] do_seccomp+0x632/0x1810 kernel/seccomp.c:791 [] SYSC_seccomp kernel/seccomp.c:800 [inline] [] SyS_seccomp+0x24/0x30 kernel/seccomp.c:797 [] entry_SYSCALL_64_fastpath+0x23/0xc6 binder: 27886:27889 ioctl c08c5335 209dcf74 returned -22 binder: 27886:27921 ioctl c08c5335 209dcf74 returned -22 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27964 comm=syz-executor2