device syz4 left promiscuous mode ================================================================== BUG: KASAN: wild-memory-access on address ffe708746d9bf000 Read of size 55 by task syz-executor3/13772 CPU: 1 PID: 13772 Comm: syz-executor3 Not tainted 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d6fcf9e8 ffffffff81d93149 ffe708746d9bf000 0000000000000037 0000000000000000 ffff8801a82143c0 ffe708746d9bf000 ffff8801d6fcfa70 ffffffff8153d08f 0000000000000000 0000000000000001 ffffffff826648db Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] kasan_report_error mm/kasan/report.c:284 [inline] [] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309 [] kasan_report+0x20/0x30 mm/kasan/report.c:296 [] check_memory_region_inline mm/kasan/kasan.c:308 [inline] [] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315 [] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320 [] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline] [] sg_read_oxfer drivers/scsi/sg.c:1978 [inline] [] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520 [] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714 [] do_loop_readv_writev fs/read_write.c:880 [inline] [] do_readv_writev+0x520/0x750 fs/read_write.c:874 [] vfs_readv+0x84/0xc0 fs/read_write.c:898 [] do_readv+0xe6/0x250 fs/read_write.c:924 [] SYSC_readv fs/read_write.c:1011 [inline] [] SyS_readv+0x27/0x30 fs/read_write.c:1008 [] entry_SYSCALL_64_fastpath+0x23/0xc6 ================================================================== device syz4 entered promiscuous mode ALSA: seq fatal error: cannot create timer (-22) keychord: invalid keycode count 0 keychord: invalid keycode count 0 ALSA: seq fatal error: cannot create timer (-22) FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 13824 Comm: syz-executor3 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801a142f9a0 ffffffff81d93149 ffff8801a142fc80 0000000000000000 ffff8801cbfdbc10 ffff8801a142fb70 ffff8801cbfdbb00 ffff8801a142fb98 ffffffff81660dc8 ffff8801a142faf0 ffff8801a5471ff8 00000001ab678067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 device lo left promiscuous mode device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready device lo left promiscuous mode netlink: 1 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. binder: 14000:14004 ioctl c08c5336 20d23f74 returned -22 binder: 14000:14004 ioctl 5404 20d2a000 returned -22 binder: 14000:14004 ioctl 800454d7 20c8d000 returned -22 binder: 14000:14004 ioctl c08c5336 20d23f74 returned -22 binder: 14000:14046 ioctl 5404 20d2a000 returned -22 binder: 14000:14046 ioctl 800454d7 20c8d000 returned -22 FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 14173 Comm: syz-executor7 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801adebf720 ffffffff81d93149 ffff8801adebfa00 0000000000000000 ffff8801cbfdbd90 ffff8801adebf8f0 ffff8801cbfdbc80 ffff8801adebf918 ffffffff81660dc8 ffff8801adebf870 ffff8801aa608080 00000001ab1c8067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] sock_do_ioctl+0x94/0xb0 net/socket.c:899 [] sock_ioctl+0x2e0/0x3d0 net/socket.c:978 [] vfs_ioctl fs/ioctl.c:43 [inline] [] do_vfs_ioctl+0x1aa/0x10c0 fs/ioctl.c:679 [] SYSC_ioctl fs/ioctl.c:694 [inline] [] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:685 [] entry_SYSCALL_64_fastpath+0x23/0xc6 sock: process `syz-executor3' is using obsolete getsockopt SO_BSDCOMPAT CPU: 0 PID: 14188 Comm: syz-executor7 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801ab647a00 ffffffff81d93149 ffff8801ab647ce0 0000000000000000 ffff8801cbfdbd90 ffff8801ab647bd0 ffff8801cbfdbc80 ffff8801ab647bf8 ffffffff81660dc8 ffff8801ab647b50 0000000041b58ab3 00000001ab1c8067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 left promiscuous mode device gre0 entered promiscuous mode device gre0 left promiscuous mode binder: 14390:14405 ioctl 2403 7fff returned -22 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=770 sclass=netlink_xfrm_socket pig=14396 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=770 sclass=netlink_xfrm_socket pig=14396 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=770 sclass=netlink_xfrm_socket pig=14454 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=770 sclass=netlink_xfrm_socket pig=14458 comm=syz-executor7 binder: 14390:14465 ioctl 2403 7fff returned -22 binder: 14495:14510 ioctl c020aa00 20c51000 returned -22 binder: 14497:14512 ioctl c0086420 20001000 returned -22 binder: 14497:14512 ioctl c0406429 20001000 returned -22 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 14512 Comm: syz-executor2 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801a9fa79a0 ffffffff81d93149 ffff8801a9fa7c80 0000000000000000 ffff8801cbfdb310 ffff8801a9fa7b70 ffff8801cbfdb200 ffff8801a9fa7b98 ffffffff81660dc8 ffff8801a9fa7af0 ffff8801a9fa7bb8 00000001cd66d067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 binder: 14497:14512 ioctl c0086420 20001000 returned -22 binder: 14497:14542 ioctl c0406429 20001000 returned -22 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 14645 Comm: syz-executor6 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cb12f720 ffffffff81d93149 ffff8801cb12fa00 0000000000000000 ffff8801cbfdbd90 ffff8801cb12f8f0 ffff8801cbfdbc80 ffff8801cb12f918 ffffffff81660dc8 ffff8801cb12f870 ffff8801cd850080 00000001a4928067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] sock_do_ioctl+0x94/0xb0 net/socket.c:899 [] sock_ioctl+0x2e0/0x3d0 net/socket.c:978 [] vfs_ioctl fs/ioctl.c:43 [inline] [] do_vfs_ioctl+0x1aa/0x10c0 fs/ioctl.c:679 [] SYSC_ioctl fs/ioctl.c:694 [inline] [] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:685 [] entry_SYSCALL_64_fastpath+0x23/0xc6 binder: 14713:14717 ioctl 4b3b 81 returned -22 device gre0 entered promiscuous mode binder: 14713:14717 ioctl 4b3b 81 returned -22 binder: 14732:14733 ioctl 80605414 20fcc000 returned -22 binder: 14732:14733 ioctl 2403 ed9 returned -22 binder: 14732:14733 ioctl 541c 20fceffe returned -22 binder: 14732:14733 ioctl 80605414 20fcc000 returned -22 binder: 14732:14733 ioctl 2403 ed9 returned -22 binder: 14732:14746 ioctl 541c 20fceffe returned -22 binder_alloc: binder_alloc_mmap_handler: 14810 204f0000-204f4000 already mapped failed -16 binder_alloc: binder_alloc_mmap_handler: 14810 204f0000-204f4000 already mapped failed -16 blk_update_request: 118 callbacks suppressed blk_update_request: I/O error, dev loop5, sector 0 blk_update_request: I/O error, dev loop5, sector 0 device gre0 entered promiscuous mode SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15161 comm=syz-executor4 TCP: request_sock_TCP: Possible SYN flooding on port 20005. Sending cookies. Check SNMP counters. FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 15198 Comm: syz-executor1 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d237f920 ffffffff81d93149 ffff8801d237fc00 0000000000000000 ffff880194be4110 ffff8801d237faf0 ffff880194be4000 ffff8801d237fb18 ffffffff81660dc8 ffff8801d237fa70 dffffc0000000000 00000001abac5067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] SyS_mq_getsetattr+0x24/0x30 ipc/mqueue.c:1321 [] entry_SYSCALL_64_fastpath+0x23/0xc6 nla_parse: 15 callbacks suppressed netlink: 2 bytes leftover after parsing attributes in process `syz-executor5'. IPv6: Can't replace route, no match found program syz-executor4 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 netlink: 2 bytes leftover after parsing attributes in process `syz-executor5'. IPv6: Can't replace route, no match found program syz-executor4 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 CPU: 1 PID: 15186 Comm: syz-executor1 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801ab59f9e0 ffffffff81d93149 ffff8801ab59fcc0 0000000000000000 ffff880194be4110 ffff8801ab59fbb0 ffff880194be4000 ffff8801ab59fbd8 ffffffff81660dc8 ffff8801ab59fb30 ffffffff00000000 00000001abac5067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 15186 Comm: syz-executor1 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801ab59f9e0 ffffffff81d93149 ffff8801ab59fcc0 0000000000000000 ffff880194be5a90 ffff8801ab59fbb0 ffff880194be5980 ffff8801ab59fbd8 ffffffff81660dc8 ffff8801ab59fb30 ffff8801cfec3000 00000001abac5067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 CPU: 1 PID: 15198 Comm: syz-executor1 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d237f920 ffffffff81d93149 ffff8801d237fc00 0000000000000000 ffff880194be5a90 ffff8801d237faf0 ffff880194be5980 ffff8801d237fb18 ffffffff81660dc8 ffff8801d237fa70 dffffc0000000000 00000001abac5067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] SyS_mq_getsetattr+0x24/0x30 ipc/mqueue.c:1321 [] entry_SYSCALL_64_fastpath+0x23/0xc6 device syz7 left promiscuous mode device gre0 entered promiscuous mode device gre0 left promiscuous mode 9pnet_virtio: no channels available for device ./file0 device gre0 entered promiscuous mode device gre0 left promiscuous mode 9pnet_virtio: no channels available for device ./file0 IPVS: Creating netns size=2536 id=39 IPVS: Creating netns size=2536 id=40 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 15379 Comm: syz-executor5 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cdfbfa00 ffffffff81d93149 ffff8801cdfbfce0 0000000000000000 ffff8801cbfdaa10 ffff8801cdfbfbd0 ffff8801cbfda900 ffff8801cdfbfbf8 ffffffff81660dc8 ffff8801cdfbfb50 0000000041b58ab3 00000001aa296067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. device gre0 entered promiscuous mode netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor0'. blk_update_request: I/O error, dev loop5, sector 0 blk_update_request: I/O error, dev loop5, sector 0 device gre0 entered promiscuous mode devpts: called with bogus options SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=15633 comm=syz-executor1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15633 comm=syz-executor1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=15633 comm=syz-executor1 devpts: called with bogus options SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15659 comm=syz-executor1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15694 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15710 comm=syz-executor4 sock: sock_set_timeout: `syz-executor0' (pid 15738) tries to set negative timeout netlink: 1 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor6'. SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15784 comm=syz-executor1 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15784 comm=syz-executor1 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=15794 comm=syz-executor1 IPv6: NLM_F_CREATE should be specified when creating new route IPv6: NLM_F_REPLACE set, but no existing node found! IPv6: NLM_F_REPLACE set, but no existing node found! device gre0 entered promiscuous mode FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 15812 Comm: syz-executor5 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801c9857930 ffffffff81d93149 ffff8801c9857c10 0000000000000000 ffff8801cbfdb010 ffff8801c9857b00 ffff8801cbfdaf00 ffff8801c9857b28 ffffffff81660dc8 ffff8801c9857a80 ffffffff8418567c 00000001c8891067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 15816 Comm: syz-executor5 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d5fc79f0 ffffffff81d93149 ffff8801d5fc7cd0 0000000000000000 ffff880194be4e90 ffff8801d5fc7bc0 ffff880194be4d80 ffff8801d5fc7be8 ffffffff81660dc8 ffff8801d5fc7b40 00000000007180d8 00000001aab65067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 CPU: 1 PID: 15812 Comm: syz-executor5 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801c9857930 ffffffff81d93149 ffff8801c9857c10 0000000000000000 ffff880194be4e90 ffff8801c9857b00 ffff880194be4d80 ffff8801c9857b28 ffffffff81660dc8 ffff8801c9857a80 ffffffff8418567c 00000001aab65067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 binder: 15889:15890 ioctl 5404 2024a000 returned -22 binder: 15889:15890 ioctl 8901 209b0ffc returned -22 binder: 15889:15890 ioctl 540a 7fff returned -22 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 15878 Comm: syz-executor3 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801ad7afa00 ffffffff81d93149 ffff8801ad7afce0 0000000000000000 ffff880194be5d90 ffff8801ad7afbd0 ffff880194be5c80 ffff8801ad7afbf8 ffffffff81660dc8 ffff8801ad7afb50 0000000041b58ab3 00000001a8261067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 15862 Comm: syz-executor3 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d22af720 ffffffff81d93149 ffff8801d22afa00 0000000000000000 ffff880194be5d90 ffff8801d22af8f0 ffff880194be5c80 ffff8801d22af918 ffffffff81660dc8 ffff8801d22af870 ffff8801abf91880 00000001a8261067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] sock_do_ioctl+0x94/0xb0 net/socket.c:899 [] sock_ioctl+0x2e0/0x3d0 net/socket.c:978 [] vfs_ioctl fs/ioctl.c:43 [inline] [] do_vfs_ioctl+0x1aa/0x10c0 fs/ioctl.c:679 [] SYSC_ioctl fs/ioctl.c:694 [inline] [] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:685 [] entry_SYSCALL_64_fastpath+0x23/0xc6 device syz3 left promiscuous mode binder: 15889:15916 ioctl 5404 2024a000 returned -22 binder: 15889:15904 ioctl 8901 209b0ffc returned -22 binder: 15889:15904 ioctl 540a 7fff returned -22 binder: 15889:15904 ioctl 4b2f 0 returned -22 sock: process `syz-executor6' is using obsolete getsockopt SO_BSDCOMPAT TCP: lo: Driver has suspect GRO implementation, TCP performance may be compromised. device lo left promiscuous mode program syz-executor0 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 program syz-executor0 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 program syz-executor0 is using a deprecated SCSI ioctl, please convert it to SG_IO program syz-executor0 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 binder: 16185:16189 ioctl 4b3b 81 returned -22 binder: 16185:16189 ioctl 4b3b 81 returned -22 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 sg_write: data in/out 34319/34 bytes for SCSI command 0xfc-- guessing data in; program syz-executor7 not setting count and/or reply_len properly