================================================================== BUG: KASAN: use-after-free in __read_once_size include/linux/compiler.h:243 [inline] at addr ffff8801cf2c3620 BUG: KASAN: use-after-free in atomic_read arch/x86/include/asm/atomic.h:26 [inline] at addr ffff8801cf2c3620 BUG: KASAN: use-after-free in static_key_count include/linux/jump_label.h:174 [inline] at addr ffff8801cf2c3620 BUG: KASAN: use-after-free in static_key_false include/linux/jump_label.h:184 [inline] at addr ffff8801cf2c3620 BUG: KASAN: use-after-free in perf_sw_event include/linux/perf_event.h:1039 [inline] at addr ffff8801cf2c3620 BUG: KASAN: use-after-free in __do_page_fault+0xc80/0xd70 arch/x86/mm/fault.c:1438 at addr ffff8801cf2c3620 Read of size 8 by task syz-executor7/4431 CPU: 0 PID: 4431 Comm: syz-executor7 Not tainted 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d5c87d88 ffffffff81d90429 ffff8801da155140 ffff8801cf2c35d0 ffff8801cf2c3688 ffffed0039e586c4 ffff8801cf2c3620 ffff8801d5c87db0 ffffffff8153a3ac ffffed0039e586c4 ffff8801da155140 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] kasan_object_err+0x1c/0x70 mm/kasan/report.c:160 [] print_address_description mm/kasan/report.c:198 [inline] [] kasan_report_error mm/kasan/report.c:287 [inline] [] kasan_report.part.1+0x21c/0x500 mm/kasan/report.c:309 [] kasan_report mm/kasan/report.c:330 [inline] [] __asan_report_load8_noabort+0x29/0x30 mm/kasan/report.c:330 [] __read_once_size include/linux/compiler.h:243 [inline] [] atomic_read arch/x86/include/asm/atomic.h:26 [inline] [] static_key_count include/linux/jump_label.h:174 [inline] [] static_key_false include/linux/jump_label.h:184 [inline] [] perf_sw_event include/linux/perf_event.h:1039 [inline] [] __do_page_fault+0xc80/0xd70 arch/x86/mm/fault.c:1438 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 Object at ffff8801cf2c35d0, in cache vm_area_struct size: 184 Allocated: PID = 4431 save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:57 save_stack+0x43/0xd0 mm/kasan/kasan.c:495 set_track mm/kasan/kasan.c:507 [inline] kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:598 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:537 slab_post_alloc_hook mm/slab.h:417 [inline] slab_alloc_node mm/slub.c:2715 [inline] slab_alloc mm/slub.c:2723 [inline] kmem_cache_alloc+0xba/0x290 mm/slub.c:2728 kmem_cache_zalloc include/linux/slab.h:626 [inline] mmap_region+0x587/0xfd0 mm/mmap.c:1662 do_mmap+0x57b/0xbe0 mm/mmap.c:1473 do_mmap_pgoff include/linux/mm.h:2018 [inline] vm_mmap_pgoff+0x16b/0x1b0 mm/util.c:305 SYSC_mmap_pgoff mm/mmap.c:1523 [inline] SyS_mmap_pgoff+0xd0/0x560 mm/mmap.c:1481 SYSC_mmap arch/x86/kernel/sys_x86_64.c:95 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:86 entry_SYSCALL_64_fastpath+0x23/0xc6 Freed: PID = 4441 save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:57 save_stack+0x43/0xd0 mm/kasan/kasan.c:495 set_track mm/kasan/kasan.c:507 [inline] kasan_slab_free+0x73/0xc0 mm/kasan/kasan.c:571 slab_free_hook mm/slub.c:1355 [inline] slab_free_freelist_hook mm/slub.c:1377 [inline] slab_free mm/slub.c:2958 [inline] kmem_cache_free+0xb2/0x2e0 mm/slub.c:2980 remove_vma+0x11d/0x160 mm/mmap.c:175 remove_vma_list mm/mmap.c:2482 [inline] do_munmap+0x7ff/0xeb0 mm/mmap.c:2705 mmap_region+0x14d/0xfd0 mm/mmap.c:1635 do_mmap+0x57b/0xbe0 mm/mmap.c:1473 do_mmap_pgoff include/linux/mm.h:2018 [inline] vm_mmap_pgoff+0x16b/0x1b0 mm/util.c:305 SYSC_mmap_pgoff mm/mmap.c:1523 [inline] SyS_mmap_pgoff+0xd0/0x560 mm/mmap.c:1481 SYSC_mmap arch/x86/kernel/sys_x86_64.c:95 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:86 entry_SYSCALL_64_fastpath+0x23/0xc6 Memory state around the buggy address: ffff8801cf2c3500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8801cf2c3580: fb fb fc fc fc fc fc fc fc fc fb fb fb fb fb fb >ffff8801cf2c3600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8801cf2c3680: fb fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb ffff8801cf2c3700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== cgroup: cgroup2: unknown option "" FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 4531 Comm: syz-executor6 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801aa497920 ffffffff81d90429 ffff8801aa497c00 0000000000000000 ffff8801a4716e90 ffff8801aa497af0[ 40.807979] device gre0 entered promiscuous mode ffff8801a4716d80 ffff8801aa497b18 ffffffff8165e3c7 0000000000000000 ffff8801aa497a70 00000001abc1f067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 4531 Comm: syz-executor6 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801aa497920 ffffffff81d90429 ffff8801aa497c00 0000000000000000 ffff8801a5951010 ffff8801aa497af0 ffff8801a5950f00 ffff8801aa497b18 ffffffff8165e3c7 0000000000000000 ffff8801aa497a70 00000001abc1f067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 CPU: 0 PID: 4518 Comm: syz-executor6 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801ca94f930 ffffffff81d90429 ffff8801ca94fc10 0000000000000000 ffff8801a5951010 ffff8801ca94fb00 ffff8801a5950f00 ffff8801ca94fb28 ffffffff8165e3c7 ffff8801ca94fac8 ffff8801ca94fa80 00000001abc1f067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 binder: 4641:4643 ioctl 4b44 2004dff8 returned -22 binder: 4676:4677 ioctl 8905 20ef6000 returned -22 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 4660 Comm: syz-executor2 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cf05f9c0 ffffffff81d90429 ffff8801cf05fca0 0000000000000000 ffff8801a4717490 ffff8801cf05fb90 ffff8801a4717380 ffff8801cf05fbb8 ffffffff8165e3c7 f24470a55849e109 ffff8801cf05fb10 00000001d1ce5067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] SYSC_keyctl security/keys/keyctl.c:1604 [inline] [] SyS_keyctl+0x1fb/0x230 security/keys/keyctl.c:1592 [] entry_SYSCALL_64_fastpath+0x23/0xc6 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 4640 Comm: syz-executor2 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801aa307990 ffffffff81d90429 ffff8801aa307c70 0000000000000000 ffff8801a4717490 ffff8801aa307b60 ffff8801a4717380 ffff8801aa307b88 ffffffff8165e3c7 0000000000000000 ffff8801aa307ae0 00000001d1ce5067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 binder: 4641:4643 ioctl 4b44 2004dff8 returned -22 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 4640 Comm: syz-executor2 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801aa307990 ffffffff81d90429 ffff8801aa307c70 0000000000000000 ffff8801a5951310 ffff8801aa307b60 ffff8801a5951200 ffff8801aa307b88 ffffffff8165e3c7 ffffffff810ec920 ffff8801aa307ae0 00000001cf77a067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 4660 Comm: syz-executor2 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cf05f9c0 ffffffff81d90429 ffff8801cf05fca0 0000000000000000 ffff8801a5951310 ffff8801cf05fb90 ffff8801a5951200 ffff8801cf05fbb8 ffffffff8165e3c7 f24470a55849e109 ffff8801cf05fb10 00000001cf77a067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] SYSC_keyctl security/keys/keyctl.c:1604 [inline] [] SyS_keyctl+0x1fb/0x230 security/keys/keyctl.c:1592 [] entry_SYSCALL_64_fastpath+0x23/0xc6 device gre0 entered promiscuous mode binder: 4676:4695 ioctl c0206434 20630fe0 returned -22 binder: 4676:4732 ioctl 8905 20ef6000 returned -22 binder: 4676:4732 ioctl c0206434 20630fe0 returned -22 device gre0 entered promiscuous mode device gre0 entered promiscuous mode sg_write: data in/out 262364/161 bytes for SCSI command 0xff-- guessing data in; program syz-executor3 not setting count and/or reply_len properly binder: 4796:4797 ioctl c0106426 20435ff0 returned -22 binder: 4796:4805 ioctl c0106426 20435ff0 returned -22 device gre0 entered promiscuous mode TCP: request_sock_TCP: Possible SYN flooding on port 20013. Sending cookies. Check SNMP counters. capability: warning: `syz-executor1' uses deprecated v2 capabilities in a way that may be insecure nla_parse: 7 callbacks suppressed netlink: 5 bytes leftover after parsing attributes in process `syz-executor1'. loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. binder: 4932:4938 ioctl 5411 20000ffc returned -22 binder: 4966:4972 ioctl 541c 20647000 returned -22 binder: 4966:4972 ioctl 8955 20a1e000 returned -22 netlink: 5 bytes leftover after parsing attributes in process `syz-executor1'. binder: 4932:4938 ioctl 5411 20000ffc returned -22 netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. binder: 4996:4997 ioctl 8905 20ef6000 returned -22 binder: 4996:4997 ioctl c0206434 20630fe0 returned -22 binder: 4966:5004 ioctl 541c 20647000 returned -22 netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. binder: 4996:4999 ioctl 8905 20ef6000 returned -22 binder: 4966:4992 ioctl 8955 20a1e000 returned -22 loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) binder: 4996:4999 ioctl c0206434 20630fe0 returned -22 netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. binder: 5037:5042 ioctl 8905 20ef6000 returned -22 device lo entered promiscuous mode binder: 5037:5042 ioctl c0206434 20630fe0 returned -22 binder: 5037:5055 ioctl 8905 20ef6000 returned -22 binder: 5037:5055 ioctl c0206434 20630fe0 returned -22 device lo left promiscuous mode device lo entered promiscuous mode device lo entered promiscuous mode qtaguid: iface_stat: create(lo): no inet dev qtaguid: iface_stat: create6(lo): no inet dev IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready qtaguid: iface_stat: create6(lo): no inet dev device lo left promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode qtaguid: iface_stat: create(lo): no inet dev qtaguid: iface_stat: create6(lo): no inet dev IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready qtaguid: iface_stat: create6(lo): no inet dev device lo left promiscuous mode sd 0:0:1:0: [sg0] tag#1014 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK binder_alloc: binder_alloc_mmap_handler: 5238 2076f000-20772000 already mapped failed -16 sd 0:0:1:0: [sg0] tag#1014 CDB: opcode=0xff (vendor) sd 0:0:1:0: [sg0] tag#1014 CDB[00]: ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#1014 CDB[10]: 00 00 00 00 10 27 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#1014 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#1014 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#683 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#683 CDB: opcode=0xff (vendor) sd 0:0:1:0: [sg0] tag#683 CDB[00]: ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#683 CDB[10]: 00 00 00 00 10 27 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#683 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#683 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 selinux_nlmsg_perm: 10 callbacks suppressed SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57789 sclass=netlink_route_socket pig=5277 comm=syz-executor2 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5296 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57789 sclass=netlink_route_socket pig=5291 comm=syz-executor2 øÿÿÿ: renamed from lo SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5331 comm=syz-executor4 device gre0 entered promiscuous mode FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 5332 Comm: syz-executor0 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801ac18f940 ffffffff81d90429 ffff8801ac18fc20 0000000000000000 ffff8801ceab8590 ffff8801ac18fb10 ffff8801ceab8480 ffff8801ac18fb38 ffffffff8165e3c7 1ffff10035831f2f ffff8801ac18fa90 00000001c679c067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 netlink: 2 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor7'. Option '9˜ŸT§' to dns_resolver key: bad/missing value Option '9˜ŸT§' to dns_resolver key: bad/missing value device eql entered promiscuous mode skbuff: bad partial csum: csum=65534/0 len=32 device lo entered promiscuous mode qtaguid: iface_stat: create(lo): no inet dev qtaguid: iface_stat: create6(lo): no inet dev IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready binder: 5506:5525 ioctl c058534b 2016cfa8 returned -22 binder: 5506:5525 ioctl c008640a 20997000 returned -22 qtaguid: iface_stat: create6(lo): no inet dev device gre0 entered promiscuous mode loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) binder: 5506:5525 ioctl c058534b 2016cfa8 returned -22 binder: 5506:5510 ioctl c008640a 20997000 returned -22 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=17511 sclass=netlink_route_socket pig=5538 comm=syz-executor5 device gre0 entered promiscuous mode loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) SELinux: unrecognized netlink message: protocol=0 nlmsg_type=17511 sclass=netlink_route_socket pig=5547 comm=syz-executor5 sg_write: data in/out 1019840016/19 bytes for SCSI command 0x78-- guessing data in; program syz-executor5 not setting count and/or reply_len properly device gre0 entered promiscuous mode device gre0 entered promiscuous mode netlink: 56 bytes leftover after parsing attributes in process `syz-executor5'. device gre0 entered promiscuous mode netlink: 5 bytes leftover after parsing attributes in process `syz-executor3'. 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 device lo entered promiscuous mode sock: sock_set_timeout: `syz-executor2' (pid 5767) tries to set negative timeout device lo left promiscuous mode device lo entered promiscuous mode sock: sock_set_timeout: `syz-executor2' (pid 5767) tries to set negative timeout device lo left promiscuous mode SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2 sclass=netlink_xfrm_socket pig=5809 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2 sclass=netlink_xfrm_socket pig=5820 comm=syz-executor5 binder: 5881:5882 ioctl 8018456f 20ae7000 returned -22 binder: 5881:5882 ioctl 8018456f 20ae7000 returned -22 TCP: request_sock_TCPv6: Possible SYN flooding on port 20014. Sending cookies. Check SNMP counters. SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=5954 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5954 comm=syz-executor7 handle_userfault: 4 callbacks suppressed FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 6015 Comm: syz-executor5 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801ac4e7970 ffffffff81d90429 ffff8801ac4e7c50 0000000000000000 ffff8801ceab8a10 ffff8801ac4e7b40 ffff8801ceab8900 ffff8801ac4e7b68 ffffffff8165e3c7 ffffffff84186db4 ffff8801ac4e7ac0 00000001d5053067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 6005 Comm: syz-executor5 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d233f8a0 ffffffff81d90429 ffff8801d233fb80 0000000000000000 ffff8801ceab8a10 ffff8801d233fa70 ffff8801ceab8900 ffff8801d233fa98 ffffffff8165e3c7 ffff8801ab40b480 ffff8801d233f9f0 00000001d5053067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 binder: 6027:6035 ioctl 40485404 20000fb8 returned -22 binder: 6027:6035 ioctl c08c5334 20001f74 returned -22 binder: 6027:6035 ioctl 40485404 20000fb8 returned -22 device gre0 entered promiscuous mode binder: 6027:6041 ioctl c08c5334 20001f74 returned -22 device gre0 left promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode CPU: 1 PID: 6024 Comm: syz-executor5 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801aae0f940 ffffffff81d90429 ffff8801aae0fc20 0000000000000000 ffff8801ceab8a10 ffff8801aae0fb10 ffff8801ceab8900 ffff8801aae0fb38 ffffffff8165e3c7 1ffff100355c1f2f ffff8801aae0fa90 00000001d5053067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 IPVS: Creating netns size=2536 id=11 device gre0 entered promiscuous mode IPVS: Creating netns size=2536 id=12 loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 6306 Comm: syz-executor2 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d222f870 ffffffff81d90429 ffff8801d222fb50 0000000000000000 ffff8801ceab8d10 ffff8801d222fa40 ffff8801ceab8c00 ffff8801d222fa68 ffffffff8165e3c7 00fff1003a445f24 ffff8801d222f9c0 00000001c6a7a067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] do_syscall_64+0x197/0x490 arch/x86/entry/common.c:280 [] entry_SYSCALL64_slow_path+0x25/0x25 CPU: 1 PID: 6316 Comm: syz-executor2 Tainted: G B 4.9.64-gfbb7468 #94 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d8ab76e0 ffffffff81d90429 ffff8801d8ab79c0 0000000000000000 ffff8801ceab8d10 ffff8801d8ab78b0 ffff8801ceab8c00 ffff8801d8ab78d8 ffffffff8165e3c7 ffffffff812395a0 ffff8801d8ab7830 00000001c6a7a067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 9pnet_virtio: no channels available for device H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H binder: 6336:6338 ioctl 5603 20e9affa returned -22 binder: 6336:6338 ioctl 4b61 20c93000 returned -22 binder: 6336:6338 ioctl c0bc5310 20612000 returned -22 nla_parse: 5 callbacks suppressed netlink: 11 bytes leftover after parsing attributes in process `syz-executor0'. binder: 6336:6353 ioctl 4b63 205df000 returned -22 binder: 6336:6361 ioctl 4b69 20fb7f68 returned -22 binder: 6336:6367 ioctl 5603 20e9affa returned -22 9pnet_virtio: no channels available for device H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H¨H netlink: 11 bytes leftover after parsing attributes in process `syz-executor0'. binder: 6336:6361 ioctl 4b61 20c93000 returned -22 binder: 6336:6361 ioctl c0bc5310 20612000 returned -22 binder: 6336:6361 ioctl 4b63 205df000 returned -22 binder: 6336:6382 ioctl 4b69 20fb7f68 returned -22 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] vfs_ioctl fs/ioctl.c:43 [inline] [] do_vfs_ioctl+0x1aa/0x1140 fs/ioctl.c:679 [] SYSC_ioctl fs/ioctl.c:694 [inline] [] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:685 [] entry_SYSCALL_64_fastpath+0x23/0xc6 device gre0 entered promiscuous mode binder: 6445:6446 ioctl c02c5341 20493f98 returned -22 PF_BRIDGE: RTM_NEWNEIGH with unknown ifindex PF_BRIDGE: RTM_NEWNEIGH with unknown ifindex binder: 6445:6464 ioctl c02c5341 20493f98 returned -22 netlink: 13 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 13 bytes leftover after parsing attributes in process `syz-executor2'. device gre0 entered promiscuous mode device gre0 left promiscuous mode device gre0 entered promiscuous mode device gre0 left promiscuous mode netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. selinux_nlmsg_perm: 11 callbacks suppressed SELinux: unrecognized netlink message: protocol=4 nlmsg_type=6 sclass=netlink_tcpdiag_socket pig=6743 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=6 sclass=netlink_tcpdiag_socket pig=6743 comm=syz-executor3 device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pig=6812 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pig=6812 comm=syz-executor4 ALSA: seq fatal error: cannot create timer (-19) ALSA: seq fatal error: cannot create timer (-19)