================================================================== BUG: KASAN: use-after-free in __read_once_size include/linux/compiler.h:243 [inline] at addr ffff8801d6f91430 BUG: KASAN: use-after-free in atomic_read arch/x86/include/asm/atomic.h:26 [inline] at addr ffff8801d6f91430 BUG: KASAN: use-after-free in static_key_count include/linux/jump_label.h:174 [inline] at addr ffff8801d6f91430 BUG: KASAN: use-after-free in static_key_false include/linux/jump_label.h:184 [inline] at addr ffff8801d6f91430 BUG: KASAN: use-after-free in perf_sw_event include/linux/perf_event.h:1039 [inline] at addr ffff8801d6f91430 BUG: KASAN: use-after-free in __do_page_fault+0xc80/0xd70 arch/x86/mm/fault.c:1438 at addr ffff8801d6f91430 Read of size 8 by task syz-executor2/14816 CPU: 0 PID: 14816 Comm: syz-executor2 Not tainted 4.9.62-gf09daf1 #91 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801ac107d88 ffffffff81d94429 ffff8801da155140 ffff8801d6f913e0 ffff8801d6f91498 ffffed003adf2286 ffff8801d6f91430 ffff8801ac107db0 ffffffff8153e3ac ffffed003adf2286 ffff8801da155140 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] kasan_object_err+0x1c/0x70 mm/kasan/report.c:160 [] print_address_description mm/kasan/report.c:198 [inline] [] kasan_report_error mm/kasan/report.c:287 [inline] [] kasan_report.part.1+0x21c/0x500 mm/kasan/report.c:309 [] kasan_report mm/kasan/report.c:330 [inline] [] __asan_report_load8_noabort+0x29/0x30 mm/kasan/report.c:330 [] __read_once_size include/linux/compiler.h:243 [inline] [] atomic_read arch/x86/include/asm/atomic.h:26 [inline] [] static_key_count include/linux/jump_label.h:174 [inline] [] static_key_false include/linux/jump_label.h:184 [inline] [] perf_sw_event include/linux/perf_event.h:1039 [inline] [] __do_page_fault+0xc80/0xd70 arch/x86/mm/fault.c:1438 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 Object at ffff8801d6f913e0, in cache vm_area_struct size: 184 Allocated: PID = 14816 save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:57 save_stack+0x43/0xd0 mm/kasan/kasan.c:495 set_track mm/kasan/kasan.c:507 [inline] kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:598 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:537 slab_post_alloc_hook mm/slab.h:417 [inline] slab_alloc_node mm/slub.c:2715 [inline] slab_alloc mm/slub.c:2723 [inline] kmem_cache_alloc+0xba/0x290 mm/slub.c:2728 kmem_cache_zalloc include/linux/slab.h:626 [inline] mmap_region+0x587/0xfd0 mm/mmap.c:1662 do_mmap+0x57b/0xbe0 mm/mmap.c:1473 do_mmap_pgoff include/linux/mm.h:2014 [inline] vm_mmap_pgoff+0x16b/0x1b0 mm/util.c:305 SYSC_mmap_pgoff mm/mmap.c:1523 [inline] SyS_mmap_pgoff+0xd0/0x560 mm/mmap.c:1481 SYSC_mmap arch/x86/kernel/sys_x86_64.c:95 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:86 entry_SYSCALL_64_fastpath+0x23/0xc6 Freed: PID = 14833 save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:57 save_stack+0x43/0xd0 mm/kasan/kasan.c:495 set_track mm/kasan/kasan.c:507 [inline] kasan_slab_free+0x73/0xc0 mm/kasan/kasan.c:571 slab_free_hook mm/slub.c:1355 [inline] slab_free_freelist_hook mm/slub.c:1377 [inline] slab_free mm/slub.c:2958 [inline] kmem_cache_free+0xb2/0x2e0 mm/slub.c:2980 remove_vma+0x11d/0x160 mm/mmap.c:175 remove_vma_list mm/mmap.c:2482 [inline] do_munmap+0x7ff/0xeb0 mm/mmap.c:2705 mmap_region+0x14d/0xfd0 mm/mmap.c:1635 do_mmap+0x57b/0xbe0 mm/mmap.c:1473 do_mmap_pgoff include/linux/mm.h:2014 [inline] vm_mmap_pgoff+0x16b/0x1b0 mm/util.c:305 SYSC_mmap_pgoff mm/mmap.c:1523 [inline] SyS_mmap_pgoff+0xd0/0x560 mm/mmap.c:1481 SYSC_mmap arch/x86/kernel/sys_x86_64.c:95 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:86 entry_SYSCALL_64_fastpath+0x23/0xc6 Memory state around the buggy address: ffff8801d6f91300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8801d6f91380: fb fb fb fb fc fc fc fc fc fc fc fc fb fb fb fb >ffff8801d6f91400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8801d6f91480: fb fb fb fc fc fc fc fc fc fc fc fb fb fb fb fb ffff8801d6f91500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== device gre0 entered promiscuous mode binder: 14978:14981 ioctl 40045201 20000000 returned -22 binder: 14978:14981 ioctl 80045200 20000ffc returned -22 binder: 15004:15007 ioctl 40084503 206baff8 returned -22 binder: 14978:14997 ioctl 40045201 20000000 returned -22 binder: 15004:15012 ioctl 40084503 206baff8 returned -22 binder: 14978:14997 ioctl 80045200 20000ffc returned -22 ALSA: seq fatal error: cannot create timer (-19) binder: 15113:15114 ioctl c08c5335 209dcf74 returned -22 netlink: 13 bytes leftover after parsing attributes in process `syz-executor6'. binder: 15113:15132 ioctl c08c5335 209dcf74 returned -22 IPVS: Creating netns size=2536 id=29 IPv6: Can't replace route, no match found IPVS: Creating netns size=2536 id=30 device gre0 entered promiscuous mode SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=15261 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=202 sclass=netlink_route_socket pig=15261 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=15261 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=202 sclass=netlink_route_socket pig=15261 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=15325 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=202 sclass=netlink_route_socket pig=15325 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=15325 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=202 sclass=netlink_route_socket pig=15365 comm=syz-executor5 device gre0 entered promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode binder: 15631:15634 ioctl 40045201 20000000 returned -22 binder: 15631:15634 ioctl 80045200 20000ffc returned -22 netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. binder: 15631:15634 ioctl 40045201 20000000 returned -22 netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. binder: 15631:15634 ioctl 80045200 20000ffc returned -22 IPVS: Creating netns size=2536 id=31 binder: 15739:15740 ioctl c08c5335 209dcf74 returned -22 binder: 15739:15740 ioctl c08c5335 209dcf74 returned -22 pktgen: kernel_thread() failed for cpu 0 pktgen: Cannot create thread for cpu 0 (-4) pktgen: kernel_thread() failed for cpu 1 pktgen: Cannot create thread for cpu 1 (-4) pktgen: Initialization failed for all threads netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor0'. binder: 15908:15915 ioctl 5603 20e9affa returned -22 binder: 15908:15934 ioctl 541b 207c5ffc returned -22 binder: 15908:15915 ioctl 4b69 20fb7f68 returned -22 binder: 15908:15934 ioctl 5603 20e9affa returned -22 binder: 15908:15915 ioctl 541b 207c5ffc returned -22 tmpfs: No value for mount option '‹' binder: 15908:15915 ioctl 4b69 20fb7f68 returned -22 tmpfs: No value for mount option '‹' FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 16051 Comm: syz-executor2 Tainted: G B 4.9.62-gf09daf1 #91 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801a48ef940 ffffffff81d94429 ffff8801a48efc20 0000000000000000 ffff8801caccc110 ffff8801a48efb10 ffff8801caccc000 ffff8801a48efb38 ffffffff816623c7 ffffffff8389f9d5 ffff8801a48efa90 00000001cd1a3067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 device gre0 entered promiscuous mode FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 16051 Comm: syz-executor2 Tainted: G B 4.9.62-gf09daf1 #91 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801a48ef940 ffffffff81d94429 ffff8801a48efc20 0000000000000000 ffff8801caccda90[ 85.266391] binder: 16094:16105 ioctl 40082404 20000ff8 returned -22 binder: 16094:16105 ioctl 8914 20c01000 returned -22 ffff8801a48efb10 ffff8801caccd980 ffff8801a48efb38 ffffffff816623c7 1ffff1003491df2f ffff8801a48efa90 00000001a867d067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 binder: 16094:16117 ioctl 40082404 20000ff8 returned -22 binder: 16094:16117 ioctl 8914 20c01000 returned -22 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 IPVS: Creating netns size=2536 id=32 netlink: 5 bytes leftover after parsing attributes in process `syz-executor2'. device gre0 entered promiscuous mode pktgen: kernel_thread() failed for cpu 0 pktgen: Cannot create thread for cpu 0 (-4) pktgen: kernel_thread() failed for cpu 1 pktgen: Cannot create thread for cpu 1 (-4) pktgen: Initialization failed for all threads sock: sock_set_timeout: `syz-executor3' (pid 16301) tries to set negative timeout ALSA: seq fatal error: cannot create timer (-19) ALSA: seq fatal error: cannot create timer (-19) device gre0 entered promiscuous mode IPVS: Creating netns size=2536 id=33 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=16445 comm=syz-executor0 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 16448 Comm: syz-executor1 Tainted: G B 4.9.62-gf09daf1 #91 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cb90f8b0 ffffffff81d94429 ffff8801cb90fb90 0000000000000000 ffff8801caccce90 ffff8801cb90fa80 ffff8801cacccd80 ffff8801cb90faa8 ffffffff816623c7 ffffffff8389dcd3 ffff8801cb90fa00 00000001a970f067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] SyS_clock_adjtime+0x1c/0x30 kernel/time/posix-timers.c:1045 [] entry_SYSCALL_64_fastpath+0x23/0xc6 CPU: 0 PID: 16465 Comm: syz-executor0 Tainted: G B 4.9.62-gf09daf1 #91 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801a97479c0 ffffffff81d94429 ffff8801a9747ca0 0000000000000000 ffff8801ac3fb490 ffff8801a9747b90 ffff8801ac3fb380 ffff8801a9747bb8 ffffffff816623c7 579e68bdeec93e07 ffff8801a9747b10 00000001a8497067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] SYSC_keyctl security/keys/keyctl.c:1604 [inline] [] SyS_keyctl+0x1fb/0x230 security/keys/keyctl.c:1592 [] entry_SYSCALL_64_fastpath+0x23/0xc6 CPU: 1 PID: 16470 Comm: syz-executor0 Tainted: G B 4.9.62-gf09daf1 #91 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801aa387930 ffffffff81d94429 ffff8801aa387c10 0000000000000000 ffff8801ac3fb490 ffff8801aa387b00 ffff8801ac3fb380 ffff8801aa387b28 ffffffff816623c7 0000000000000000 ffff8801aa387a80 00000001a8497067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 16456 Comm: syz-executor0 Tainted: G B 4.9.62-gf09daf1 #91 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cc5bf9c0 ffffffff81d94429 ffff8801cc5bfca0 0000000000000000 ffff8801caccc890 ffff8801cc5bfb90 ffff8801caccc780 ffff8801cc5bfbb8 ffffffff816623c7 6a92dbc5a4a55307 ffff8801cc5bfb10 00000001ce5d0067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] SYSC_keyctl security/keys/keyctl.c:1604 [inline] [] SyS_keyctl+0x1fb/0x230 security/keys/keyctl.c:1592 [] entry_SYSCALL_64_fastpath+0x23/0xc6 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 16470 Comm: syz-executor0 Tainted: G B 4.9.62-gf09daf1 #91 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801aa387930 ffffffff81d94429 ffff8801aa387c10 0000000000000000 ffff8801caccc890 ffff8801aa387b00 ffff8801caccc780 ffff8801aa387b28 ffffffff816623c7 ffff8801aa387ac8 ffff8801aa387a80 00000001ce5d0067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 CPU: 1 PID: 16465 Comm: syz-executor0 Tainted: G B 4.9.62-gf09daf1 #91 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801a9747960 ffffffff81d94429 ffff8801a9747c40 0000000000000000 ffff8801caccc890 ffff8801a9747b30 ffff8801caccc780 ffff8801a9747b58 ffffffff816623c7 ffff8801c7963000[ 87.890579] FAULT_FLAG_ALLOW_RETRY missing 30 ffff8801a9747ab0 00000001ce5d0067 [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 FAULT_FLAG_ALLOW_RETRY missing 30 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 CPU: 0 PID: 16456 Comm: syz-executor0 Tainted: G B 4.9.62-gf09daf1 #91 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cc5bf990 ffffffff81d94429 ffff8801cc5bfc70 0000000000000000 ffff8801caccc890 ffff8801cc5bfb60 ffff8801caccc780 ffff8801cc5bfb88 ffffffff816623c7 ffff8801a6764800 0000000000000000 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] copy_from_user arch/x86/include/asm/uaccess.h:702 [inline] [] keyctl_update_key+0x8c/0x120 security/keys/keyctl.c:337 [] SYSC_keyctl security/keys/keyctl.c:1604 [inline] [] SyS_keyctl+0x1fb/0x230 security/keys/keyctl.c:1592 [] entry_SYSCALL_64_fastpath+0x23/0xc6 CPU: 1 PID: 16470 Comm: syz-executor0 Tainted: G B 4.9.62-gf09daf1 #91 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801aa387900 ffffffff81d94429 ffff8801aa387be0 0000000000000000 ffff8801caccc890 ffff8801aa387ad0 ffff8801caccc780 ffff8801aa387af8 ffffffff816623c7 ffffffff00000002 ffff880100000070 0000000000440000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5b7/0xd70 arch/x86/mm/fault.c:1396 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] copy_from_user arch/x86/include/asm/uaccess.h:702 [inline] [] SYSC_futimesat fs/utimes.c:196 [inline] [] SyS_futimesat fs/utimes.c:189 [inline] [] SYSC_utimes fs/utimes.c:220 [inline] [] SyS_utimes+0xb6/0x1b0 fs/utimes.c:217 [] entry_SYSCALL_64_fastpath+0x23/0xc6 pktgen: kernel_thread() failed for cpu 0 pktgen: Cannot create thread for cpu 0 (-4) pktgen: kernel_thread() failed for cpu 1 pktgen: Cannot create thread for cpu 1 (-4) pktgen: Initialization failed for all threads nla_parse: 1 callbacks suppressed netlink: 2 bytes leftover after parsing attributes in process `syz-executor0'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16543 comm=syz-executor0 netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. device gre0 entered promiscuous mode sg_write: data in/out 822404280/197 bytes for SCSI command 0x12-- guessing data in; program syz-executor0 not setting count and/or reply_len properly binder: 16661:16668 ioctl c0406400 20c30fc0 returned -22 binder: 16661:16668 ioctl c0406400 20c30fc0 returned -22 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32512 sclass=netlink_route_socket pig=16669 comm=syz-executor6 netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32512 sclass=netlink_route_socket pig=16669 comm=syz-executor6 device lo entered promiscuous mode IPVS: Creating netns size=2536 id=34 device lo left promiscuous mode netlink: 5 bytes leftover after parsing attributes in process `syz-executor3'. device lo entered promiscuous mode netlink: 5 bytes leftover after parsing attributes in process `syz-executor3'. device lo left promiscuous mode