BUG: KASAN: wild-memory-access on address ffe708746eff1000 Read of size 28 by task syz-executor2/31036 CPU: 1 PID: 31036 Comm: syz-executor2 Not tainted 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cd8179e8 ffffffff81d93149 ffe708746eff1000 000000000000001c 0000000000000000 ffff8801a9005f60 ffe708746eff1000 ffff8801cd817a70 ffffffff8153d08f 0000000000000000 0000000000000001 ffffffff826648db Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] kasan_report_error mm/kasan/report.c:284 [inline] [] kasan_report.part.1+0x40f/0x500 mm/kasan/report.c:309 [] kasan_report+0x20/0x30 mm/kasan/report.c:296 [] check_memory_region_inline mm/kasan/kasan.c:308 [inline] [] check_memory_region+0x137/0x190 mm/kasan/kasan.c:315 [] kasan_check_read+0x11/0x20 mm/kasan/kasan.c:320 [] __copy_to_user arch/x86/include/asm/uaccess_64.h:182 [inline] [] sg_read_oxfer drivers/scsi/sg.c:1978 [inline] [] sg_read+0x124b/0x1400 drivers/scsi/sg.c:520 [] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714 [] do_loop_readv_writev fs/read_write.c:880 [inline] [] do_readv_writev+0x520/0x750 fs/read_write.c:874 [] vfs_readv+0x84/0xc0 fs/read_write.c:898 [] do_readv+0xe6/0x250 fs/read_write.c:924 [] SYSC_readv fs/read_write.c:1011 [inline] [] SyS_readv+0x27/0x30 fs/read_write.c:1008 [] entry_SYSCALL_64_fastpath+0x23/0xc6 ================================================================== SELinux: unrecognized netlink message: protocol=9 nlmsg_type=257 sclass=netlink_audit_socket pig=31007 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21199 sclass=netlink_audit_socket pig=31201 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=41 sclass=netlink_audit_socket pig=31201 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21199 sclass=netlink_audit_socket pig=31201 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=41 sclass=netlink_audit_socket pig=31201 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31302 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31302 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31302 comm=syz-executor0 binder: 31330:31333 ioctl 5424 20603ffc returned -22 binder: 31330:31336 ioctl 5424 20603ffc returned -22 IPVS: Creating netns size=2536 id=64 loop_reread_partitions: partition scan of loop0 (-\t@r9hxGQ:[il L*@R-Tr-x) failed (rc=-13) devpts: called with bogus options device lo entered promiscuous mode devpts: called with bogus options device gre0 entered promiscuous mode nla_parse: 23 callbacks suppressed netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. device syz4 left promiscuous mode device syz4 entered promiscuous mode device syz4 left promiscuous mode device syz4 entered promiscuous mode program syz-executor4 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 program syz-executor4 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 program syz-executor4 is using a deprecated SCSI ioctl, please convert it to SG_IO program syz-executor4 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 selinux_nlmsg_perm: 33 callbacks suppressed SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63196 sclass=netlink_route_socket pig=32042 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32055 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63196 sclass=netlink_route_socket pig=32042 comm=syz-executor4 netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. tmpfs: Bad mount option q]g4G tmpfs: Bad mount option q]g4G binder: 32230:32232 ioctl 8904 209beffc returned -22 sock: process `syz-executor7' is using obsolete setsockopt SO_BSDCOMPAT binder: 32230:32232 ioctl 8904 209beffc returned -22 device gre0 entered promiscuous mode TCP: request_sock_TCP: Possible SYN flooding on port 20030. Sending cookies. Check SNMP counters. binder: 32394:32395 ioctl 4b45 20099000 returned -22 binder: 32394:32395 ioctl 4b45 20099000 returned -22 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 32480 Comm: syz-executor7 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cec7fa10 ffffffff81d93149 ffff8801cec7fcf0 0000000000000000 ffff8801c682bc10 ffff8801cec7fbe0 ffff8801c682bb00 ffff8801cec7fc08 ffffffff81660dc8 ffff8801cec7fb60 0000000000000000 00000001c7b7b067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 ALSA: seq fatal error: cannot create timer (-19) [] entry_SYSCALL_64_fastpath+0x23/0xc6 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 32462 Comm: syz-executor7 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE IPv6: NLM_F_CREATE should be set when creating new route IPv6: NLM_F_CREATE should be set when creating new route ALSA: seq fatal error: cannot create timer (-19) ffff8801ce74f990 ffffffff81d93149 ffff8801ce74fc70 0000000000000000 ffff8801c682bc10 ffff8801ce74fb60 ffff8801c682bb00[ 164.243384] netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE ffff8801ce74fb88 ffffffff81660dc8 ffff8801d012b000 0000000000000000 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 program syz-executor5 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 binder: 32620:32621 ioctl 4b3b 81 returned -22 program syz-executor5 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 binder: 32620:32621 ioctl 4b3b 81 returned -22 keychord: using input dev AT Translated Set 2 keyboard for fevent keychord: invalid keycode count 0 keychord: using input dev AT Translated Set 2 keyboard for fevent keychord: invalid keycode count 0 FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 32696 Comm: syz-executor7 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801ca9c7930 ffffffff81d93149 ffff8801ca9c7c10 0000000000000000 ffff8801c682ae90 ffff8801ca9c7b00 ffff8801c682ad80 ffff8801ca9c7b28 ffffffff81660dc8 ffff8801ca9c7a80 ffff8801ca9c79a0 00000001ad0aa067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 device gre0 entered promiscuous mode device syz2 left promiscuous mode CPU: 1 PID: 32708 Comm: syz-executor7 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801c8e079f0 ffffffff81d93149 ffff8801c8e07cd0 0000000000000000 ffff8801c682ae90 ffff8801c8e07bc0 ffff8801c682ad80 ffff8801c8e07be8 ffffffff81660dc8 ffff8801c8e07b40 0000000000000000 00000001ad0aa067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 32696 Comm: syz-executor7 Tainted: G B 4.9.52-gc30c69c #54 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801ca9c7930 ffffffff81d93149 ffff8801ca9c7c10 0000000000000000 ffff8801d6a81190 ffff8801ca9c7b00 ffff8801d6a81080 ffff8801ca9c7b28 ffffffff81660dc8 ffff8801ca9c7a80 ffffffff8418567c 00000001ad0aa067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa48/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x4eb/0xbd0 arch/x86/mm/fault.c:1397 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1460 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] entry_SYSCALL_64_fastpath+0x23/0xc6 sg_write: data in/out 296463/34 bytes for SCSI command 0xfc-- guessing data in; program syz-executor1 not setting count and/or reply_len properly netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 3817 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 3817 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=429 comm=syz-executor0 sg_write: data in/out 296463/34 bytes for SCSI command 0xfc-- guessing data in; program syz-executor5 not setting count and/or reply_len properly netlink: 16 bytes leftover after parsing attributes in process `syz-executor5'. binder: 571:573 ioctl 5404 2024a000 returned -22 tc_ctl_action: received NO action attribs SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21199 sclass=netlink_audit_socket pig=583 comm=syz-executor6 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=41 sclass=netlink_audit_socket pig=583 comm=syz-executor6 binder: 571:590 ioctl 5404 2024a000 returned -22 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21199 sclass=netlink_audit_socket pig=589 comm=syz-executor6 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=41 sclass=netlink_audit_socket pig=589 comm=syz-executor6 netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 16 bytes leftover after parsing attributes in process `syz-executor5'. tc_ctl_action: received NO action attribs sg_write: data in/out 296463/34 bytes for SCSI command 0xfc-- guessing data in; program syz-executor3 not setting count and/or reply_len properly device lo entered promiscuous mode device lo left promiscuous mode binder: 883:884 ioctl 4b45 20306000 returned -22 binder: 883:884 ioctl 4b49 203ec000 returned -22 binder: 883:884 ioctl 80184540 204a3000 returned -22 binder: 883:901 ioctl 4b45 20306000 returned -22 binder: 883:901 ioctl 4b49 203ec000 returned -22 binder: 883:904 ioctl 80184540 204a3000 returned -22