Home | History | Annotate | Download | only in report
      1 TITLE: KASAN: wild-memory-access Read in sg_read
      2 
      3 [   67.633749] ==================================================================
      4 [   67.633767] BUG: KASAN: wild-memory-access in sg_read+0xe5c/0x1440
      5 [   67.633774] Read of size 4096 at addr ffe70873f7f2b000 by task syz-executor1/13133
      6 [   67.633775] 
      7 [   67.633796] CPU: 0 PID: 13133 Comm: syz-executor1 Not tainted 4.9.80-g550c01d #29
      8 [   67.633801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
      9 [   67.633815]  ffff8801b42afa38 ffffffff81d94b69 ffe70873f7f2b000 0000000000001000
     10 [   67.633827]  0000000000000000 0000000000000000 ffff8801c5ef4340 ffff8801b42afa80
     11 [   67.633838]  ffffffff8153e49e ffffffff8266a72c 0000000000000282 b11e0ea3aa111a19
     12 [   67.633841] Call Trace:
     13 [   67.633851]  [<ffffffff81d94b69>] dump_stack+0xc1/0x128
     14 [   67.633860]  [<ffffffff8153e49e>] kasan_report+0x15e/0x360
     15 [   67.633867]  [<ffffffff8266a72c>] ? sg_read+0xe5c/0x1440
     16 [   67.633875]  [<ffffffff8153cfc7>] check_memory_region+0x137/0x190
     17 [   67.633882]  [<ffffffff8153d031>] kasan_check_read+0x11/0x20
     18 [   67.633888]  [<ffffffff8266a72c>] sg_read+0xe5c/0x1440
     19 [   67.633896]  [<ffffffff826698d0>] ? sg_proc_seq_show_debug+0xd90/0xd90
     20 [   67.633902]  [<ffffffff81644640>] ? fsnotify+0xf30/0xf30
     21 [   67.633910]  [<ffffffff81bdc219>] ? avc_policy_seqno+0x9/0x20
     22 [   67.633919]  [<ffffffff8156cc21>] do_loop_readv_writev.part.17+0x141/0x1e0
     23 [   67.633926]  [<ffffffff81bd32d9>] ? security_file_permission+0x89/0x1e0
     24 [   67.633933]  [<ffffffff826698d0>] ? sg_proc_seq_show_debug+0xd90/0xd90
     25 [   67.633940]  [<ffffffff826698d0>] ? sg_proc_seq_show_debug+0xd90/0xd90
     26 [   67.633947]  [<ffffffff81570a90>] do_readv_writev+0x520/0x750
     27 [   67.633954]  [<ffffffff81570570>] ? vfs_write+0x530/0x530
     28 [   67.633962]  [<ffffffff8136b494>] ? kcov_ioctl+0x24/0x1c0
     29 [   67.633972]  [<ffffffff81dfbfab>] ? check_preemption_disabled+0x3b/0x200
     30 [   67.633979]  [<ffffffff815d1581>] ? __fget+0x201/0x3a0
     31 [   67.633986]  [<ffffffff815d15a8>] ? __fget+0x228/0x3a0
     32 [   67.633992]  [<ffffffff815d13c7>] ? __fget+0x47/0x3a0
     33 [   67.634000]  [<ffffffff81570d44>] vfs_readv+0x84/0xc0
     34 [   67.634007]  [<ffffffff81570e66>] do_readv+0xe6/0x250
     35 [   67.634014]  [<ffffffff81570d80>] ? vfs_readv+0xc0/0xc0
     36 [   67.634022]  [<ffffffff838b344a>] ? entry_SYSCALL_64_fastpath+0x5/0xe8
     37 [   67.634032]  [<ffffffff8123b64b>] ? trace_hardirqs_on_caller+0x38b/0x590
     38 [   67.634040]  [<ffffffff81574357>] SyS_readv+0x27/0x30
     39 [   67.634047]  [<ffffffff838b346e>] entry_SYSCALL_64_fastpath+0x29/0xe8
     40 [   67.634050] ==================================================================
     41