1 TITLE: KASAN: wild-memory-access Read in sg_read 2 3 [ 67.633749] ================================================================== 4 [ 67.633767] BUG: KASAN: wild-memory-access in sg_read+0xe5c/0x1440 5 [ 67.633774] Read of size 4096 at addr ffe70873f7f2b000 by task syz-executor1/13133 6 [ 67.633775] 7 [ 67.633796] CPU: 0 PID: 13133 Comm: syz-executor1 Not tainted 4.9.80-g550c01d #29 8 [ 67.633801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 9 [ 67.633815] ffff8801b42afa38 ffffffff81d94b69 ffe70873f7f2b000 0000000000001000 10 [ 67.633827] 0000000000000000 0000000000000000 ffff8801c5ef4340 ffff8801b42afa80 11 [ 67.633838] ffffffff8153e49e ffffffff8266a72c 0000000000000282 b11e0ea3aa111a19 12 [ 67.633841] Call Trace: 13 [ 67.633851] [<ffffffff81d94b69>] dump_stack+0xc1/0x128 14 [ 67.633860] [<ffffffff8153e49e>] kasan_report+0x15e/0x360 15 [ 67.633867] [<ffffffff8266a72c>] ? sg_read+0xe5c/0x1440 16 [ 67.633875] [<ffffffff8153cfc7>] check_memory_region+0x137/0x190 17 [ 67.633882] [<ffffffff8153d031>] kasan_check_read+0x11/0x20 18 [ 67.633888] [<ffffffff8266a72c>] sg_read+0xe5c/0x1440 19 [ 67.633896] [<ffffffff826698d0>] ? sg_proc_seq_show_debug+0xd90/0xd90 20 [ 67.633902] [<ffffffff81644640>] ? fsnotify+0xf30/0xf30 21 [ 67.633910] [<ffffffff81bdc219>] ? avc_policy_seqno+0x9/0x20 22 [ 67.633919] [<ffffffff8156cc21>] do_loop_readv_writev.part.17+0x141/0x1e0 23 [ 67.633926] [<ffffffff81bd32d9>] ? security_file_permission+0x89/0x1e0 24 [ 67.633933] [<ffffffff826698d0>] ? sg_proc_seq_show_debug+0xd90/0xd90 25 [ 67.633940] [<ffffffff826698d0>] ? sg_proc_seq_show_debug+0xd90/0xd90 26 [ 67.633947] [<ffffffff81570a90>] do_readv_writev+0x520/0x750 27 [ 67.633954] [<ffffffff81570570>] ? vfs_write+0x530/0x530 28 [ 67.633962] [<ffffffff8136b494>] ? kcov_ioctl+0x24/0x1c0 29 [ 67.633972] [<ffffffff81dfbfab>] ? check_preemption_disabled+0x3b/0x200 30 [ 67.633979] [<ffffffff815d1581>] ? __fget+0x201/0x3a0 31 [ 67.633986] [<ffffffff815d15a8>] ? __fget+0x228/0x3a0 32 [ 67.633992] [<ffffffff815d13c7>] ? __fget+0x47/0x3a0 33 [ 67.634000] [<ffffffff81570d44>] vfs_readv+0x84/0xc0 34 [ 67.634007] [<ffffffff81570e66>] do_readv+0xe6/0x250 35 [ 67.634014] [<ffffffff81570d80>] ? vfs_readv+0xc0/0xc0 36 [ 67.634022] [<ffffffff838b344a>] ? entry_SYSCALL_64_fastpath+0x5/0xe8 37 [ 67.634032] [<ffffffff8123b64b>] ? trace_hardirqs_on_caller+0x38b/0x590 38 [ 67.634040] [<ffffffff81574357>] SyS_readv+0x27/0x30 39 [ 67.634047] [<ffffffff838b346e>] entry_SYSCALL_64_fastpath+0x29/0xe8 40 [ 67.634050] ================================================================== 41