Home | History | Annotate | Download | only in report
      1 TITLE: KASAN: wild-memory-access Read in sg_read
      2 
      3 [   67.633749] ==================================================================
      4 [   67.633767] BUG: KASAN: wild-memory-access in sg_read+0xe5c/0x1440
      5 [   67.633774] Read of size 4096 at addr ffe70873f7f2b000 by task syz-executor1/13133
      6 [   67.633775] 
      7 [   67.633796] CPU: 0 PID: 13133 Comm: syz-executor1 Not tainted 4.9.80-g550c01d #29
      8 [   67.633801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
      9 [   67.633815]  ffff8801b42afa38 ffffffff81d94b69 ffe70873f7f2b000 0000000000001000
     10 [   67.633827]  0000000000000000 0000000000000000 ffff8801c5ef4340 ffff8801b42afa80
     11 [   67.633838]  ffffffff8153e49e ffffffff8266a72c 0000000000000282 b11e0ea3aa111a19
     12 [   67.633841] Call Trace:
     13 [   67.633851]  [<ffffffff81d94b69>] dump_stack+0xc1/0x128
     14 [   67.633860]  [<ffffffff8153e49e>] kasan_report+0x15e/0x360
     15 [   67.633867]  [<ffffffff8266a72c>] ? sg_read+0xe5c/0x1440
     16 [   67.633875]  [<ffffffff8153cfc7>] check_memory_region+0x137/0x190
     17 [   67.633882]  [<ffffffff8153d031>] kasan_check_read+0x11/0x20
     18 [   27.258999] ==================================================================
     19 [   27.260623] kasan: CONFIG_KASAN_INLINE enabled
     20 [   27.260630] kasan: GPF could be caused by NULL-ptr deref or user memory access
     21 [   27.260634] general protection fault: 0000 [#1] PREEMPT SMP KASAN
     22 [   27.260638] Dumping ftrace buffer:
     23 [   27.260641]    (ftrace buffer empty)
     24 [   27.260644] Modules linked in:
     25 [   27.260651] CPU: 1 PID: 3377 Comm: syzkaller685434 Not tainted 4.4.107-g610c835 #4
     26 [   27.260654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
     27 [   27.260658] task: ffff8800b823c740 task.stack: ffff8801d94c8000
     28 [   27.260671] RIP: 0010:[<ffffffff8123487f>]  [<ffffffff8123487f>] __lock_acquire+0x61f/0x4b50
     29 [   27.260675] RSP: 0018:ffff8801d94cf880  EFLAGS: 00010086
     30 [   27.260678] RAX: dffffc0000000000 RBX: dead4ead00000000 RCX: ffffffff81237ade
     31 [   27.260682] RDX: 1ffff1003a313890 RSI: 0000000000000008 RDI: ffff8801d189c480
     32 [   27.260685] RBP: ffff8801d94cfa20 R08: 0000000000000001 R09: 0000000000000001
     33 [   27.260688] R10: 0000000000000001 R11: 1ffff1003b299f22 R12: 0000000000000000
     34 [   27.260692] R13: ffff8800b823c740 R14: ffff8801d189c478 R15: 0000000000000000
     35 [   27.260697] FS:  0000000000000000(0000) GS:ffff8801db300000(0063) knlGS:00000000f47d3b40
     36 [   27.260701] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
     37 [   27.260704] CR2: 00000000206f6000 CR3: 00000001d0a15000 CR4: 00000000001406e0
     38 [   27.260713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
     39 [   27.260717] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
     40 [   27.260718] Stack:
     41 [   27.260725]  ffff8801d0ee0818 ffff8800b4b59d90 ffff8801d94cfa00 ffffffff8149e232
     42 [   27.260733]  ffff8801d94cf8b0 ffffffff00000000 ffff8800b823c740 ffff8800b823cfb0
     43 [   27.260739]  0000000000000288 ffff8800b823c740 0000000000000002 0000000000000002
     44 [   27.260741] Call Trace:
     45 [   27.260751]  [<ffffffff8149e232>] ? handle_mm_fault+0x3f2/0x3190
     46 [   27.260758]  [<ffffffff81234260>] ? debug_check_no_locks_freed+0x2c0/0x2c0
     47 [   27.260764]  [<ffffffff8148979e>] ? vmacache_update+0xfe/0x130
     48 [   27.260772]  [<ffffffff810db470>] ? __do_page_fault+0x380/0xa00
     49 [   27.260778]  [<ffffffff8123a61e>] lock_acquire+0x15e/0x460
     50 [   27.260787]  [<ffffffff825b8a89>] ? sg_remove_request+0x69/0x110
     51 [   27.260794]  [<ffffffff83773a1e>] _raw_write_lock_irqsave+0x4e/0x70
     52 [   27.260800]  [<ffffffff825b8a89>] ? sg_remove_request+0x69/0x110
     53 [   27.260806]  [<ffffffff825b8a89>] sg_remove_request+0x69/0x110
     54 [   27.260813]  [<ffffffff825b9095>] sg_finish_rem_req+0x295/0x340
     55 [   27.260819]  [<ffffffff825baed1>] sg_read+0xa21/0x1490
     56 [   67.633888]  [<ffffffff8266a72c>] sg_read+0xe5c/0x1440
     57 [   67.633896]  [<ffffffff826698d0>] ? sg_proc_seq_show_debug+0xd90/0xd90
     58 [   67.633902]  [<ffffffff81644640>] ? fsnotify+0xf30/0xf30
     59 [   67.633910]  [<ffffffff81bdc219>] ? avc_policy_seqno+0x9/0x20
     60 [   67.633919]  [<ffffffff8156cc21>] do_loop_readv_writev.part.17+0x141/0x1e0
     61 [   67.633926]  [<ffffffff81bd32d9>] ? security_file_permission+0x89/0x1e0
     62 [   67.633933]  [<ffffffff826698d0>] ? sg_proc_seq_show_debug+0xd90/0xd90
     63 [   67.633940]  [<ffffffff826698d0>] ? sg_proc_seq_show_debug+0xd90/0xd90
     64 [   67.633947]  [<ffffffff81570a90>] do_readv_writev+0x520/0x750
     65 [   67.633954]  [<ffffffff81570570>] ? vfs_write+0x530/0x530
     66 [   67.633962]  [<ffffffff8136b494>] ? kcov_ioctl+0x24/0x1c0
     67 [   67.633972]  [<ffffffff81dfbfab>] ? check_preemption_disabled+0x3b/0x200
     68 [   67.633979]  [<ffffffff815d1581>] ? __fget+0x201/0x3a0
     69 [   67.633986]  [<ffffffff815d15a8>] ? __fget+0x228/0x3a0
     70 [   67.633992]  [<ffffffff815d13c7>] ? __fget+0x47/0x3a0
     71 [   67.634000]  [<ffffffff81570d44>] vfs_readv+0x84/0xc0
     72 [   67.634007]  [<ffffffff81570e66>] do_readv+0xe6/0x250
     73 [   67.634014]  [<ffffffff81570d80>] ? vfs_readv+0xc0/0xc0
     74 [   67.634022]  [<ffffffff838b344a>] ? entry_SYSCALL_64_fastpath+0x5/0xe8
     75 [   67.634032]  [<ffffffff8123b64b>] ? trace_hardirqs_on_caller+0x38b/0x590
     76 [   67.634040]  [<ffffffff81574357>] SyS_readv+0x27/0x30
     77 [   67.634047]  [<ffffffff838b346e>] entry_SYSCALL_64_fastpath+0x29/0xe8
     78 [   67.634050] ==================================================================
     79