./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2375057829 <...> Warning: Permanently added '10.128.1.70' (ED25519) to the list of known hosts. execve("./syz-executor2375057829", ["./syz-executor2375057829"], 0x7ffcdee90010 /* 10 vars */) = 0 brk(NULL) = 0x555577037000 brk(0x555577037d00) = 0x555577037d00 arch_prctl(ARCH_SET_FS, 0x555577037380) = 0 set_tid_address(0x555577037650) = 5229 set_robust_list(0x555577037660, 24) = 0 rseq(0x555577037ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2375057829", 4096) = 28 getrandom("\x5e\xb1\x9c\xa3\xb5\x89\x75\xe8", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555577037d00 brk(0x555577058d00) = 0x555577058d00 brk(0x555577059000) = 0x555577059000 mprotect(0x7f37ca6e1000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555577037650) = 5230 ./strace-static-x86_64: Process 5230 attached [pid 5230] set_robust_list(0x555577037660, 24) = 0 [pid 5230] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy) [pid 5230] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5230] setsid() = 1 [pid 5230] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 5230] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 5230] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 5230] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 5230] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 5230] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 5230] unshare(CLONE_NEWNS) = 0 [pid 5230] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 5230] unshare(CLONE_NEWIPC) = 0 [pid 5230] unshare(CLONE_NEWCGROUP) = 0 [pid 5230] unshare(CLONE_NEWUTS) = 0 [pid 5230] unshare(CLONE_SYSVSEM) = 0 [pid 5230] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = 3 [pid 5230] write(3, "16777216", 8) = 8 [pid 5230] close(3) = 0 [pid 5230] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = 3 [pid 5230] write(3, "536870912", 9) = 9 [pid 5230] close(3) = 0 [pid 5230] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = 3 [pid 5230] write(3, "1024", 4) = 4 [pid 5230] close(3) = 0 [pid 5230] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = 3 [pid 5230] write(3, "8192", 4) = 4 [pid 5230] close(3) = 0 [pid 5230] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = 3 [pid 5230] write(3, "1024", 4) = 4 [pid 5230] close(3) = 0 [pid 5230] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = 3 [pid 5230] write(3, "1024", 4) = 4 [pid 5230] close(3) = 0 [pid 5230] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = 3 [pid 5230] write(3, "1024 1048576 500 1024", 21) = 21 [pid 5230] close(3) = 0 [pid 5230] getpid() = 1 [pid 5230] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1< [pid 5233] set_robust_list(0x555577037660, 24 [pid 5230] <... clone resumed>, child_tidptr=0x555577037650) = 2 [pid 5233] <... set_robust_list resumed>) = 0 [pid 5233] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5233] setpgid(0, 0) = 0 [pid 5233] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 5233] write(3, "1000", 4) = 4 [pid 5233] close(3) = 0 [pid 5233] read(200, "\x33\x33\x00\x00\x00\x16\xaa\xaa\xaa\xaa\xaa\xaa\x86\xdd\x60\x00\x00\x00\x00\x38\x00\x01\xfe\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xaa\xff\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x3a\x00\x05\x02\x00\x00\x01\x00\x8f\x00\xc2\x46\x00\x00\x00\x02\x04\x00\x00\x00\xff\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xff\xaa\xaa\xaa\x04\x00\x00\x00\xff\x02\x00\x00\x00\x00"..., 1000) = 110 [pid 5233] read(200, executing program 0x7ffe2ffe67f0, 1000) = -1 EAGAIN (Resource temporarily unavailable) [pid 5233] write(1, "executing program\n", 18) = 18 [pid 5233] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_XDP, insn_cnt=3, insns=0x20000140, license="syzkaller", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=BPF_F_STRICT_ALIGNMENT|BPF_F_TEST_RND_HI32|BPF_F_TEST_STATE_FREQ|0x20, prog_name="", prog_ifindex=0, expected_attach_type=BPF_XDP, prog_btf_fd=-1, func_info_rec_size=8, func_info=NULL, func_info_cnt=0, line_info_rec_size=16, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL, ...}, 144) = 3 [pid 5233] socket(AF_PACKET, SOCK_DGRAM, htons(ETH_P_ALL)) = 4 [pid 5233] ioctl(4, SIOCGIFINDEX, {ifr_name="syz_tun", ifr_ifindex=11}) = 0 [pid 5233] bpf(BPF_LINK_CREATE, {link_create={prog_fd=3, target_fd=11, attach_type=BPF_XDP, flags=0}}, 64) = 5 [pid 5233] write(200, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 65007) = 65007 [pid 5233] close(3) = 0 [pid 5233] close(4) = 0 [pid 5233] close(5) = 0 [pid 5233] close(6) = -1 EBADF (Bad file descriptor) [pid 5233] close(7) = -1 EBADF (Bad file descriptor) [pid 5233] close(8) = -1 EBADF (Bad file descriptor) [pid 5233] close(9) = -1 EBADF (Bad file descriptor) [pid 5233] close(10) = -1 EBADF (Bad file descriptor) [pid 5233] close(11) = -1 EBADF (Bad file descriptor) [pid 5233] close(12) = -1 EBADF (Bad file descriptor) [pid 5233] close(13) = -1 EBADF (Bad file descriptor) [pid 5233] close(14) = -1 EBADF (Bad file descriptor) [pid 5233] close(15) = -1 EBADF (Bad file descriptor) [pid 5233] close(16) = -1 EBADF (Bad file descriptor) [pid 5233] close(17) = -1 EBADF (Bad file descriptor) [pid 5233] close(18) = -1 EBADF (Bad file descriptor) [pid 5233] close(19) = -1 EBADF (Bad file descriptor) [pid 5233] close(20) = -1 EBADF (Bad file descriptor) [pid 5233] close(21) = -1 EBADF (Bad file descriptor) [pid 5233] close(22) = -1 EBADF (Bad file descriptor) [pid 5233] close(23) = -1 EBADF (Bad file descriptor) [pid 5233] close(24) = -1 EBADF (Bad file descriptor) [pid 5233] close(25) = -1 EBADF (Bad file descriptor) [pid 5233] close(26) = -1 EBADF (Bad file descriptor) [pid 5233] close(27) = -1 EBADF (Bad file descriptor) [pid 5233] close(28) = -1 EBADF (Bad file descriptor) [pid 5233] close(29) = -1 EBADF (Bad file descriptor) [pid 5233] exit_group(0) = ? [ 79.081494][ C0] ================================================================== [ 79.089599][ C0] BUG: KASAN: stack-out-of-bounds in xdp_do_check_flushed+0x231/0x240 [ 79.097889][ C0] Read of size 4 at addr ffffc9000345f7f8 by task syz-executor237/5233 [ 79.106131][ C0] [ 79.108486][ C0] CPU: 0 UID: 0 PID: 5233 Comm: syz-executor237 Not tainted 6.10.0-next-20240726-syzkaller #0 [ 79.118741][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 79.128808][ C0] Call Trace: [ 79.132098][ C0] [ 79.134977][ C0] dump_stack_lvl+0x241/0x360 [ 79.139678][ C0] ? __pfx_dump_stack_lvl+0x10/0x10 [ 79.144893][ C0] ? __pfx__printk+0x10/0x10 [ 79.149497][ C0] ? _printk+0xd5/0x120 [ 79.153691][ C0] print_report+0x169/0x550 [ 79.158208][ C0] ? __virt_addr_valid+0xbd/0x530 [ 79.163243][ C0] ? xdp_do_check_flushed+0x231/0x240 [ 79.168625][ C0] kasan_report+0x143/0x180 [ 79.173138][ C0] ? xdp_do_check_flushed+0x231/0x240 [ 79.178529][ C0] xdp_do_check_flushed+0x231/0x240 [ 79.183741][ C0] __napi_poll+0xe4/0x490 [ 79.188082][ C0] net_rx_action+0x89b/0x1240 [ 79.192778][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 79.197904][ C0] ? sched_clock+0x4a/0x70 [ 79.202450][ C0] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 79.208823][ C0] handle_softirqs+0x2c4/0x970 [ 79.213616][ C0] ? __irq_exit_rcu+0xf4/0x1c0 [ 79.218398][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 79.223702][ C0] ? irqtime_account_irq+0xd4/0x1e0 [ 79.228917][ C0] __irq_exit_rcu+0xf4/0x1c0 [ 79.233519][ C0] ? __pfx___irq_exit_rcu+0x10/0x10 [ 79.238741][ C0] irq_exit_rcu+0x9/0x30 [ 79.243001][ C0] common_interrupt+0xaa/0xd0 [ 79.247777][ C0] [ 79.250714][ C0] [ 79.253647][ C0] asm_common_interrupt+0x26/0x40 [ 79.258690][ C0] RIP: 0010:lock_acquire+0x264/0x550 [ 79.263988][ C0] Code: 2b 00 74 08 4c 89 f7 e8 aa 9e 8b 00 f6 44 24 61 02 0f 85 85 01 00 00 41 f7 c7 00 02 00 00 74 01 fb 48 c7 44 24 40 0e 36 e0 45 <4b> c7 44 25 00 00 00 00 00 43 c7 44 25 09 00 00 00 00 43 c7 44 25 [ 79.283608][ C0] RSP: 0018:ffffc9000345f3c0 EFLAGS: 00000206 [ 79.289693][ C0] RAX: 0000000000000001 RBX: 1ffff9200068be84 RCX: 05a0a220de09ff00 [ 79.297666][ C0] RDX: dffffc0000000000 RSI: ffffffff8c0ae6c0 RDI: ffffffff8c607c40 [ 79.305651][ C0] RBP: ffffc9000345f518 R08: ffffffff93737807 R09: 1ffffffff26e6f00 [ 79.313627][ C0] R10: dffffc0000000000 R11: fffffbfff26e6f01 R12: 1ffff9200068be80 [ 79.321899][ C0] R13: dffffc0000000000 R14: ffffc9000345f420 R15: 0000000000000246 [ 79.329894][ C0] ? __pfx_lock_acquire+0x10/0x10 [ 79.335026][ C0] ? pfn_valid+0xf6/0x450 [ 79.339380][ C0] ? __pfx_lock_release+0x10/0x10 [ 79.344419][ C0] ? __lruvec_stat_mod_folio+0x7d/0x300 [ 79.350070][ C0] ? __lruvec_stat_mod_folio+0x7d/0x300 [ 79.355629][ C0] ? page_ext_get+0x20/0x2a0 [ 79.360573][ C0] page_ext_get+0x3d/0x2a0 [ 79.365083][ C0] ? page_ext_get+0x20/0x2a0 [ 79.369680][ C0] page_table_check_clear+0x4b/0x550 [ 79.374986][ C0] unmap_page_range+0x2b48/0x42c0 [ 79.380045][ C0] ? __pfx_unmap_page_range+0x10/0x10 [ 79.385435][ C0] ? mas_next_slot+0xeab/0xf90 [ 79.390214][ C0] ? uprobe_munmap+0x183/0x460 [ 79.394988][ C0] ? unmap_single_vma+0x1bd/0x2b0 [ 79.400035][ C0] unmap_vmas+0x3cc/0x5f0 [ 79.404384][ C0] ? __pfx_unmap_vmas+0x10/0x10 [ 79.409260][ C0] ? tlb_gather_mmu_fullmm+0x160/0x210 [ 79.414734][ C0] exit_mmap+0x264/0xc80 [ 79.418990][ C0] ? __pfx_exit_mmap+0x10/0x10 [ 79.423762][ C0] ? __asan_memset+0x23/0x50 [ 79.428377][ C0] ? uprobe_clear_state+0x277/0x290 [ 79.433588][ C0] ? mm_update_next_owner+0xa4/0x810 [ 79.438878][ C0] ? do_raw_spin_unlock+0x13c/0x8b0 [ 79.444085][ C0] __mmput+0x115/0x390 [ 79.448169][ C0] exit_mm+0x220/0x310 [ 79.452243][ C0] ? __pfx_exit_mm+0x10/0x10 [ 79.456837][ C0] ? taskstats_exit+0x326/0xa60 [ 79.461704][ C0] do_exit+0x9b2/0x27f0 [ 79.465867][ C0] ? __pfx_do_exit+0x10/0x10 [ 79.470477][ C0] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 79.476489][ C0] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 79.482841][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 79.488051][ C0] ? lockdep_hardirqs_on+0x99/0x150 [ 79.493264][ C0] do_group_exit+0x207/0x2c0 [ 79.497863][ C0] __x64_sys_exit_group+0x3f/0x40 [ 79.502889][ C0] x64_sys_call+0x26c3/0x26d0 [ 79.507573][ C0] do_syscall_64+0xf3/0x230 [ 79.512360][ C0] ? clear_bhb_loop+0x35/0x90 [ 79.517052][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.522972][ C0] RIP: 0033:0x7f37ca666c49 [ 79.527415][ C0] Code: Unable to access opcode bytes at 0x7f37ca666c1f. [ 79.534440][ C0] RSP: 002b:00007ffe2ffe6b88 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 79.542950][ C0] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f37ca666c49 [ 79.550934][ C0] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 79.558910][ C0] RBP: 00007f37ca6e7390 R08: ffffffffffffffb8 R09: 00007ffe2ffe6d18 [ 79.566886][ C0] R10: 00007ffe2ffe6d18 R11: 0000000000000246 R12: 00007f37ca6e7390 [ 79.574863][ C0] R13: 0000000000000000 R14: 00007f37ca6e8e60 R15: 00007f37ca637a80 [ 79.582849][ C0] [ 79.585874][ C0] [ 79.588204][ C0] The buggy address belongs to stack of task syz-executor237/5233 [ 79.596016][ C0] and is located at offset 248 in frame: [ 79.601731][ C0] unmap_page_range+0x0/0x42c0 [ 79.606509][ C0] [ 79.608864][ C0] This frame has 11 objects: [ 79.613474][ C0] [32, 40) 'pte.sroa.0.i.i.i.i.i.i.i.i' [ 79.613488][ C0] [64, 72) 'retval.sroa.0.i.i.i.i.i.i' [ 79.619116][ C0] [96, 104) 'pte.sroa.0.i.i.i.i.i.i.i.i.i' [ 79.624655][ C0] [128, 136) 'pte.sroa.0.i.i.i.i.i114.i88.i.i.i.i.i' [ 79.630546][ C0] [160, 168) 'pte.sroa.0.i.i.i.i.i.i90.i.i.i.i.i' [ 79.637330][ C0] [192, 200) 'pte.sroa.0.i.i.i.i.i114.i.i.i.i.i.i' [ 79.643832][ C0] [224, 232) 'pte.sroa.0.i.i.i.i29.i.i.i.i.i.i.i' [ 79.650417][ C0] [256, 264) 'pte.sroa.0.i.i.i.i.i.i.i.i.i.i.i' [ 79.656916][ C0] [288, 296) 'retval.sroa.0.i.i.i.i.i' [ 79.663242][ C0] [320, 336) 'rss.i.i.i.i' [ 79.668786][ C0] [352, 360) 'ptl.i.i.i.i' [ 79.673282][ C0] [ 79.680095][ C0] The buggy address belongs to the virtual mapping at [ 79.680095][ C0] [ffffc90003458000, ffffc90003461000) created by: [ 79.680095][ C0] copy_process+0x5d1/0x3d90 [ 79.697731][ C0] [ 79.700055][ C0] The buggy address belongs to the physical page: [ 79.706474][ C0] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2efc6 [ 79.715272][ C0] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 79.722395][ C0] raw: 00fff00000000000 0000000000000000 dead000000000122 0000000000000000 [ 79.730998][ C0] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 79.739576][ C0] page dumped because: kasan: bad access detected [ 79.745996][ C0] page_owner tracks the page as allocated [ 79.751708][ C0] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2dc2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), pid 5230, tgid 5230 (syz-executor237), ts 78970731280, free_ts 78949158262 [ 79.771163][ C0] post_alloc_hook+0x1f3/0x230 [ 79.775943][ C0] get_page_from_freelist+0x2e4c/0x2f10 [ 79.781608][ C0] __alloc_pages_noprof+0x256/0x6c0 [ 79.786808][ C0] alloc_pages_mpol_noprof+0x3e8/0x680 [ 79.792271][ C0] __vmalloc_node_range_noprof+0x971/0x1460 [ 79.798176][ C0] dup_task_struct+0x444/0x8c0 [ 79.802986][ C0] copy_process+0x5d1/0x3d90 [ 79.807582][ C0] kernel_clone+0x226/0x8f0 [ 79.812104][ C0] __x64_sys_clone+0x258/0x2a0 [ 79.816876][ C0] do_syscall_64+0xf3/0x230 [ 79.821392][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.827302][ C0] page last free pid 5224 tgid 5224 stack trace: [ 79.833636][ C0] free_unref_page+0xd22/0xea0 [ 79.838415][ C0] __slab_free+0x31b/0x3d0 [ 79.842832][ C0] qlist_free_all+0x9e/0x140 [ 79.847433][ C0] kasan_quarantine_reduce+0x14f/0x170 [ 79.852903][ C0] __kasan_slab_alloc+0x23/0x80 [ 79.857760][ C0] kmem_cache_alloc_node_noprof+0x16b/0x320 [ 79.863663][ C0] __alloc_skb+0x1c3/0x440 [ 79.868169][ C0] tcp_stream_alloc_skb+0x3d/0x310 [ 79.873467][ C0] tcp_sendmsg_locked+0xd6a/0x4e10 [ 79.878581][ C0] tcp_sendmsg+0x30/0x50 [ 79.882838][ C0] __sock_sendmsg+0x1a6/0x270 [ 79.887523][ C0] sock_write_iter+0x2dd/0x400 [ 79.892298][ C0] vfs_write+0xa72/0xc90 [ 79.896553][ C0] ksys_write+0x1a0/0x2c0 [ 79.900892][ C0] do_syscall_64+0xf3/0x230 [ 79.905409][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.911395][ C0] [ 79.913716][ C0] Memory state around the buggy address: [ 79.919348][ C0] ffffc9000345f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 79.927407][ C0] ffffc9000345f700: f1 f1 f1 f1 00 f2 f2 f2 00 f2 f2 f2 00 f2 f2 f2 [ 79.935477][ C0] >ffffc9000345f780: 00 f2 f2 f2 00 f2 f2 f2 00 f2 f2 f2 00 f2 f2 f2 [ 79.943535][ C0] ^ [ 79.951508][ C0] ffffc9000345f800: 00 f2 f2 f2 00 f2 f2 f2 00 00 f2 f2 00 f3 f3 f3 [ 79.959582][ C0] ffffc9000345f880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 79.967727][ C0] ================================================================== [ 79.975908][ C0] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 79.983135][ C0] CPU: 0 UID: 0 PID: 5233 Comm: syz-executor237 Not tainted 6.10.0-next-20240726-syzkaller #0 [ 79.993392][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 80.003456][ C0] Call Trace: [ 80.006828][ C0] [ 80.009678][ C0] dump_stack_lvl+0x241/0x360 [ 80.014375][ C0] ? __pfx_dump_stack_lvl+0x10/0x10 [ 80.019585][ C0] ? __pfx__printk+0x10/0x10 [ 80.024185][ C0] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 80.030182][ C0] ? vscnprintf+0x5d/0x90 [ 80.034519][ C0] panic+0x349/0x870 [ 80.038429][ C0] ? check_panic_on_warn+0x21/0xb0 [ 80.043546][ C0] ? __pfx_panic+0x10/0x10 [ 80.047976][ C0] ? _raw_spin_unlock_irqrestore+0xd8/0x140 [ 80.053881][ C0] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 80.059781][ C0] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 80.066297][ C0] check_panic_on_warn+0x86/0xb0 [ 80.071241][ C0] ? xdp_do_check_flushed+0x231/0x240 [ 80.076625][ C0] end_report+0x77/0x160 [ 80.080873][ C0] kasan_report+0x154/0x180 [ 80.085388][ C0] ? xdp_do_check_flushed+0x231/0x240 [ 80.090777][ C0] xdp_do_check_flushed+0x231/0x240 [ 80.095991][ C0] __napi_poll+0xe4/0x490 [ 80.100331][ C0] net_rx_action+0x89b/0x1240 [ 80.105030][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 80.110164][ C0] ? sched_clock+0x4a/0x70 [ 80.114595][ C0] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 80.120969][ C0] handle_softirqs+0x2c4/0x970 [ 80.125745][ C0] ? __irq_exit_rcu+0xf4/0x1c0 [ 80.130782][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 80.136074][ C0] ? irqtime_account_irq+0xd4/0x1e0 [ 80.141313][ C0] __irq_exit_rcu+0xf4/0x1c0 [ 80.145914][ C0] ? __pfx___irq_exit_rcu+0x10/0x10 [ 80.151148][ C0] irq_exit_rcu+0x9/0x30 [ 80.155402][ C0] common_interrupt+0xaa/0xd0 [ 80.160129][ C0] [ 80.163061][ C0] [ 80.165994][ C0] asm_common_interrupt+0x26/0x40 [ 80.171026][ C0] RIP: 0010:lock_acquire+0x264/0x550 [ 80.176321][ C0] Code: 2b 00 74 08 4c 89 f7 e8 aa 9e 8b 00 f6 44 24 61 02 0f 85 85 01 00 00 41 f7 c7 00 02 00 00 74 01 fb 48 c7 44 24 40 0e 36 e0 45 <4b> c7 44 25 00 00 00 00 00 43 c7 44 25 09 00 00 00 00 43 c7 44 25 [ 80.195960][ C0] RSP: 0018:ffffc9000345f3c0 EFLAGS: 00000206 [ 80.202033][ C0] RAX: 0000000000000001 RBX: 1ffff9200068be84 RCX: 05a0a220de09ff00 [ 80.210007][ C0] RDX: dffffc0000000000 RSI: ffffffff8c0ae6c0 RDI: ffffffff8c607c40 [ 80.217982][ C0] RBP: ffffc9000345f518 R08: ffffffff93737807 R09: 1ffffffff26e6f00 [ 80.226060][ C0] R10: dffffc0000000000 R11: fffffbfff26e6f01 R12: 1ffff9200068be80 [ 80.234056][ C0] R13: dffffc0000000000 R14: ffffc9000345f420 R15: 0000000000000246 [ 80.242172][ C0] ? __pfx_lock_acquire+0x10/0x10 [ 80.247216][ C0] ? pfn_valid+0xf6/0x450 [ 80.251557][ C0] ? __pfx_lock_release+0x10/0x10 [ 80.256598][ C0] ? __lruvec_stat_mod_folio+0x7d/0x300 [ 80.262157][ C0] ? __lruvec_stat_mod_folio+0x7d/0x300 [ 80.267803][ C0] ? page_ext_get+0x20/0x2a0 [ 80.272497][ C0] page_ext_get+0x3d/0x2a0 [ 80.276920][ C0] ? page_ext_get+0x20/0x2a0 [ 80.281515][ C0] page_table_check_clear+0x4b/0x550 [ 80.286814][ C0] unmap_page_range+0x2b48/0x42c0 [ 80.291983][ C0] ? __pfx_unmap_page_range+0x10/0x10 [ 80.297379][ C0] ? mas_next_slot+0xeab/0xf90 [ 80.302156][ C0] ? uprobe_munmap+0x183/0x460 [ 80.306930][ C0] ? unmap_single_vma+0x1bd/0x2b0 [ 80.311978][ C0] unmap_vmas+0x3cc/0x5f0 [ 80.316326][ C0] ? __pfx_unmap_vmas+0x10/0x10 [ 80.321200][ C0] ? tlb_gather_mmu_fullmm+0x160/0x210 [ 80.326671][ C0] exit_mmap+0x264/0xc80 [ 80.330956][ C0] ? __pfx_exit_mmap+0x10/0x10 [ 80.335729][ C0] ? __asan_memset+0x23/0x50 [ 80.340430][ C0] ? uprobe_clear_state+0x277/0x290 [ 80.345637][ C0] ? mm_update_next_owner+0xa4/0x810 [ 80.351018][ C0] ? do_raw_spin_unlock+0x13c/0x8b0 [ 80.356749][ C0] __mmput+0x115/0x390 [ 80.360833][ C0] exit_mm+0x220/0x310 [ 80.365094][ C0] ? __pfx_exit_mm+0x10/0x10 [ 80.369688][ C0] ? taskstats_exit+0x326/0xa60 [ 80.374557][ C0] do_exit+0x9b2/0x27f0 [ 80.378724][ C0] ? __pfx_do_exit+0x10/0x10 [ 80.383319][ C0] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 80.389313][ C0] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 80.395657][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 80.400868][ C0] ? lockdep_hardirqs_on+0x99/0x150 [ 80.406082][ C0] do_group_exit+0x207/0x2c0 [ 80.410683][ C0] __x64_sys_exit_group+0x3f/0x40 [ 80.415713][ C0] x64_sys_call+0x26c3/0x26d0 [ 80.420401][ C0] do_syscall_64+0xf3/0x230 [ 80.424925][ C0] ? clear_bhb_loop+0x35/0x90 [ 80.429610][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.435595][ C0] RIP: 0033:0x7f37ca666c49 [ 80.440013][ C0] Code: Unable to access opcode bytes at 0x7f37ca666c1f. [ 80.447031][ C0] RSP: 002b:00007ffe2ffe6b88 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 80.455717][ C0] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f37ca666c49 [ 80.463694][ C0] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 80.471677][ C0] RBP: 00007f37ca6e7390 R08: ffffffffffffffb8 R09: 00007ffe2ffe6d18 [ 80.479670][ C0] R10: 00007ffe2ffe6d18 R11: 0000000000000246 R12: 00007f37ca6e7390 [ 80.487668][ C0] R13: 0000000000000000 R14: 00007f37ca6e8e60 R15: 00007f37ca637a80 [ 80.495685][ C0] [ 80.499093][ C0] Kernel Offset: disabled [ 80.503595][ C0] Rebooting in 86400 seconds..