INFO: task syz-executor.1:17698 can't die for more than 143 seconds. task:syz-executor.1 state:R running task stack:25496 pid:17698 ppid: 6534 flags:0x00004006 Call Trace: context_switch kernel/sched/core.c:4983 [inline] __schedule+0xab2/0x4d90 kernel/sched/core.c:6293 inet_twsk_purge+0x537/0x7d0 net/ipv4/inet_timewait_sock.c:264 INFO: task syz-executor.0:17701 can't die for more than 147 seconds. task:syz-executor.0 state:R running task stack:25496 pid:17701 ppid: 13143 flags:0x00004006 Call Trace: context_switch kernel/sched/core.c:4983 [inline] __schedule+0xab2/0x4d90 kernel/sched/core.c:6293 preempt_schedule_irq+0x4e/0x90 kernel/sched/core.c:6708 irqentry_exit+0x31/0x80 kernel/entry/common.c:425 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:lock_acquire+0x1ef/0x510 kernel/locking/lockdep.c:5605 Code: a7 a5 7e 83 f8 01 0f 85 b4 02 00 00 9c 58 f6 c4 02 0f 85 9f 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 RSP: 0018:ffffc9000333fab8 EFLAGS: 00000206 ================================================================== BUG: KASAN: stack-out-of-bounds in __show_regs.cold+0x2b/0x481 arch/x86/kernel/process_64.c:81 Read of size 8 at addr ffffc9000333fa60 by task khungtaskd/27 CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.16.0-rc2-next-20211123-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description.constprop.0.cold+0xf/0x320 mm/kasan/report.c:247 __kasan_report mm/kasan/report.c:433 [inline] kasan_report.cold+0x83/0xdf mm/kasan/report.c:450 __show_regs.cold+0x2b/0x481 arch/x86/kernel/process_64.c:81 show_trace_log_lvl+0x25b/0x2ba arch/x86/kernel/dumpstack.c:298 sched_show_task kernel/sched/core.c:8567 [inline] sched_show_task+0x433/0x5b0 kernel/sched/core.c:8541 check_killed_task kernel/hung_task.c:184 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:242 [inline] watchdog.cold+0x74/0x1de kernel/hung_task.c:339 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Memory state around the buggy address: ffffc9000333f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc9000333f980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc9000333fa00: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f3 f3 00 00 ^ ffffc9000333fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc9000333fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== ---------------- Code disassembly (best guess): 0: a7 cmpsl %es:(%rdi),%ds:(%rsi) 1: a5 movsl %ds:(%rsi),%es:(%rdi) 2: 7e 83 jle 0xffffff87 4: f8 clc 5: 01 0f add %ecx,(%rdi) 7: 85 b4 02 00 00 9c 58 test %esi,0x589c0000(%rdx,%rax,1) e: f6 c4 02 test $0x2,%ah 11: 0f 85 9f 02 00 00 jne 0x2b6 17: 48 83 7c 24 08 00 cmpq $0x0,0x8(%rsp) 1d: 74 01 je 0x20 1f: fb sti 20: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 27: fc ff df * 2a: 48 01 c3 add %rax,%rbx <-- trapping instruction 2d: 48 c7 03 00 00 00 00 movq $0x0,(%rbx) 34: 48 c7 43 08 00 00 00 movq $0x0,0x8(%rbx) 3b: 00 3c: 48 rex.W 3d: 8b .byte 0x8b 3e: 84 .byte 0x84 3f: 24 .byte 0x24