================================================================== BUG: KASAN: wild-memory-access in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: wild-memory-access in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] BUG: KASAN: wild-memory-access in __lock_acquire+0xc94/0x2100 kernel/locking/lockdep.c:5198 Read of size 8 at addr 1fffffff8b706080 by task syz.2.2034/13463 CPU: 0 UID: 0 PID: 13463 Comm: syz.2.2034 Not tainted 6.14.0-rc7-syzkaller-00069-g81e4f8d68c66 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_report+0xe3/0x5b0 mm/kasan/report.c:524 kasan_report+0x143/0x180 mm/kasan/report.c:634 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] __lock_acquire+0xc94/0x2100 kernel/locking/lockdep.c:5198 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5851 _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0xb0/0x140 kernel/sched/core.c:606 raw_spin_rq_lock kernel/sched/sched.h:1521 [inline] rq_lock kernel/sched/sched.h:1852 [inline] __schedule+0x357/0x4c90 kernel/sched/core.c:6688 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7087 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:707 RIP: 0010:sized_strscpy+0x1dd/0x2b0 lib/string.c:179 Code: de eb bf 89 f9 80 e1 07 38 c1 7c d0 49 89 f7 e8 a9 73 24 f6 4c 89 fe eb c3 4a 8d 7c 35 01 48 89 f8 48 c1 e8 03 42 0f b6 04 28 <84> c0 0f 85 86 00 00 00 48 8d 5d 01 41 c6 44 2e 01 00 48 8d 7c 2e RSP: 0018:ffffc90003847250 EFLAGS: 00000216 RAX: 0000000000000000 RBX: 0000000000000034 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: ffff88805e2726c0 RDI: ffff88801e1bd9e2 RBP: 0000000000000009 R08: ffff88805e2726c0 R09: 1ffff1100bc4e4d8 R10: dffffc0000000000 R11: ffffed100bc4e4d9 R12: 0000000000000001 R13: dffffc0000000000 R14: ffff88801e1bd9d8 R15: 0000000000000003 _Z13sized_strscpyPcU25pass_dynamic_object_size1PKcU25pass_dynamic_object_size1m include/linux/fortify-string.h:329 [inline] __update_page_owner_handle+0x1f7/0x360 mm/page_owner.c:251 __set_page_owner+0x125/0x530 mm/page_owner.c:325 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1f4/0x240 mm/page_alloc.c:1551 prep_new_page mm/page_alloc.c:1559 [inline] get_page_from_freelist+0x365c/0x37a0 mm/page_alloc.c:3477 __alloc_frozen_pages_noprof+0x292/0x710 mm/page_alloc.c:4740 alloc_pages_mpol+0x311/0x660 mm/mempolicy.c:2270 alloc_frozen_pages_noprof mm/mempolicy.c:2341 [inline] alloc_pages_noprof+0x121/0x190 mm/mempolicy.c:2361 skb_page_frag_refill+0x158/0x2f0 net/core/sock.c:3060 mptcp_page_frag_refill net/mptcp/protocol.c:1109 [inline] mptcp_sendmsg+0x94b/0x19e0 net/mptcp/protocol.c:1873 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg+0xef/0x270 net/socket.c:733 ____sys_sendmsg+0x53a/0x860 net/socket.c:2573 ___sys_sendmsg net/socket.c:2627 [inline] __sys_sendmsg+0x269/0x350 net/socket.c:2659 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f28d218d169 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f28d2f65038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f28d23a6160 RCX: 00007f28d218d169 RDX: 0000000000000001 RSI: 0000400000000080 RDI: 0000000000000007 RBP: 00007f28d220e2a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f28d23a6160 R15: 00007ffec4e4f858 ================================================================== ---------------- Code disassembly (best guess), 1 bytes skipped: 0: eb bf jmp 0xffffffc1 2: 89 f9 mov %edi,%ecx 4: 80 e1 07 and $0x7,%cl 7: 38 c1 cmp %al,%cl 9: 7c d0 jl 0xffffffdb b: 49 89 f7 mov %rsi,%r15 e: e8 a9 73 24 f6 call 0xf62473bc 13: 4c 89 fe mov %r15,%rsi 16: eb c3 jmp 0xffffffdb 18: 4a 8d 7c 35 01 lea 0x1(%rbp,%r14,1),%rdi 1d: 48 89 f8 mov %rdi,%rax 20: 48 c1 e8 03 shr $0x3,%rax 24: 42 0f b6 04 28 movzbl (%rax,%r13,1),%eax * 29: 84 c0 test %al,%al <-- trapping instruction 2b: 0f 85 86 00 00 00 jne 0xb7 31: 48 8d 5d 01 lea 0x1(%rbp),%rbx 35: 41 c6 44 2e 01 00 movb $0x0,0x1(%r14,%rbp,1) 3b: 48 rex.W 3c: 8d .byte 0x8d 3d: 7c 2e jl 0x6d