================================================================== BUG: KASAN: wild-memory-access in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: wild-memory-access in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] BUG: KASAN: wild-memory-access in __lock_acquire+0xc8b/0x2040 kernel/locking/lockdep.c:5112 Read of size 8 at addr 1fffffff92d69a30 by task syz-executor/11453 CPU: 0 UID: 0 PID: 11453 Comm: syz-executor Not tainted 6.11.0-rc6-syzkaller-00026-g88fac17500f4 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_report+0xe8/0x550 mm/kasan/report.c:491 kasan_report+0x143/0x180 mm/kasan/report.c:601 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] __lock_acquire+0xc8b/0x2040 kernel/locking/lockdep.c:5112 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5759 _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0xb0/0x140 kernel/sched/core.c:568 raw_spin_rq_lock kernel/sched/sched.h:1415 [inline] rq_lock kernel/sched/sched.h:1714 [inline] __schedule+0x357/0x4a60 kernel/sched/core.c:6436 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:6851 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:707 RIP: 0010:trace_lock_release include/trace/events/lock.h:69 [inline] RIP: 0010:lock_release+0xb8/0xa30 kernel/locking/lockdep.c:5770 Code: 08 0f 83 fe 05 00 00 89 c3 48 89 d8 48 c1 e8 06 48 8d 3c c5 28 6f 18 90 be 08 00 00 00 e8 30 e6 8a 00 48 0f a3 1d 40 7b a8 0e <73> 16 e8 f1 ce 09 00 84 c0 75 0d 80 3d 2c 47 92 0e 00 0f 84 fc 05 RSP: 0018:ffffc90004086ba0 EFLAGS: 00000257 RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff816ff3e0 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff90186f28 RBP: ffffc90004086cd0 R08: ffffffff90186f2f R09: 1ffffffff2030de5 R10: dffffc0000000000 R11: fffffbfff2030de6 R12: 1ffff92000810d80 R13: ffffffff8179fd33 R14: ffffffff8e93d690 R15: dffffc0000000000 __mutex_unlock_slowpath+0xe2/0x750 kernel/locking/mutex.c:912 synchronize_rcu_expedited+0x6a3/0x830 kernel/rcu/tree_exp.h:977 synchronize_net net/core/dev.c:11232 [inline] netif_set_real_num_tx_queues+0x4e7/0x900 net/core/dev.c:2955 veth_init_queues drivers/net/veth.c:1755 [inline] veth_newlink+0x91b/0xce0 drivers/net/veth.c:1872 rtnl_newlink_create net/core/rtnetlink.c:3510 [inline] __rtnl_newlink net/core/rtnetlink.c:3730 [inline] rtnl_newlink+0x1593/0x20a0 net/core/rtnetlink.c:3743 rtnetlink_rcv_msg+0x741/0xcf0 net/core/rtnetlink.c:6647 netlink_rcv_skb+0x1e5/0x430 net/netlink/af_netlink.c:2550 netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline] netlink_unicast+0x7f8/0x990 net/netlink/af_netlink.c:1357 netlink_sendmsg+0x8e4/0xcb0 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x223/0x270 net/socket.c:745 __sys_sendto+0x3a4/0x4f0 net/socket.c:2204 __do_sys_sendto net/socket.c:2216 [inline] __se_sys_sendto net/socket.c:2212 [inline] __x64_sys_sendto+0xde/0x100 net/socket.c:2212 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fbd0f17ed8c Code: 2a 5a 02 00 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 70 5a 02 00 48 8b RSP: 002b:00007fff1ee99b50 EFLAGS: 00000293 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007fbd0fe64620 RCX: 00007fbd0f17ed8c RDX: 000000000000006c RSI: 00007fbd0fe64670 RDI: 0000000000000003 RBP: 0000000000000000 R08: 00007fff1ee99ba4 R09: 000000000000000c R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 R13: 0000000000000000 R14: 00007fbd0fe64670 R15: 0000000000000000 ================================================================== ---------------- Code disassembly (best guess): 0: 08 0f or %cl,(%rdi) 2: 83 fe 05 cmp $0x5,%esi 5: 00 00 add %al,(%rax) 7: 89 c3 mov %eax,%ebx 9: 48 89 d8 mov %rbx,%rax c: 48 c1 e8 06 shr $0x6,%rax 10: 48 8d 3c c5 28 6f 18 lea -0x6fe790d8(,%rax,8),%rdi 17: 90 18: be 08 00 00 00 mov $0x8,%esi 1d: e8 30 e6 8a 00 call 0x8ae652 22: 48 0f a3 1d 40 7b a8 bt %rbx,0xea87b40(%rip) # 0xea87b6a 29: 0e * 2a: 73 16 jae 0x42 <-- trapping instruction 2c: e8 f1 ce 09 00 call 0x9cf22 31: 84 c0 test %al,%al 33: 75 0d jne 0x42 35: 80 3d 2c 47 92 0e 00 cmpb $0x0,0xe92472c(%rip) # 0xe924768 3c: 0f .byte 0xf 3d: 84 fc test %bh,%ah 3f: 05 .byte 0x5