Warning: Permanently added '10.128.1.114' (ED25519) to the list of known hosts. 2023/12/22 00:00:55 ignoring optional flag "sandboxArg"="0" 2023/12/22 00:00:55 parsed 1 programs 2023/12/22 00:00:55 executed programs: 0 [ 56.137326][ T1498] kernel profiling enabled (shift: 0) 2023/12/22 00:01:01 executed programs: 1 [ 56.409178][ C0] ================================================================== [ 56.417272][ C0] BUG: KASAN: stack-out-of-bounds in profile_pc+0xa4/0xe0 [ 56.424831][ C0] Read of size 8 at addr ffffc900005a7c20 by task syz-executor.0/1044 [ 56.433033][ C0] [ 56.435343][ C0] CPU: 0 PID: 1044 Comm: syz-executor.0 Not tainted 6.1.69-syzkaller #0 [ 56.443636][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 56.454075][ C0] Call Trace: [ 56.457346][ C0] [ 56.460194][ C0] dump_stack_lvl+0xf4/0x251 [ 56.464768][ C0] ? nf_tcp_handle_invalid+0x2f3/0x2f3 [ 56.470309][ C0] ? panic+0x3f7/0x3f7 [ 56.474470][ C0] ? _printk+0xca/0x10a [ 56.478661][ C0] print_report+0x15f/0x4f0 [ 56.483518][ C0] ? __lock_acquire+0xb70/0xb70 [ 56.488562][ C0] ? profile_pc+0xa4/0xe0 [ 56.493127][ C0] kasan_report+0x136/0x160 [ 56.497724][ C0] ? profile_pc+0xa4/0xe0 [ 56.502232][ C0] ? _raw_spin_unlock_irqrestore+0xc6/0x130 [ 56.508463][ C0] profile_pc+0xa4/0xe0 [ 56.512855][ C0] profile_tick+0x79/0xa0 [ 56.517245][ C0] tick_sched_timer+0x274/0x430 [ 56.522165][ C0] ? tick_setup_sched_timer+0x250/0x250 [ 56.527707][ C0] __hrtimer_run_queues+0x40f/0x810 [ 56.532895][ C0] ? hrtimer_interrupt+0xbc0/0xbc0 [ 56.537979][ C0] ? lapic_next_event+0x5b/0x70 [ 56.542813][ C0] hrtimer_interrupt+0x2e2/0xbc0 [ 56.547730][ C0] __sysvec_apic_timer_interrupt+0x121/0x400 [ 56.553854][ C0] sysvec_apic_timer_interrupt+0x87/0xb0 [ 56.559551][ C0] [ 56.562460][ C0] [ 56.565464][ C0] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 56.572908][ C0] RIP: 0010:_raw_spin_unlock_irqrestore+0xc6/0x130 [ 56.579733][ C0] Code: 9c 8f 44 24 20 42 80 3c 23 00 74 08 4c 89 ff e8 90 dc 4a fe f6 44 24 21 02 75 4e 41 f7 c6 00 02 00 00 74 01 fb bf 01 00 00 00 e5 9f fd fd 65 8b 05 c6 96 e3 7c 85 c0 74 3f 48 c7 04 24 0e 36 [ 56.600002][ C0] RSP: 0018:ffffc900005a7c20 EFLAGS: 00000206 [ 56.606162][ C0] RAX: 0000000000000001 RBX: 1ffff920000b4f88 RCX: 0000000000000000 [ 56.614646][ C0] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 [ 56.622770][ C0] RBP: ffffc900005a7cb8 R08: dffffc0000000000 R09: fffffbfff0b2c431 [ 56.631781][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 56.640343][ C0] R13: 1ffff920000b4f84 R14: 0000000000000246 R15: ffffc900005a7c40 [ 56.649099][ C0] ? _raw_spin_unlock+0x40/0x40 [ 56.654049][ C0] ? do_nanosleep+0x16d/0x490 [ 56.658963][ C0] debug_object_free+0x2bb/0x350 [ 56.664666][ C0] hrtimer_nanosleep+0x438/0x580 [ 56.669582][ C0] ? nanosleep_copyout+0xc0/0xc0 [ 56.674770][ C0] ? debug_deactivate+0x100/0x100 [ 56.680231][ C0] ? timespec64_add_safe+0x1a0/0x1a0 [ 56.685585][ C0] __se_sys_clock_nanosleep+0x29e/0x310 [ 56.691144][ C0] ? __x64_sys_clock_nanosleep+0xa0/0xa0 [ 56.697219][ C0] ? fpregs_assert_state_consistent+0x43/0x50 [ 56.703375][ C0] do_syscall_64+0x3d/0x80 [ 56.707877][ C0] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 56.713754][ C0] RIP: 0033:0x7f7d70847d33 [ 56.718322][ C0] Code: 00 00 00 00 0f 1f 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 80 3d ce 41 0d 00 00 74 14 b8 e6 00 00 00 0f 05 d8 c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec 28 48 89 54 24 10 [ 56.738451][ C0] RSP: 002b:00007fffbf7b38c8 EFLAGS: 00000202 ORIG_RAX: 00000000000000e6 [ 56.747456][ C0] RAX: ffffffffffffffda RBX: 0000000000000008 RCX: 00007f7d70847d33 [ 56.755500][ C0] RDX: 00007fffbf7b38e0 RSI: 0000000000000000 RDI: 0000000000000000 [ 56.763725][ C0] RBP: 00007fffbf7b396c R08: 00007fffbf7e60b0 R09: 0000000000000010 [ 56.771786][ C0] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 56.780624][ C0] R13: 000000000000dc12 R14: 000000000000dc12 R15: 0000000000000000 [ 56.789994][ C0] [ 56.793086][ C0] [ 56.795679][ C0] The buggy address belongs to stack of task syz-executor.0/1044 [ 56.803481][ C0] and is located at offset 0 in frame: [ 56.809168][ C0] _raw_spin_unlock_irqrestore+0x0/0x130 [ 56.814861][ C0] [ 56.817250][ C0] This frame has 1 object: [ 56.821641][ C0] [32, 40) 'flags.i.i.i.i' [ 56.821645][ C0] [ 56.828872][ C0] The buggy address belongs to the virtual mapping at [ 56.828872][ C0] [ffffc900005a0000, ffffc900005a9000) created by: [ 56.828872][ C0] copy_process+0x44b/0x3510 [ 56.846856][ C0] [ 56.849345][ C0] The buggy address belongs to the physical page: [ 56.855932][ C0] page:ffffea00046c76c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11b1db [ 56.866263][ C0] flags: 0x200000000000000(node=0|zone=2) [ 56.872045][ C0] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 56.880948][ C0] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 56.889816][ C0] page dumped because: kasan: bad access detected [ 56.896291][ C0] page_owner tracks the page as allocated [ 56.901978][ C0] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x102dc2(GFP_HIGHUSER|__GFP_NOWARN|__GFP_ZERO), pid 1041, tgid 1041 (syz-executor.0), ts 51030682736, free_ts 44374105995 [ 56.921288][ C0] post_alloc_hook+0x286/0x2b0 [ 56.926758][ C0] get_page_from_freelist+0x2ba7/0x2de0 [ 56.932804][ C0] __alloc_pages+0x251/0x640 [ 56.937450][ C0] __vmalloc_node_range+0x6da/0x1090 [ 56.942717][ C0] dup_task_struct+0x798/0x890 [ 56.947624][ C0] copy_process+0x44b/0x3510 [ 56.952268][ C0] kernel_clone+0x190/0x680 [ 56.956866][ C0] __x64_sys_clone+0x22c/0x270 [ 56.961946][ C0] do_syscall_64+0x3d/0x80 [ 56.966332][ C0] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 56.972508][ C0] page last free stack trace: [ 56.979003][ C0] free_unref_page_prepare+0xca9/0xd80 [ 56.984870][ C0] free_unref_page+0x30/0x230 [ 56.990164][ C0] pipe_read+0x502/0xde0 [ 56.995443][ C0] vfs_read+0x780/0x9a0 [ 56.999950][ C0] ksys_read+0x15f/0x240 [ 57.004531][ C0] do_syscall_64+0x3d/0x80 [ 57.009376][ C0] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 57.015350][ C0] [ 57.017745][ C0] Memory state around the buggy address: [ 57.023614][ C0] ffffc900005a7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 57.031922][ C0] ffffc900005a7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 57.040134][ C0] >ffffc900005a7c00: 00 00 00 00 f1 f1 f1 f1 00 f3 f3 f3 00 00 00 00 [ 57.048697][ C0] ^ [ 57.053883][ C0] ffffc900005a7c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 57.062089][ C0] ffffc900005a7d00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 [ 57.070230][ C0] ================================================================== [ 57.078268][ C0] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 57.085909][ C0] Kernel Offset: disabled [ 57.090580][ C0] Rebooting in 86400 seconds..