Warning: Permanently added '10.128.1.114' (ED25519) to the list of known hosts.
2023/12/22 00:00:55 ignoring optional flag "sandboxArg"="0"
2023/12/22 00:00:55 parsed 1 programs
2023/12/22 00:00:55 executed programs: 0
[ 56.137326][ T1498] kernel profiling enabled (shift: 0)
2023/12/22 00:01:01 executed programs: 1
[ 56.409178][ C0] ==================================================================
[ 56.417272][ C0] BUG: KASAN: stack-out-of-bounds in profile_pc+0xa4/0xe0
[ 56.424831][ C0] Read of size 8 at addr ffffc900005a7c20 by task syz-executor.0/1044
[ 56.433033][ C0]
[ 56.435343][ C0] CPU: 0 PID: 1044 Comm: syz-executor.0 Not tainted 6.1.69-syzkaller #0
[ 56.443636][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 56.454075][ C0] Call Trace:
[ 56.457346][ C0]
[ 56.460194][ C0] dump_stack_lvl+0xf4/0x251
[ 56.464768][ C0] ? nf_tcp_handle_invalid+0x2f3/0x2f3
[ 56.470309][ C0] ? panic+0x3f7/0x3f7
[ 56.474470][ C0] ? _printk+0xca/0x10a
[ 56.478661][ C0] print_report+0x15f/0x4f0
[ 56.483518][ C0] ? __lock_acquire+0xb70/0xb70
[ 56.488562][ C0] ? profile_pc+0xa4/0xe0
[ 56.493127][ C0] kasan_report+0x136/0x160
[ 56.497724][ C0] ? profile_pc+0xa4/0xe0
[ 56.502232][ C0] ? _raw_spin_unlock_irqrestore+0xc6/0x130
[ 56.508463][ C0] profile_pc+0xa4/0xe0
[ 56.512855][ C0] profile_tick+0x79/0xa0
[ 56.517245][ C0] tick_sched_timer+0x274/0x430
[ 56.522165][ C0] ? tick_setup_sched_timer+0x250/0x250
[ 56.527707][ C0] __hrtimer_run_queues+0x40f/0x810
[ 56.532895][ C0] ? hrtimer_interrupt+0xbc0/0xbc0
[ 56.537979][ C0] ? lapic_next_event+0x5b/0x70
[ 56.542813][ C0] hrtimer_interrupt+0x2e2/0xbc0
[ 56.547730][ C0] __sysvec_apic_timer_interrupt+0x121/0x400
[ 56.553854][ C0] sysvec_apic_timer_interrupt+0x87/0xb0
[ 56.559551][ C0]
[ 56.562460][ C0]
[ 56.565464][ C0] asm_sysvec_apic_timer_interrupt+0x16/0x20
[ 56.572908][ C0] RIP: 0010:_raw_spin_unlock_irqrestore+0xc6/0x130
[ 56.579733][ C0] Code: 9c 8f 44 24 20 42 80 3c 23 00 74 08 4c 89 ff e8 90 dc 4a fe f6 44 24 21 02 75 4e 41 f7 c6 00 02 00 00 74 01 fb bf 01 00 00 00 e5 9f fd fd 65 8b 05 c6 96 e3 7c 85 c0 74 3f 48 c7 04 24 0e 36
[ 56.600002][ C0] RSP: 0018:ffffc900005a7c20 EFLAGS: 00000206
[ 56.606162][ C0] RAX: 0000000000000001 RBX: 1ffff920000b4f88 RCX: 0000000000000000
[ 56.614646][ C0] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001
[ 56.622770][ C0] RBP: ffffc900005a7cb8 R08: dffffc0000000000 R09: fffffbfff0b2c431
[ 56.631781][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
[ 56.640343][ C0] R13: 1ffff920000b4f84 R14: 0000000000000246 R15: ffffc900005a7c40
[ 56.649099][ C0] ? _raw_spin_unlock+0x40/0x40
[ 56.654049][ C0] ? do_nanosleep+0x16d/0x490
[ 56.658963][ C0] debug_object_free+0x2bb/0x350
[ 56.664666][ C0] hrtimer_nanosleep+0x438/0x580
[ 56.669582][ C0] ? nanosleep_copyout+0xc0/0xc0
[ 56.674770][ C0] ? debug_deactivate+0x100/0x100
[ 56.680231][ C0] ? timespec64_add_safe+0x1a0/0x1a0
[ 56.685585][ C0] __se_sys_clock_nanosleep+0x29e/0x310
[ 56.691144][ C0] ? __x64_sys_clock_nanosleep+0xa0/0xa0
[ 56.697219][ C0] ? fpregs_assert_state_consistent+0x43/0x50
[ 56.703375][ C0] do_syscall_64+0x3d/0x80
[ 56.707877][ C0] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 56.713754][ C0] RIP: 0033:0x7f7d70847d33
[ 56.718322][ C0] Code: 00 00 00 00 0f 1f 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 80 3d ce 41 0d 00 00 74 14 b8 e6 00 00 00 0f 05 d8 c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec 28 48 89 54 24 10
[ 56.738451][ C0] RSP: 002b:00007fffbf7b38c8 EFLAGS: 00000202 ORIG_RAX: 00000000000000e6
[ 56.747456][ C0] RAX: ffffffffffffffda RBX: 0000000000000008 RCX: 00007f7d70847d33
[ 56.755500][ C0] RDX: 00007fffbf7b38e0 RSI: 0000000000000000 RDI: 0000000000000000
[ 56.763725][ C0] RBP: 00007fffbf7b396c R08: 00007fffbf7e60b0 R09: 0000000000000010
[ 56.771786][ C0] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000
[ 56.780624][ C0] R13: 000000000000dc12 R14: 000000000000dc12 R15: 0000000000000000
[ 56.789994][ C0]
[ 56.793086][ C0]
[ 56.795679][ C0] The buggy address belongs to stack of task syz-executor.0/1044
[ 56.803481][ C0] and is located at offset 0 in frame:
[ 56.809168][ C0] _raw_spin_unlock_irqrestore+0x0/0x130
[ 56.814861][ C0]
[ 56.817250][ C0] This frame has 1 object:
[ 56.821641][ C0] [32, 40) 'flags.i.i.i.i'
[ 56.821645][ C0]
[ 56.828872][ C0] The buggy address belongs to the virtual mapping at
[ 56.828872][ C0] [ffffc900005a0000, ffffc900005a9000) created by:
[ 56.828872][ C0] copy_process+0x44b/0x3510
[ 56.846856][ C0]
[ 56.849345][ C0] The buggy address belongs to the physical page:
[ 56.855932][ C0] page:ffffea00046c76c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11b1db
[ 56.866263][ C0] flags: 0x200000000000000(node=0|zone=2)
[ 56.872045][ C0] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[ 56.880948][ C0] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 56.889816][ C0] page dumped because: kasan: bad access detected
[ 56.896291][ C0] page_owner tracks the page as allocated
[ 56.901978][ C0] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x102dc2(GFP_HIGHUSER|__GFP_NOWARN|__GFP_ZERO), pid 1041, tgid 1041 (syz-executor.0), ts 51030682736, free_ts 44374105995
[ 56.921288][ C0] post_alloc_hook+0x286/0x2b0
[ 56.926758][ C0] get_page_from_freelist+0x2ba7/0x2de0
[ 56.932804][ C0] __alloc_pages+0x251/0x640
[ 56.937450][ C0] __vmalloc_node_range+0x6da/0x1090
[ 56.942717][ C0] dup_task_struct+0x798/0x890
[ 56.947624][ C0] copy_process+0x44b/0x3510
[ 56.952268][ C0] kernel_clone+0x190/0x680
[ 56.956866][ C0] __x64_sys_clone+0x22c/0x270
[ 56.961946][ C0] do_syscall_64+0x3d/0x80
[ 56.966332][ C0] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 56.972508][ C0] page last free stack trace:
[ 56.979003][ C0] free_unref_page_prepare+0xca9/0xd80
[ 56.984870][ C0] free_unref_page+0x30/0x230
[ 56.990164][ C0] pipe_read+0x502/0xde0
[ 56.995443][ C0] vfs_read+0x780/0x9a0
[ 56.999950][ C0] ksys_read+0x15f/0x240
[ 57.004531][ C0] do_syscall_64+0x3d/0x80
[ 57.009376][ C0] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 57.015350][ C0]
[ 57.017745][ C0] Memory state around the buggy address:
[ 57.023614][ C0] ffffc900005a7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 57.031922][ C0] ffffc900005a7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 57.040134][ C0] >ffffc900005a7c00: 00 00 00 00 f1 f1 f1 f1 00 f3 f3 f3 00 00 00 00
[ 57.048697][ C0] ^
[ 57.053883][ C0] ffffc900005a7c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 57.062089][ C0] ffffc900005a7d00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[ 57.070230][ C0] ==================================================================
[ 57.078268][ C0] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 57.085909][ C0] Kernel Offset: disabled
[ 57.090580][ C0] Rebooting in 86400 seconds..