./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1431798063

<...>
Warning: Permanently added '10.128.1.54' (ED25519) to the list of known hosts.
execve("./syz-executor1431798063", ["./syz-executor1431798063"], 0x7ffd5edaad80 /* 10 vars */) = 0
brk(NULL)                               = 0x55558afbc000
brk(0x55558afbcd00)                     = 0x55558afbcd00
arch_prctl(ARCH_SET_FS, 0x55558afbc380) = 0
set_tid_address(0x55558afbc650)         = 5841
set_robust_list(0x55558afbc660, 24)     = 0
rseq(0x55558afbcca0, 0x20, 0, 0x53053053) = 0
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor1431798063", 4096) = 28
getrandom("\x0b\xe5\x05\xdb\x7c\x71\x99\x3f", 8, GRND_NONBLOCK) = 8
brk(NULL)                               = 0x55558afbcd00
brk(0x55558afddd00)                     = 0x55558afddd00
brk(0x55558afde000)                     = 0x55558afde000
mprotect(0x7fa3ac8de000, 16384, PROT_READ) = 0
mmap(0x3ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x3ffffffff000
mmap(0x400000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x400000000000
mmap(0x400001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x400001000000
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5842 attached
, child_tidptr=0x55558afbc650) = 5842
[pid  5842] set_robust_list(0x55558afbc660, 24) = 0
[pid  5842] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0
[pid  5842] setpgid(0, 0)               = 0
[pid  5842] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3
[pid  5842] write(3, "1000", 4)         = 4
[pid  5842] close(3)                    = 0
executing program
[pid  5842] write(1, "executing program\n", 18) = 18
[   82.611748][ T5842] ==================================================================
[   82.619905][ T5842] BUG: KASAN: slab-out-of-bounds in atomic_ptr_type_ok+0x3d7/0x550
[   82.627862][ T5842] Read of size 4 at addr ffff888141b0d690 by task syz-executor143/5842
[   82.636144][ T5842] 
[   82.638496][ T5842] CPU: 1 UID: 0 PID: 5842 Comm: syz-executor143 Not tainted 6.14.0-rc3-syzkaller-gf28214603dc6 #0
[   82.638514][ T5842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   82.638529][ T5842] Call Trace:
[   82.638539][ T5842]  <TASK>
[   82.638547][ T5842]  dump_stack_lvl+0x241/0x360
[   82.638568][ T5842]  ? __pfx_dump_stack_lvl+0x10/0x10
[   82.638583][ T5842]  ? __pfx__printk+0x10/0x10
[   82.638598][ T5842]  ? _printk+0xd5/0x120
[   82.638611][ T5842]  ? __virt_addr_valid+0x183/0x530
[   82.638625][ T5842]  ? __virt_addr_valid+0x183/0x530
[   82.638644][ T5842]  print_report+0x16e/0x5b0
[   82.638664][ T5842]  ? __virt_addr_valid+0x183/0x530
[   82.638677][ T5842]  ? __virt_addr_valid+0x183/0x530
[   82.638689][ T5842]  ? __virt_addr_valid+0x45f/0x530
[   82.638701][ T5842]  ? __phys_addr+0xba/0x170
[   82.638724][ T5842]  ? atomic_ptr_type_ok+0x3d7/0x550
[   82.638740][ T5842]  kasan_report+0x143/0x180
[   82.638759][ T5842]  ? atomic_ptr_type_ok+0x3d7/0x550
[   82.638777][ T5842]  atomic_ptr_type_ok+0x3d7/0x550
[   82.638793][ T5842]  do_check+0x89dd/0xedd0
[   82.638819][ T5842]  ? __kasan_kmalloc+0x98/0xb0
[   82.638837][ T5842]  ? bpf_prog_load+0x1664/0x20e0
[   82.638857][ T5842]  ? __sys_bpf+0x4ea/0x820
[   82.638891][ T5842]  ? __pfx_do_check+0x10/0x10
[   82.638910][ T5842]  ? __pfx_verbose+0x10/0x10
[   82.638925][ T5842]  ? __pfx_disasm_kfunc_name+0x10/0x10
[   82.638945][ T5842]  ? __asan_memset+0x23/0x50
[   82.638962][ T5842]  do_check_common+0x1678/0x2080
[   82.638988][ T5842]  bpf_check+0x165c8/0x1cca0
[   82.639007][ T5842]  ? post_alloc_hook+0x207/0x240
[   82.639022][ T5842]  ? validate_chain+0x11e/0x5920
[   82.639046][ T5842]  ? __pfx_validate_chain+0x10/0x10
[   82.639062][ T5842]  ? validate_chain+0x11e/0x5920
[   82.639078][ T5842]  ? validate_chain+0x11e/0x5920
[   82.639092][ T5842]  ? mark_lock+0x9a/0x360
[   82.639110][ T5842]  ? validate_chain+0x11e/0x5920
[   82.639129][ T5842]  ? validate_chain+0x11e/0x5920
[   82.639144][ T5842]  ? __lock_acquire+0x1397/0x2100
[   82.639168][ T5842]  ? validate_chain+0x11e/0x5920
[   82.639186][ T5842]  ? __pfx_validate_chain+0x10/0x10
[   82.639204][ T5842]  ? __pfx_lock_acquire+0x10/0x10
[   82.639225][ T5842]  ? __pfx_validate_chain+0x10/0x10
[   82.639240][ T5842]  ? lockdep_hardirqs_on_prepare+0x43d/0x780
[   82.639263][ T5842]  ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[   82.639285][ T5842]  ? do_raw_spin_unlock+0x13c/0x8b0
[   82.639304][ T5842]  ? __pfx_bpf_check+0x10/0x10
[   82.639320][ T5842]  ? lockdep_hardirqs_on+0x99/0x150
[   82.639346][ T5842]  ? finish_task_switch+0x1e5/0x870
[   82.639363][ T5842]  ? mark_lock+0x9a/0x360
[   82.639377][ T5842]  ? __lock_acquire+0x1397/0x2100
[   82.639407][ T5842]  ? __pfx_lock_acquire+0x10/0x10
[   82.639428][ T5842]  ? ktime_get_with_offset+0x8d/0x2a0
[   82.639447][ T5842]  ? lockdep_hardirqs_on_prepare+0x43d/0x780
[   82.639470][ T5842]  ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[   82.639493][ T5842]  ? ktime_get_with_offset+0x8d/0x2a0
[   82.639510][ T5842]  ? seqcount_lockdep_reader_access+0x157/0x220
[   82.639535][ T5842]  ? lockdep_hardirqs_on+0x99/0x150
[   82.639555][ T5842]  ? seqcount_lockdep_reader_access+0x1d7/0x220
[   82.639574][ T5842]  ? __pfx_seqcount_lockdep_reader_access+0x10/0x10
[   82.639596][ T5842]  ? __check_object_size+0x8e/0x730
[   82.639616][ T5842]  ? __asan_memset+0x23/0x50
[   82.639635][ T5842]  ? bpf_obj_name_cpy+0x18a/0x1d0
[   82.639652][ T5842]  bpf_prog_load+0x1664/0x20e0
[   82.639678][ T5842]  ? __pfx_bpf_prog_load+0x10/0x10
[   82.639699][ T5842]  ? __pfx___might_resched+0x10/0x10
[   82.639723][ T5842]  ? __might_fault+0xaa/0x120
[   82.639741][ T5842]  __sys_bpf+0x4ea/0x820
[   82.639762][ T5842]  ? __pfx___sys_bpf+0x10/0x10
[   82.639793][ T5842]  ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[   82.639816][ T5842]  ? exc_page_fault+0x590/0x8b0
[   82.639839][ T5842]  __x64_sys_bpf+0x7c/0x90
[   82.639857][ T5842]  do_syscall_64+0xf3/0x230
[   82.639879][ T5842]  ? clear_bhb_loop+0x35/0x90
[   82.639903][ T5842]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   82.639923][ T5842] RIP: 0033:0x7fa3ac86bab9
[   82.639940][ T5842] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   82.639951][ T5842] RSP: 002b:00007ffe50fff5f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[   82.639967][ T5842] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa3ac86bab9
[   82.639978][ T5842] RDX: 0000000000000094 RSI: 00004000000009c0 RDI: 0000000000000005
[   82.639987][ T5842] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000006
[   82.639995][ T5842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   82.640004][ T5842] R13: 431bde82d7b634db R14: 0000000000000001 R15: 0000000000000001
[   82.640018][ T5842]  </TASK>
[   82.640023][ T5842] 
[   83.099848][ T5842] Allocated by task 5842:
[   83.104185][ T5842]  kasan_save_track+0x3f/0x80
[   83.108873][ T5842]  __kasan_kmalloc+0x98/0xb0
[   83.113476][ T5842]  __kmalloc_cache_noprof+0x243/0x390
[   83.118947][ T5842]  do_check_common+0x1ec/0x2080
[   83.123808][ T5842]  bpf_check+0x165c8/0x1cca0
[   83.128412][ T5842]  bpf_prog_load+0x1664/0x20e0
[   83.133219][ T5842]  __sys_bpf+0x4ea/0x820
[   83.137511][ T5842]  __x64_sys_bpf+0x7c/0x90
[   83.142060][ T5842]  do_syscall_64+0xf3/0x230
[   83.146581][ T5842]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   83.152499][ T5842] 
[   83.154824][ T5842] The buggy address belongs to the object at ffff888141b0d000
[   83.154824][ T5842]  which belongs to the cache kmalloc-2k of size 2048
[   83.168893][ T5842] The buggy address is located 312 bytes to the right of
[   83.168893][ T5842]  allocated 1368-byte region [ffff888141b0d000, ffff888141b0d558)
[   83.183845][ T5842] 
[   83.186193][ T5842] The buggy address belongs to the physical page:
[   83.192616][ T5842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x141b08
[   83.201475][ T5842] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.209995][ T5842] flags: 0x57ff00000000040(head|node=1|zone=2|lastcpupid=0x7ff)
[   83.217663][ T5842] page_type: f5(slab)
[   83.221664][ T5842] raw: 057ff00000000040 ffff88801b042000 dead000000000100 dead000000000122
[   83.230271][ T5842] raw: 0000000000000000 0000000080080008 00000000f5000000 0000000000000000
[   83.238967][ T5842] head: 057ff00000000040 ffff88801b042000 dead000000000100 dead000000000122
[   83.247659][ T5842] head: 0000000000000000 0000000080080008 00000000f5000000 0000000000000000
[   83.256404][ T5842] head: 057ff00000000003 ffffea000506c201 ffffffffffffffff 0000000000000000
[   83.265086][ T5842] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   83.273774][ T5842] page dumped because: kasan: bad access detected
[   83.280232][ T5842] page_owner tracks the page as allocated
[   83.285963][ T5842] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, tgid 1 (swapper/0), ts 8909973200, free_ts 0
[   83.305603][ T5842]  post_alloc_hook+0x1f4/0x240
[   83.310369][ T5842]  get_page_from_freelist+0x3a8c/0x3c20
[   83.315949][ T5842]  __alloc_frozen_pages_noprof+0x264/0x580
[   83.321760][ T5842]  alloc_pages_mpol+0x311/0x660
[   83.326638][ T5842]  allocate_slab+0x8f/0x3a0
[   83.331142][ T5842]  ___slab_alloc+0xc27/0x14a0
[   83.335851][ T5842]  __slab_alloc+0x58/0xa0
[   83.340193][ T5842]  __kmalloc_cache_noprof+0x27b/0x390
[   83.345601][ T5842]  virtio_pci_probe+0x54/0x340
[   83.350393][ T5842]  pci_device_probe+0x6c5/0xa10
[   83.355254][ T5842]  really_probe+0x2b9/0xad0
[   83.359776][ T5842]  __driver_probe_device+0x1a2/0x390
[   83.365073][ T5842]  driver_probe_device+0x50/0x430
[   83.370115][ T5842]  __driver_attach+0x45f/0x710
[   83.374880][ T5842]  bus_for_each_dev+0x239/0x2b0
[   83.379742][ T5842]  bus_add_driver+0x346/0x670
[   83.384427][ T5842] page_owner free stack trace missing
[   83.389795][ T5842] 
[   83.392132][ T5842] Memory state around the buggy address:
[   83.397857][ T5842]  ffff888141b0d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.405919][ T5842]  ffff888141b0d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.413986][ T5842] >ffff888141b0d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.422051][ T5842]                          ^
[   83.426665][ T5842]  ffff888141b0d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.434762][ T5842]  ffff888141b0d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.442863][ T5842] ==================================================================
[   83.452279][ T5842] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[   83.459600][ T5842] CPU: 1 UID: 0 PID: 5842 Comm: syz-executor143 Not tainted 6.14.0-rc3-syzkaller-gf28214603dc6 #0
[   83.470216][ T5842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   83.480282][ T5842] Call Trace:
[   83.483582][ T5842]  <TASK>
[   83.486542][ T5842]  dump_stack_lvl+0x241/0x360
[   83.491237][ T5842]  ? __pfx_dump_stack_lvl+0x10/0x10
[   83.496512][ T5842]  ? __pfx__printk+0x10/0x10
[   83.501315][ T5842]  ? preempt_schedule+0xe1/0xf0
[   83.506204][ T5842]  ? vscnprintf+0x5d/0x90
[   83.510843][ T5842]  panic+0x349/0x880
[   83.514777][ T5842]  ? check_panic_on_warn+0x21/0xb0
[   83.519931][ T5842]  ? __pfx_panic+0x10/0x10
[   83.524444][ T5842]  ? _raw_spin_unlock_irqrestore+0x130/0x140
[   83.530484][ T5842]  ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[   83.536827][ T5842]  ? print_report+0x519/0x5b0
[   83.541546][ T5842]  check_panic_on_warn+0x86/0xb0
[   83.546618][ T5842]  ? atomic_ptr_type_ok+0x3d7/0x550
[   83.551846][ T5842]  end_report+0x77/0x160
[   83.556110][ T5842]  kasan_report+0x154/0x180
[   83.560633][ T5842]  ? atomic_ptr_type_ok+0x3d7/0x550
[   83.565842][ T5842]  atomic_ptr_type_ok+0x3d7/0x550
[   83.570987][ T5842]  do_check+0x89dd/0xedd0
[   83.575363][ T5842]  ? __kasan_kmalloc+0x98/0xb0
[   83.580264][ T5842]  ? bpf_prog_load+0x1664/0x20e0
[   83.585250][ T5842]  ? __sys_bpf+0x4ea/0x820
[   83.589749][ T5842]  ? __pfx_do_check+0x10/0x10
[   83.594470][ T5842]  ? __pfx_verbose+0x10/0x10
[   83.599090][ T5842]  ? __pfx_disasm_kfunc_name+0x10/0x10
[   83.604569][ T5842]  ? __asan_memset+0x23/0x50
[   83.609171][ T5842]  do_check_common+0x1678/0x2080
[   83.614219][ T5842]  bpf_check+0x165c8/0x1cca0
[   83.618822][ T5842]  ? post_alloc_hook+0x207/0x240
[   83.623779][ T5842]  ? validate_chain+0x11e/0x5920
[   83.628771][ T5842]  ? __pfx_validate_chain+0x10/0x10
[   83.633980][ T5842]  ? validate_chain+0x11e/0x5920
[   83.638925][ T5842]  ? validate_chain+0x11e/0x5920
[   83.643959][ T5842]  ? mark_lock+0x9a/0x360
[   83.648324][ T5842]  ? validate_chain+0x11e/0x5920
[   83.653276][ T5842]  ? validate_chain+0x11e/0x5920
[   83.658223][ T5842]  ? __lock_acquire+0x1397/0x2100
[   83.663277][ T5842]  ? validate_chain+0x11e/0x5920
[   83.668250][ T5842]  ? __pfx_validate_chain+0x10/0x10
[   83.673479][ T5842]  ? __pfx_lock_acquire+0x10/0x10
[   83.678531][ T5842]  ? __pfx_validate_chain+0x10/0x10
[   83.683810][ T5842]  ? lockdep_hardirqs_on_prepare+0x43d/0x780
[   83.689808][ T5842]  ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[   83.696158][ T5842]  ? do_raw_spin_unlock+0x13c/0x8b0
[   83.701372][ T5842]  ? __pfx_bpf_check+0x10/0x10
[   83.706153][ T5842]  ? lockdep_hardirqs_on+0x99/0x150
[   83.711370][ T5842]  ? finish_task_switch+0x1e5/0x870
[   83.716582][ T5842]  ? mark_lock+0x9a/0x360
[   83.721026][ T5842]  ? __lock_acquire+0x1397/0x2100
[   83.726200][ T5842]  ? __pfx_lock_acquire+0x10/0x10
[   83.731341][ T5842]  ? ktime_get_with_offset+0x8d/0x2a0
[   83.736833][ T5842]  ? lockdep_hardirqs_on_prepare+0x43d/0x780
[   83.742836][ T5842]  ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[   83.749189][ T5842]  ? ktime_get_with_offset+0x8d/0x2a0
[   83.754930][ T5842]  ? seqcount_lockdep_reader_access+0x157/0x220
[   83.761419][ T5842]  ? lockdep_hardirqs_on+0x99/0x150
[   83.766732][ T5842]  ? seqcount_lockdep_reader_access+0x1d7/0x220
[   83.773018][ T5842]  ? __pfx_seqcount_lockdep_reader_access+0x10/0x10
[   83.779639][ T5842]  ? __check_object_size+0x8e/0x730
[   83.784862][ T5842]  ? __asan_memset+0x23/0x50
[   83.789466][ T5842]  ? bpf_obj_name_cpy+0x18a/0x1d0
[   83.794515][ T5842]  bpf_prog_load+0x1664/0x20e0
[   83.799306][ T5842]  ? __pfx_bpf_prog_load+0x10/0x10
[   83.804498][ T5842]  ? __pfx___might_resched+0x10/0x10
[   83.809830][ T5842]  ? __might_fault+0xaa/0x120
[   83.814526][ T5842]  __sys_bpf+0x4ea/0x820
[   83.818804][ T5842]  ? __pfx___sys_bpf+0x10/0x10
[   83.823679][ T5842]  ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[   83.830032][ T5842]  ? exc_page_fault+0x590/0x8b0
[   83.835010][ T5842]  __x64_sys_bpf+0x7c/0x90
[   83.839461][ T5842]  do_syscall_64+0xf3/0x230
[   83.844007][ T5842]  ? clear_bhb_loop+0x35/0x90
[   83.848734][ T5842]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   83.854682][ T5842] RIP: 0033:0x7fa3ac86bab9
[   83.859111][ T5842] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   83.878738][ T5842] RSP: 002b:00007ffe50fff5f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[   83.887172][ T5842] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa3ac86bab9
[   83.895155][ T5842] RDX: 0000000000000094 RSI: 00004000000009c0 RDI: 0000000000000005
[   83.903136][ T5842] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000006
[   83.911134][ T5842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   83.919114][ T5842] R13: 431bde82d7b634db R14: 0000000000000001 R15: 0000000000000001
[   83.927103][ T5842]  </TASK>
[   83.930413][ T5842] Kernel Offset: disabled
[   83.934787][ T5842] Rebooting in 86400 seconds..