================================================================================
UBSAN: array-index-out-of-bounds in kernel/bpf/verifier.c:6301:8
index 3218603112 is out of range for type 'struct bpf_map *[64]'
CPU: 1 PID: 29706 Comm: syz-executor.3 Not tainted 5.4.265-syzkaller-00043-gbf4c80bc4358 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1d8/0x241 lib/dump_stack.c:118
ubsan_epilogue lib/ubsan.c:148 [inline]
__ubsan_handle_out_of_bounds+0x113/0x160 lib/ubsan.c:356
check_ld_imm+0x87c/0x890 kernel/bpf/verifier.c:6301
do_check+0x5deb/0x9820 kernel/bpf/verifier.c:8122
bpf_check+0x2169/0xb340 kernel/bpf/verifier.c:9637
bpf_prog_load kernel/bpf/syscall.c:1724 [inline]
__do_sys_bpf kernel/bpf/syscall.c:2891 [inline]
__se_sys_bpf+0x8139/0xbcb0 kernel/bpf/syscall.c:2849
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
================================================================================
BUG: unable to handle page fault for address: ffffed10f8228c70
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 23fff3067 P4D 23fff3067 PUD 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 29706 Comm: syz-executor.3 Not tainted 5.4.265-syzkaller-00043-gbf4c80bc4358 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
RIP: 0010:check_ld_imm+0x3b5/0x890 kernel/bpf/verifier.c:6301
Code: 00 8b 2b bf 40 00 00 00 89 ee e8 16 71 f2 ff 48 83 fd 3f 0f 87 c4 04 00 00 e8 17 6e f2 ff 49 8d 6c ec 40 48 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 ef e8 ac 40 22 00 48 89 5c 24 18 4c 8b
RSP: 0018:ffff8881bbfbf040 EFLAGS: 00010a02
RAX: 1ffff110f8228c70 RBX: ffffc900000871c8 RCX: 0000000000040000
RDX: ffffc90001548000 RSI: 00000000000320a5 RDI: 00000000000320a6
RBP: ffff8887c1146380 R08: ffffffff82485436 R09: ffffed103edea9b8
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881c2548000
R13: 1ffff92000010a1a R14: ffff8881e9ab4000 R15: dffffc0000000000
FS: 00007fe5b0c256c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffed10f8228c70 CR3: 00000001f27fb000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
do_check+0x5deb/0x9820 kernel/bpf/verifier.c:8122
bpf_check+0x2169/0xb340 kernel/bpf/verifier.c:9637
bpf_prog_load kernel/bpf/syscall.c:1724 [inline]
__do_sys_bpf kernel/bpf/syscall.c:2891 [inline]
__se_sys_bpf+0x8139/0xbcb0 kernel/bpf/syscall.c:2849
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
Modules linked in:
CR2: ffffed10f8228c70
---[ end trace 6fcc5313f106c383 ]---
RIP: 0010:check_ld_imm+0x3b5/0x890 kernel/bpf/verifier.c:6301
Code: 00 8b 2b bf 40 00 00 00 89 ee e8 16 71 f2 ff 48 83 fd 3f 0f 87 c4 04 00 00 e8 17 6e f2 ff 49 8d 6c ec 40 48 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 ef e8 ac 40 22 00 48 89 5c 24 18 4c 8b
RSP: 0018:ffff8881bbfbf040 EFLAGS: 00010a02
RAX: 1ffff110f8228c70 RBX: ffffc900000871c8 RCX: 0000000000040000
RDX: ffffc90001548000 RSI: 00000000000320a5 RDI: 00000000000320a6
RBP: ffff8887c1146380 R08: ffffffff82485436 R09: ffffed103edea9b8
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881c2548000
R13: 1ffff92000010a1a R14: ffff8881e9ab4000 R15: dffffc0000000000
FS: 00007fe5b0c256c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffed10f8228c70 CR3: 00000001f27fb000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 00 8b 2b bf 40 00 add %cl,0x40bf2b(%rbx)
6: 00 00 add %al,(%rax)
8: 89 ee mov %ebp,%esi
a: e8 16 71 f2 ff call 0xfff27125
f: 48 83 fd 3f cmp $0x3f,%rbp
13: 0f 87 c4 04 00 00 ja 0x4dd
19: e8 17 6e f2 ff call 0xfff26e35
1e: 49 8d 6c ec 40 lea 0x40(%r12,%rbp,8),%rbp
23: 48 89 e8 mov %rbp,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 48 89 ef mov %rbp,%rdi
34: e8 ac 40 22 00 call 0x2240e5
39: 48 89 5c 24 18 mov %rbx,0x18(%rsp)
3e: 4c rex.WR
3f: 8b .byte 0x8b