================================================================================ UBSAN: array-index-out-of-bounds in kernel/locking/qspinlock.c:130:9 index 16382 is out of range for type 'unsigned long[8]' CPU: 1 PID: 25 Comm: ksoftirqd/1 Tainted: G W 5.15.178-syzkaller-00193-g058abb720bd1 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x151/0x1c0 lib/dump_stack.c:106 dump_stack+0x15/0x20 lib/dump_stack.c:113 ubsan_epilogue lib/ubsan.c:151 [inline] __ubsan_handle_out_of_bounds+0x118/0x140 lib/ubsan.c:282 decode_tail kernel/locking/qspinlock.c:130 [inline] __pv_queued_spin_lock_slowpath+0xb9d/0xc40 kernel/locking/qspinlock.c:468 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:585 [inline] queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:51 [inline] queued_spin_lock include/asm-generic/qspinlock.h:85 [inline] do_raw_spin_lock include/linux/spinlock.h:187 [inline] __raw_spin_lock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_lock+0x139/0x1b0 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:363 [inline] ptr_ring_produce include/linux/ptr_ring.h:128 [inline] cpu_map_generic_redirect+0x1d5/0x6d0 kernel/bpf/cpumap.c:786 xdp_do_generic_redirect_map net/core/filter.c:4189 [inline] xdp_do_generic_redirect+0x3df/0xb40 net/core/filter.c:4236 do_xdp_generic+0x50b/0x7c0 net/core/dev.c:4919 __netif_receive_skb_core+0x1706/0x3640 net/core/dev.c:5324 __netif_receive_skb_one_core net/core/dev.c:5499 [inline] __netif_receive_skb+0x11c/0x530 net/core/dev.c:5615 process_backlog+0x31c/0x650 net/core/dev.c:6492 __napi_poll+0xc4/0x5a0 net/core/dev.c:7051 napi_poll net/core/dev.c:7118 [inline] net_rx_action+0x47d/0xc50 net/core/dev.c:7208 handle_softirqs+0x25e/0x5c0 kernel/softirq.c:565 run_ksoftirqd+0x28/0x40 kernel/softirq.c:941 smpboot_thread_fn+0x466/0x8d0 kernel/smpboot.c:164 kthread+0x421/0x510 kernel/kthread.c:337 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 ================================================================================ general protection fault, probably for non-canonical address 0xe010f2fb9f81fd7d: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0x0087b7dcfc0febe8-0x0087b7dcfc0febef] CPU: 1 PID: 25 Comm: ksoftirqd/1 Tainted: G W 5.15.178-syzkaller-00193-g058abb720bd1 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 RIP: 0010:__pv_queued_spin_lock_slowpath+0x2f3/0xc40 kernel/locking/qspinlock.c:471 Code: 74 1e 48 89 4c 24 10 48 8b 7c 24 10 e8 e6 98 5d 00 48 8b 4c 24 10 48 ba 00 00 00 00 00 fc ff df 4c 03 21 4c 89 e0 48 c1 e8 03 <80> 3c 10 00 74 12 4c 89 e7 e8 5f 99 5d 00 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc900001a7440 EFLAGS: 00010206 RAX: 0010f6fb9f81fd7d RBX: ffff8881f7138ad4 RCX: ffffffff86286820 RDX: dffffc0000000000 RSI: 0000000000000002 RDI: 00000000ffffffff RBP: ffffc900001a7530 R08: ffffffff8141a9ab R09: 0000000000000003 R10: fffffbfff0e9aa4c R11: dffffc0000000001 R12: 0087b7dcfc0febe9 R13: 1ffff11022366ae2 R14: 1ffff1103ee27159 R15: ffff888111b35714 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f445f2eb178 CR3: 000000013d095000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 000000000000000c DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:585 [inline] queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:51 [inline] queued_spin_lock include/asm-generic/qspinlock.h:85 [inline] do_raw_spin_lock include/linux/spinlock.h:187 [inline] __raw_spin_lock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_lock+0x139/0x1b0 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:363 [inline] ptr_ring_produce include/linux/ptr_ring.h:128 [inline] cpu_map_generic_redirect+0x1d5/0x6d0 kernel/bpf/cpumap.c:786 xdp_do_generic_redirect_map net/core/filter.c:4189 [inline] xdp_do_generic_redirect+0x3df/0xb40 net/core/filter.c:4236 do_xdp_generic+0x50b/0x7c0 net/core/dev.c:4919 __netif_receive_skb_core+0x1706/0x3640 net/core/dev.c:5324 __netif_receive_skb_one_core net/core/dev.c:5499 [inline] __netif_receive_skb+0x11c/0x530 net/core/dev.c:5615 process_backlog+0x31c/0x650 net/core/dev.c:6492 __napi_poll+0xc4/0x5a0 net/core/dev.c:7051 napi_poll net/core/dev.c:7118 [inline] net_rx_action+0x47d/0xc50 net/core/dev.c:7208 handle_softirqs+0x25e/0x5c0 kernel/softirq.c:565 run_ksoftirqd+0x28/0x40 kernel/softirq.c:941 smpboot_thread_fn+0x466/0x8d0 kernel/smpboot.c:164 kthread+0x421/0x510 kernel/kthread.c:337 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 Modules linked in: ---[ end trace 406cbee5f6fa0cb9 ]--- RIP: 0010:__pv_queued_spin_lock_slowpath+0x2f3/0xc40 kernel/locking/qspinlock.c:471 Code: 74 1e 48 89 4c 24 10 48 8b 7c 24 10 e8 e6 98 5d 00 48 8b 4c 24 10 48 ba 00 00 00 00 00 fc ff df 4c 03 21 4c 89 e0 48 c1 e8 03 <80> 3c 10 00 74 12 4c 89 e7 e8 5f 99 5d 00 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc900001a7440 EFLAGS: 00010206 RAX: 0010f6fb9f81fd7d RBX: ffff8881f7138ad4 RCX: ffffffff86286820 RDX: dffffc0000000000 RSI: 0000000000000002 RDI: 00000000ffffffff RBP: ffffc900001a7530 R08: ffffffff8141a9ab R09: 0000000000000003 R10: fffffbfff0e9aa4c R11: dffffc0000000001 R12: 0087b7dcfc0febe9 R13: 1ffff11022366ae2 R14: 1ffff1103ee27159 R15: ffff888111b35714 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f445f2eb178 CR3: 000000013d095000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 000000000000000c DR6: 00000000ffff0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 74 1e je 0x20 2: 48 89 4c 24 10 mov %rcx,0x10(%rsp) 7: 48 8b 7c 24 10 mov 0x10(%rsp),%rdi c: e8 e6 98 5d 00 call 0x5d98f7 11: 48 8b 4c 24 10 mov 0x10(%rsp),%rcx 16: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx 1d: fc ff df 20: 4c 03 21 add (%rcx),%r12 23: 4c 89 e0 mov %r12,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 80 3c 10 00 cmpb $0x0,(%rax,%rdx,1) <-- trapping instruction 2e: 74 12 je 0x42 30: 4c 89 e7 mov %r12,%rdi 33: e8 5f 99 5d 00 call 0x5d9997 38: 48 rex.W 39: ba 00 00 00 00 mov $0x0,%edx 3e: 00 fc add %bh,%ah