==================================================================
BUG: KASAN: slab-out-of-bounds in hlist_move_list include/linux/list.h:870 [inline]
BUG: KASAN: slab-out-of-bounds in __collect_expired_timers kernel/time/timer.c:1514 [inline]
BUG: KASAN: slab-out-of-bounds in collect_expired_timers kernel/time/timer.c:1749 [inline]
BUG: KASAN: slab-out-of-bounds in __run_timers+0x521/0xbe0 kernel/time/timer.c:1813
Write of size 8 at addr ffff8881d53c71c8 by task syz-executor.4/4277
CPU: 0 PID: 4277 Comm: syz-executor.4 Not tainted 5.4.274-syzkaller-00002-g6f97bd951d82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1d8/0x241 lib/dump_stack.c:118
print_address_description+0x8c/0x600 mm/kasan/report.c:384
__kasan_report+0xf3/0x120 mm/kasan/report.c:516
kasan_report+0x30/0x60 mm/kasan/common.c:653
hlist_move_list include/linux/list.h:870 [inline]
__collect_expired_timers kernel/time/timer.c:1514 [inline]
collect_expired_timers kernel/time/timer.c:1749 [inline]
__run_timers+0x521/0xbe0 kernel/time/timer.c:1813
run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830
__do_softirq+0x23b/0x6b7 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:373 [inline]
irq_exit+0x195/0x1c0 kernel/softirq.c:413
exiting_irq arch/x86/include/asm/apic.h:538 [inline]
smp_apic_timer_interrupt+0x11a/0x460 arch/x86/kernel/apic/apic.c:1149
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834
RIP: 0010:memset_erms+0xb/0x10 arch/x86/lib/memset_64.S:65
Code: 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 f3 aa <4c> 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01 01 01
RSP: 0018:ffff8881e676e958 EFLAGS: 00000256 ORIG_RAX: ffffffffffffff13
RAX: ffff8881e676ec00 RBX: ffff8881e676ec98 RCX: 0000000000000000
RDX: 0000000000000010 RSI: 0000000000000000 RDI: ffff8881e676ecc0
RBP: ffff8881e676ec50 R08: dffffc0000000000 R09: ffff8881e676ecb0
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffffffff0d07355
R13: ffffffff86839aa8 R14: ffff8881e676ec60 R15: dffffc0000000000
unwind_next_frame+0x1036/0x1ea0 arch/x86/kernel/unwind_orc.c:534
arch_stack_walk+0x111/0x140 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x118/0x1c0 kernel/stacktrace.c:123
save_stack mm/kasan/common.c:70 [inline]
set_track mm/kasan/common.c:78 [inline]
__kasan_kmalloc+0x171/0x210 mm/kasan/common.c:529
slab_post_alloc_hook mm/slab.h:584 [inline]
slab_alloc_node mm/slub.c:2829 [inline]
slab_alloc mm/slub.c:2837 [inline]
kmem_cache_alloc_trace+0xdc/0x260 mm/slub.c:2854
kmalloc include/linux/slab.h:556 [inline]
kzalloc include/linux/slab.h:690 [inline]
do_check+0x14d/0x9820 kernel/bpf/verifier.c:7798
bpf_check+0x2169/0xb340 kernel/bpf/verifier.c:9637
bpf_prog_load kernel/bpf/syscall.c:1724 [inline]
__do_sys_bpf kernel/bpf/syscall.c:2891 [inline]
__se_sys_bpf+0x8139/0xbcb0 kernel/bpf/syscall.c:2849
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
RIP: 0033:0x7f16e9b18ea9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f16e8e930c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f16e9c4ff80 RCX: 00007f16e9b18ea9
RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005
RBP: 00007f16e9b87ff4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f16e9c4ff80 R15: 00007fff1cb0c5b8
Allocated by task 4190:
save_stack mm/kasan/common.c:70 [inline]
set_track mm/kasan/common.c:78 [inline]
__kasan_kmalloc+0x171/0x210 mm/kasan/common.c:529
slab_post_alloc_hook mm/slab.h:584 [inline]
slab_alloc_node mm/slub.c:2829 [inline]
slab_alloc mm/slub.c:2837 [inline]
kmem_cache_alloc+0xd9/0x250 mm/slub.c:2842
sk_prot_alloc+0x63/0x3e0 net/core/sock.c:1616
sk_alloc+0x35/0x2f0 net/core/sock.c:1680
unix_create1+0x8e/0x590 net/unix/af_unix.c:802
unix_create+0x12c/0x1b0 net/unix/af_unix.c:863
__sock_create+0x3cb/0x7a0 net/socket.c:1427
sock_create net/socket.c:1478 [inline]
__sys_socketpair+0x28f/0x6e0 net/socket.c:1578
__do_sys_socketpair net/socket.c:1631 [inline]
__se_sys_socketpair net/socket.c:1628 [inline]
__x64_sys_socketpair+0x97/0xb0 net/socket.c:1628
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
Freed by task 4190:
save_stack mm/kasan/common.c:70 [inline]
set_track mm/kasan/common.c:78 [inline]
kasan_set_free_info mm/kasan/common.c:345 [inline]
__kasan_slab_free+0x1b5/0x270 mm/kasan/common.c:487
slab_free_hook mm/slub.c:1455 [inline]
slab_free_freelist_hook mm/slub.c:1494 [inline]
slab_free mm/slub.c:3080 [inline]
kmem_cache_free+0x10b/0x2c0 mm/slub.c:3096
sk_prot_free net/core/sock.c:1661 [inline]
__sk_destruct+0x460/0x5e0 net/core/sock.c:1749
sock_put include/net/sock.h:1789 [inline]
unix_release_sock+0x69c/0x9f0 net/unix/af_unix.c:561
unix_release+0x4a/0x80 net/unix/af_unix.c:873
__sock_release net/socket.c:591 [inline]
sock_close+0xc7/0x220 net/socket.c:1277
__fput+0x262/0x680 fs/file_table.c:281
task_work_run+0x140/0x170 kernel/task_work.c:113
exit_task_work include/linux/task_work.h:22 [inline]
do_exit+0xcaf/0x2bc0 kernel/exit.c:859
do_group_exit+0x138/0x300 kernel/exit.c:982
get_signal+0xdb1/0x1440 kernel/signal.c:2735
do_signal+0xb0/0x11f0 arch/x86/kernel/signal.c:809
exit_to_usermode_loop+0xc0/0x1a0 arch/x86/entry/common.c:159
prepare_exit_to_usermode+0x199/0x200 arch/x86/entry/common.c:194
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
The buggy address belongs to the object at ffff8881d53c6d00
which belongs to the cache UNIX of size 1152
The buggy address is located 72 bytes to the right of
1152-byte region [ffff8881d53c6d00, ffff8881d53c7180)
The buggy address belongs to the page:
page:ffffea000754f100 refcount:1 mapcount:0 mapping:ffff8881f56f0c80 index:0x0 compound_mapcount: 0
flags: 0x8000000000010200(slab|head)
raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f56f0c80
raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 2, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL)
set_page_owner include/linux/page_owner.h:31 [inline]
post_alloc_hook mm/page_alloc.c:2165 [inline]
prep_new_page+0x18f/0x370 mm/page_alloc.c:2171
get_page_from_freelist+0x2d13/0x2d90 mm/page_alloc.c:3794
__alloc_pages_nodemask+0x393/0x840 mm/page_alloc.c:4893
alloc_slab_page+0x39/0x3c0 mm/slub.c:343
allocate_slab mm/slub.c:1683 [inline]
new_slab+0x97/0x440 mm/slub.c:1749
new_slab_objects mm/slub.c:2505 [inline]
___slab_alloc+0x2fe/0x490 mm/slub.c:2667
__slab_alloc+0x62/0xa0 mm/slub.c:2707
slab_alloc_node mm/slub.c:2792 [inline]
slab_alloc mm/slub.c:2837 [inline]
kmem_cache_alloc+0x109/0x250 mm/slub.c:2842
sk_prot_alloc+0x63/0x3e0 net/core/sock.c:1616
sk_alloc+0x35/0x2f0 net/core/sock.c:1680
unix_create1+0x8e/0x590 net/unix/af_unix.c:802
unix_create+0x12c/0x1b0 net/unix/af_unix.c:863
__sock_create+0x3cb/0x7a0 net/socket.c:1427
sock_create net/socket.c:1478 [inline]
__sys_socketpair+0x308/0x6e0 net/socket.c:1582
__do_sys_socketpair net/socket.c:1631 [inline]
__se_sys_socketpair net/socket.c:1628 [inline]
__x64_sys_socketpair+0x97/0xb0 net/socket.c:1628
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
page last free stack trace:
reset_page_owner include/linux/page_owner.h:24 [inline]
free_pages_prepare mm/page_alloc.c:1176 [inline]
__free_pages_ok+0x847/0x950 mm/page_alloc.c:1438
free_the_page mm/page_alloc.c:4955 [inline]
__free_pages+0x91/0x140 mm/page_alloc.c:4961
bpf_check+0x8aaa/0xb340 kernel/bpf/verifier.c:9731
bpf_prog_load kernel/bpf/syscall.c:1724 [inline]
__do_sys_bpf kernel/bpf/syscall.c:2891 [inline]
__se_sys_bpf+0x8139/0xbcb0 kernel/bpf/syscall.c:2849
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
Memory state around the buggy address:
ffff8881d53c7080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff8881d53c7100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff8881d53c7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
^
ffff8881d53c7200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff8881d53c7280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 1e4f74067 P4D 1e4f74067 PUD 1e93de067 PMD 0
Oops: 0010 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 4277 Comm: syz-executor.4 Tainted: G B 5.4.274-syzkaller-00002-g6f97bd951d82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:0x0
Code: Bad RIP value.
RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010202
RAX: ffffffff8154d7aa RBX: 0000000000000101 RCX: ffff8881e52a0fc0
RDX: 0000000000000101 RSI: 0000000000000000 RDI: ffff8881d53c71c0
RBP: ffff8881f6e09ec8 R08: ffffffff8154d3ee R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffb698
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881d53c71c0
FS: 00007f16e8e936c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000001d1c58000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
call_timer_fn+0x36/0x390 kernel/time/timer.c:1448
expire_timers kernel/time/timer.c:1493 [inline]
__run_timers+0x879/0xbe0 kernel/time/timer.c:1817
run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830
__do_softirq+0x23b/0x6b7 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:373 [inline]
irq_exit+0x195/0x1c0 kernel/softirq.c:413
exiting_irq arch/x86/include/asm/apic.h:538 [inline]
smp_apic_timer_interrupt+0x11a/0x460 arch/x86/kernel/apic/apic.c:1149
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834
RIP: 0010:memset_erms+0xb/0x10 arch/x86/lib/memset_64.S:65
Code: 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 f3 aa <4c> 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01 01 01
RSP: 0018:ffff8881e676e958 EFLAGS: 00000256 ORIG_RAX: ffffffffffffff13
RAX: ffff8881e676ec00 RBX: ffff8881e676ec98 RCX: 0000000000000000
RDX: 0000000000000010 RSI: 0000000000000000 RDI: ffff8881e676ecc0
RBP: ffff8881e676ec50 R08: dffffc0000000000 R09: ffff8881e676ecb0
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffffffff0d07355
R13: ffffffff86839aa8 R14: ffff8881e676ec60 R15: dffffc0000000000
unwind_next_frame+0x1036/0x1ea0 arch/x86/kernel/unwind_orc.c:534
arch_stack_walk+0x111/0x140 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x118/0x1c0 kernel/stacktrace.c:123
save_stack mm/kasan/common.c:70 [inline]
set_track mm/kasan/common.c:78 [inline]
__kasan_kmalloc+0x171/0x210 mm/kasan/common.c:529
slab_post_alloc_hook mm/slab.h:584 [inline]
slab_alloc_node mm/slub.c:2829 [inline]
slab_alloc mm/slub.c:2837 [inline]
kmem_cache_alloc_trace+0xdc/0x260 mm/slub.c:2854
kmalloc include/linux/slab.h:556 [inline]
kzalloc include/linux/slab.h:690 [inline]
do_check+0x14d/0x9820 kernel/bpf/verifier.c:7798
bpf_check+0x2169/0xb340 kernel/bpf/verifier.c:9637
bpf_prog_load kernel/bpf/syscall.c:1724 [inline]
__do_sys_bpf kernel/bpf/syscall.c:2891 [inline]
__se_sys_bpf+0x8139/0xbcb0 kernel/bpf/syscall.c:2849
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
RIP: 0033:0x7f16e9b18ea9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f16e8e930c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f16e9c4ff80 RCX: 00007f16e9b18ea9
RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005
RBP: 00007f16e9b87ff4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f16e9c4ff80 R15: 00007fff1cb0c5b8
Modules linked in:
CR2: 0000000000000000
---[ end trace 81785e456652a5c2 ]---
RIP: 0010:0x0
Code: Bad RIP value.
RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010202
RAX: ffffffff8154d7aa RBX: 0000000000000101 RCX: ffff8881e52a0fc0
RDX: 0000000000000101 RSI: 0000000000000000 RDI: ffff8881d53c71c0
RBP: ffff8881f6e09ec8 R08: ffffffff8154d3ee R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffb698
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881d53c71c0
FS: 00007f16e8e936c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000001d1c58000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
----------------
Code disassembly (best guess):
0: 03 40 0f add 0xf(%rax),%eax
3: b6 f6 mov $0xf6,%dh
5: 48 b8 01 01 01 01 01 movabs $0x101010101010101,%rax
c: 01 01 01
f: 48 0f af c6 imul %rsi,%rax
13: f3 48 ab rep stos %rax,%es:(%rdi)
16: 89 d1 mov %edx,%ecx
18: f3 aa rep stos %al,%es:(%rdi)
1a: 4c 89 c8 mov %r9,%rax
1d: c3 ret
1e: 90 nop
1f: 49 89 f9 mov %rdi,%r9
22: 40 88 f0 mov %sil,%al
25: 48 89 d1 mov %rdx,%rcx
28: f3 aa rep stos %al,%es:(%rdi)
* 2a: 4c 89 c8 mov %r9,%rax <-- trapping instruction
2d: c3 ret
2e: 90 nop
2f: 49 89 fa mov %rdi,%r10
32: 40 0f b6 ce movzbl %sil,%ecx
36: 48 b8 01 01 01 01 01 movabs $0x101010101010101,%rax
3d: 01 01 01