================================================================== BUG: KASAN: slab-out-of-bounds in copy_array+0x8a/0xe8 kernel/bpf/verifier.c:1072 Write of size 88 at addr ff6000000f9b9b00 by task syz-executor.0/5458 CPU: 1 PID: 5458 Comm: syz-executor.0 Tainted: G W 6.2.0-rc1-syzkaller #0 Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:121 [] show_stack+0x34/0x40 arch/riscv/kernel/stacktrace.c:127 [] __dump_stack lib/dump_stack.c:88 [inline] [] dump_stack_lvl+0xe0/0x14c lib/dump_stack.c:106 [] print_address_description mm/kasan/report.c:306 [inline] [] print_report+0x1e4/0x4c0 mm/kasan/report.c:417 [] kasan_report+0xb8/0xe6 mm/kasan/report.c:517 [] check_region_inline mm/kasan/generic.c:173 [inline] [] kasan_check_range+0x32/0x148 mm/kasan/generic.c:189 [] memcpy+0x32/0x64 mm/kasan/shadow.c:66 [] copy_array+0x8a/0xe8 kernel/bpf/verifier.c:1072 [] copy_verifier_state+0x6c/0x462 kernel/bpf/verifier.c:1250 [] pop_stack kernel/bpf/verifier.c:1314 [inline] [] do_check kernel/bpf/verifier.c:14031 [inline] [] do_check_common+0x397a/0x6608 kernel/bpf/verifier.c:16289 [] do_check_main kernel/bpf/verifier.c:16352 [inline] [] bpf_check+0x45b2/0x5a5a kernel/bpf/verifier.c:16936 [] bpf_prog_load+0xc90/0x12b0 kernel/bpf/syscall.c:2619 [] __sys_bpf+0x622/0x31d2 kernel/bpf/syscall.c:4979 [] __do_sys_bpf kernel/bpf/syscall.c:5083 [inline] [] sys_bpf+0x28/0x36 kernel/bpf/syscall.c:5081 [] ret_from_syscall+0x0/0x2 Allocated by task 5458: stack_trace_save+0xa6/0xd8 kernel/stacktrace.c:122 kasan_save_stack+0x2c/0x5a mm/kasan/common.c:45 kasan_set_track+0x1a/0x26 mm/kasan/common.c:52 kasan_save_alloc_info+0x1a/0x24 mm/kasan/generic.c:507 ____kasan_kmalloc mm/kasan/common.c:371 [inline] ____kasan_kmalloc mm/kasan/common.c:330 [inline] __kasan_krealloc+0xfa/0x11a mm/kasan/common.c:439 kasan_krealloc include/linux/kasan.h:231 [inline] __do_krealloc mm/slab_common.c:1361 [inline] krealloc+0x82/0xae mm/slab_common.c:1398 push_jmp_history+0xd2/0x140 kernel/bpf/verifier.c:2592 is_state_visited kernel/bpf/verifier.c:13552 [inline] do_check kernel/bpf/verifier.c:13752 [inline] do_check_common+0x47be/0x6608 kernel/bpf/verifier.c:16289 do_check_main kernel/bpf/verifier.c:16352 [inline] bpf_check+0x45b2/0x5a5a kernel/bpf/verifier.c:16936 bpf_prog_load+0xc90/0x12b0 kernel/bpf/syscall.c:2619 __sys_bpf+0x622/0x31d2 kernel/bpf/syscall.c:4979 __do_sys_bpf kernel/bpf/syscall.c:5083 [inline] sys_bpf+0x28/0x36 kernel/bpf/syscall.c:5081 ret_from_syscall+0x0/0x2 The buggy address belongs to the object at ff6000000f9b9b00 which belongs to the cache kmalloc-128 of size 128 The buggy address is located 0 bytes inside of 128-byte region [ff6000000f9b9b00, ff6000000f9b9b80) The buggy address belongs to the physical page: page:ff1c0000023eee40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8fbb9 flags: 0xffe000000000200(slab|node=0|zone=0|lastcpupid=0x7ff) raw: 0ffe000000000200 ff600000082018c0 0000000000000122 0000000000000000 raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 2931, tgid 2931 (syz-executor.1), ts 2877473360800, free_ts 2877452519100 __set_page_owner+0x32/0x182 mm/page_owner.c:190 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0xf8/0x11a mm/page_alloc.c:2524 prep_new_page mm/page_alloc.c:2531 [inline] get_page_from_freelist+0xc0e/0x1118 mm/page_alloc.c:4283 __alloc_pages+0x1b0/0x165a mm/page_alloc.c:5549 __alloc_pages_node include/linux/gfp.h:237 [inline] alloc_slab_page mm/slub.c:1853 [inline] allocate_slab mm/slub.c:1998 [inline] new_slab+0xb8/0x382 mm/slub.c:2051 ___slab_alloc+0x57e/0xaa6 mm/slub.c:3193 __slab_alloc.constprop.0+0x5a/0x98 mm/slub.c:3292 __slab_alloc_node mm/slub.c:3345 [inline] slab_alloc_node mm/slub.c:3442 [inline] __kmem_cache_alloc_node+0xf2/0x2e4 mm/slub.c:3491 __do_kmalloc_node mm/slab_common.c:967 [inline] __kmalloc_node+0x38/0xe6 mm/slab_common.c:975 kmalloc_array_node include/linux/slab.h:697 [inline] kcalloc_node include/linux/slab.h:702 [inline] memcg_alloc_slab_cgroups+0x4e/0xb8 mm/memcontrol.c:2892 memcg_slab_post_alloc_hook+0xb2/0x398 mm/slab.h:538 slab_post_alloc_hook mm/slab.h:769 [inline] slab_alloc_node mm/slub.c:3452 [inline] slab_alloc mm/slub.c:3460 [inline] __kmem_cache_alloc_lru mm/slub.c:3467 [inline] kmem_cache_alloc+0x162/0x2c6 mm/slub.c:3476 prepare_creds+0x44/0x5ae kernel/cred.c:260 copy_creds+0x68/0x9b2 kernel/cred.c:365 copy_process+0x900/0x4068 kernel/fork.c:2126 kernel_clone+0xee/0x914 kernel/fork.c:2681 page last free stack trace: __reset_page_owner+0x4a/0xf8 mm/page_owner.c:148 reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1446 [inline] free_pcp_prepare+0x254/0x48e mm/page_alloc.c:1496 free_unref_page_prepare mm/page_alloc.c:3369 [inline] free_unref_page+0x60/0x2ae mm/page_alloc.c:3464 free_the_page mm/page_alloc.c:750 [inline] __free_pages+0xd6/0x106 mm/page_alloc.c:5635 __vunmap+0x85a/0xa34 mm/vmalloc.c:2727 __vfree+0x70/0x104 mm/vmalloc.c:2775 vfree+0x9a/0xdc mm/vmalloc.c:2806 __do_replace+0x15c/0x59a net/ipv4/netfilter/ip_tables.c:1100 do_replace.constprop.0+0x29c/0x342 net/ipv4/netfilter/ip_tables.c:1140 do_ip6t_set_ctl+0x2ec/0x562 net/ipv6/netfilter/ip6_tables.c:1639 nf_setsockopt+0x6c/0xac net/netfilter/nf_sockopt.c:101 ipv6_setsockopt+0x14a/0x154 net/ipv6/ipv6_sockglue.c:1028 tcp_setsockopt+0x76/0xb4 net/ipv4/tcp.c:3801 sock_common_setsockopt+0x6a/0x7c net/core/sock.c:3664 __sys_setsockopt+0x25e/0x418 net/socket.c:2246 __do_sys_setsockopt net/socket.c:2257 [inline] sys_setsockopt+0x3a/0x4c net/socket.c:2254 Memory state around the buggy address: ff6000000f9b9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ff6000000f9b9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ff6000000f9b9b00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc ^ ff6000000f9b9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ff6000000f9b9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ==================================================================