================================================================== BUG: KASAN: stack-out-of-bounds in nft_ct_get_eval+0x100d/0x15c0 net/netfilter/nft_ct.c:-1 Write of size 16 at addr ffffc90000a0868c by task syz.5.5707/28826 CPU: 1 UID: 0 PID: 28826 Comm: syz.5.5707 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xca/0x240 mm/kasan/report.c:482 kasan_report+0x118/0x150 mm/kasan/report.c:595 check_region_inline mm/kasan/generic.c:-1 [inline] kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:200 __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106 nft_ct_get_eval+0x100d/0x15c0 net/netfilter/nft_ct.c:-1 expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline] nft_do_chain+0x40c/0x1920 net/netfilter/nf_tables_core.c:285 nft_do_chain_ipv4+0x154/0x210 net/netfilter/nft_chain_filter.c:23 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_slow+0xc5/0x220 net/netfilter/core.c:623 nf_hook include/linux/netfilter.h:273 [inline] NF_HOOK+0x206/0x3a0 include/linux/netfilter.h:316 __netif_receive_skb_one_core net/core/dev.c:6079 [inline] __netif_receive_skb+0x143/0x380 net/core/dev.c:6192 process_backlog+0x60e/0x14f0 net/core/dev.c:6544 __napi_poll+0xc7/0x360 net/core/dev.c:7594 napi_poll net/core/dev.c:7657 [inline] net_rx_action+0x5f7/0xdf0 net/core/dev.c:7784 handle_softirqs+0x286/0x870 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:sk_peek_offset_bwd include/net/sock.h:725 [inline] RIP: 0010:sk_peek_offset_fwd include/net/sock.h:733 [inline] RIP: 0010:__unix_dgram_recvmsg+0x8b4/0xd60 net/unix/af_unix.c:2673 Code: df 48 8b 4c 24 48 0f b6 04 01 84 c0 4c 8b 7c 24 28 48 8b 54 24 18 0f 85 db 03 00 00 8b 1a bf ff ff ff ff 89 de e8 0c 9c cf f7 <85> db 0f 89 1a 02 00 00 e8 bf 97 cf f7 49 8d 5c 24 38 48 89 d8 48 RSP: 0018:ffffc900048776a0 EFLAGS: 00000297 RAX: ffffffff89f06c04 RBX: 00000000ffffffff RCX: 0000000000000002 RDX: ffff888030191e40 RSI: 00000000ffffffff RDI: 00000000ffffffff RBP: ffffc90004877830 R08: ffffc9000487775f R09: 0000000000000000 R10: ffffc90004877740 R11: fffff5200090eeec R12: ffff8880925c4140 R13: 0000000080000002 R14: ffff8880925c4174 R15: 1ffff9200090eee4 sock_recvmsg_nosec+0x186/0x1c0 net/socket.c:1078 ____sys_recvmsg+0x3aa/0x460 net/socket.c:2848 ___sys_recvmsg+0x1b5/0x510 net/socket.c:2892 do_recvmmsg+0x36a/0x770 net/socket.c:2979 __sys_recvmmsg+0x19d/0x280 net/socket.c:3061 __do_compat_sys_recvmmsg_time32 net/compat.c:418 [inline] __se_compat_sys_recvmmsg_time32 net/compat.c:414 [inline] __ia32_compat_sys_recvmmsg_time32+0xbf/0xe0 net/compat.c:414 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0xb6/0x2b0 arch/x86/entry/syscall_32.c:306 do_fast_syscall_32+0x34/0x80 arch/x86/entry/syscall_32.c:331 entry_SYSENTER_compat_after_hwframe+0x84/0x8e RIP: 0023:0xf7f32539 Code: 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 002b:00000000f540555c EFLAGS: 00000206 ORIG_RAX: 0000000000000151 RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000800000c0 RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 The buggy address belongs to a 0-page vmalloc region starting at 0xffffc90000a01000 allocated at map_irq_stack arch/x86/kernel/irq_64.c:49 [inline] The buggy address belongs to a 0-page vmalloc region starting at 0xffffc90000a01000 allocated at irq_init_percpu_irqstack+0x342/0x4a0 arch/x86/kernel/irq_64.c:76 The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb8908 flags: 0xfff00000002000(reserved|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000002000 ffffea0002e24208 ffffea0002e24208 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?) Memory state around the buggy address: ffffc90000a08580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc90000a08600: 00 00 00 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00 >ffffc90000a08680: 00 00 f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 ^ ffffc90000a08700: 00 00 00 00 00 00 f2 f2 f2 f2 00 00 f3 f3 f3 f3 ffffc90000a08780: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 ================================================================== ---------------- Code disassembly (best guess): 0: df 48 8b fisttps -0x75(%rax) 3: 4c 24 48 rex.WR and $0x48,%al 6: 0f b6 04 01 movzbl (%rcx,%rax,1),%eax a: 84 c0 test %al,%al c: 4c 8b 7c 24 28 mov 0x28(%rsp),%r15 11: 48 8b 54 24 18 mov 0x18(%rsp),%rdx 16: 0f 85 db 03 00 00 jne 0x3f7 1c: 8b 1a mov (%rdx),%ebx 1e: bf ff ff ff ff mov $0xffffffff,%edi 23: 89 de mov %ebx,%esi 25: e8 0c 9c cf f7 call 0xf7cf9c36 * 2a: 85 db test %ebx,%ebx <-- trapping instruction 2c: 0f 89 1a 02 00 00 jns 0x24c 32: e8 bf 97 cf f7 call 0xf7cf97f6 37: 49 8d 5c 24 38 lea 0x38(%r12),%rbx 3c: 48 89 d8 mov %rbx,%rax 3f: 48 rex.W