Warning: Permanently added '10.128.0.93' (ED25519) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 63.364898][ T5062] ================================================================== [ 63.373020][ T5062] BUG: KASAN: slab-use-after-free in bpf_trace_run2+0x17b/0x530 [ 63.381091][ T5062] Read of size 8 at addr ffff88801e889e70 by task syz-executor415/5062 [ 63.389440][ T5062] [ 63.391790][ T5062] CPU: 0 PID: 5062 Comm: syz-executor415 Not tainted 6.8.0-syzkaller-05243-g14bb1e8c8d4a #0 [ 63.403351][ T5062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 63.413680][ T5062] Call Trace: [ 63.416983][ T5062] [ 63.419926][ T5062] dump_stack_lvl+0x1e7/0x2e0 [ 63.424727][ T5062] ? __pfx_dump_stack_lvl+0x10/0x10 [ 63.430117][ T5062] ? __pfx__printk+0x10/0x10 [ 63.435079][ T5062] ? _printk+0xd5/0x120 [ 63.439952][ T5062] ? __virt_addr_valid+0x183/0x520 [ 63.445261][ T5062] ? __virt_addr_valid+0x183/0x520 [ 63.450389][ T5062] print_report+0x169/0x550 [ 63.454898][ T5062] ? __virt_addr_valid+0x183/0x520 [ 63.460355][ T5062] ? __virt_addr_valid+0x183/0x520 [ 63.465524][ T5062] ? __virt_addr_valid+0x44e/0x520 [ 63.470871][ T5062] ? __phys_addr+0xba/0x170 [ 63.475496][ T5062] ? bpf_trace_run2+0x17b/0x530 [ 63.480474][ T5062] kasan_report+0x143/0x180 [ 63.485021][ T5062] ? bpf_trace_run2+0x17b/0x530 [ 63.490401][ T5062] bpf_trace_run2+0x17b/0x530 [ 63.495165][ T5062] ? __pfx_bpf_trace_run2+0x10/0x10 [ 63.500531][ T5062] ? tomoyo_realpath_from_path+0xc2/0x5e0 [ 63.507143][ T5062] ? tomoyo_realpath_from_path+0xc2/0x5e0 [ 63.513456][ T5062] kfree+0x291/0x380 [ 63.517524][ T5062] tomoyo_realpath_from_path+0xc2/0x5e0 [ 63.523097][ T5062] tomoyo_path_number_perm+0x23a/0x880 [ 63.528919][ T5062] ? do_raw_spin_unlock+0x13c/0x8b0 [ 63.534337][ T5062] ? tomoyo_path_number_perm+0x208/0x880 [ 63.540320][ T5062] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 63.546671][ T5062] ? ext4_fname_free_filename+0x89/0xb0 [ 63.552669][ T5062] ? kfree+0x4e/0x380 [ 63.556793][ T5062] ? d_alloc+0x142/0x190 [ 63.561340][ T5062] ? _raw_spin_unlock+0x28/0x50 [ 63.566218][ T5062] ? d_alloc+0x142/0x190 [ 63.570999][ T5062] ? current_check_access_path+0x181/0x4c0 [ 63.577259][ T5062] tomoyo_path_mkdir+0xe7/0x130 [ 63.582456][ T5062] ? __pfx_current_check_access_path+0x10/0x10 [ 63.588884][ T5062] ? __pfx_tomoyo_path_mkdir+0x10/0x10 [ 63.594469][ T5062] ? __pfx_filename_create+0x10/0x10 [ 63.600344][ T5062] ? __pfx_lock_release+0x10/0x10 [ 63.605403][ T5062] security_path_mkdir+0xe8/0x140 [ 63.610482][ T5062] do_mkdirat+0x1c4/0x3a0 [ 63.614959][ T5062] ? __pfx_do_mkdirat+0x10/0x10 [ 63.620767][ T5062] ? getname_flags+0x1fe/0x4f0 [ 63.626550][ T5062] __x64_sys_mkdir+0x6e/0x80 [ 63.631278][ T5062] do_syscall_64+0xfb/0x240 [ 63.636841][ T5062] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 63.643042][ T5062] RIP: 0033:0x7f42b933e517 [ 63.647838][ T5062] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 63.668162][ T5062] RSP: 002b:00007ffe28d0c728 EFLAGS: 00000206 ORIG_RAX: 0000000000000053 [ 63.677018][ T5062] RAX: ffffffffffffffda RBX: 000000000000f742 RCX: 00007f42b933e517 [ 63.685161][ T5062] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00007ffe28d0c760 [ 63.693214][ T5062] RBP: 0000000000001472 R08: 0000000000000004 R09: 00007ffe28d0c4c6 [ 63.701210][ T5062] R10: 0000000000000000 R11: 0000000000000206 R12: 00007ffe28d0c74c [ 63.709326][ T5062] R13: 00007ffe28d0c780 R14: 00007ffe28d0c760 R15: 0000000000000020 [ 63.718137][ T5062] [ 63.722233][ T5062] [ 63.724765][ T5062] Allocated by task 5232: [ 63.729154][ T5062] kasan_save_track+0x3f/0x80 [ 63.734112][ T5062] __kasan_kmalloc+0x98/0xb0 [ 63.738789][ T5062] kmalloc_trace+0x1d9/0x360 [ 63.743400][ T5062] bpf_raw_tp_link_attach+0x2a0/0x6e0 [ 63.749051][ T5062] bpf_raw_tracepoint_open+0x1c2/0x240 [ 63.754799][ T5062] __sys_bpf+0x3c0/0x810 [ 63.759248][ T5062] __x64_sys_bpf+0x7c/0x90 [ 63.763894][ T5062] do_syscall_64+0xfb/0x240 [ 63.768513][ T5062] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 63.774591][ T5062] [ 63.776991][ T5062] Freed by task 5232: [ 63.781060][ T5062] kasan_save_track+0x3f/0x80 [ 63.786078][ T5062] kasan_save_free_info+0x40/0x50 [ 63.791096][ T5062] poison_slab_object+0xa6/0xe0 [ 63.796056][ T5062] __kasan_slab_free+0x37/0x60 [ 63.801217][ T5062] kfree+0x14a/0x380 [ 63.805507][ T5062] bpf_link_release+0x3b/0x50 [ 63.810389][ T5062] __fput+0x429/0x8a0 [ 63.815011][ T5062] task_work_run+0x24f/0x310 [ 63.819973][ T5062] do_exit+0xa1b/0x27e0 [ 63.824609][ T5062] do_group_exit+0x207/0x2c0 [ 63.829405][ T5062] __x64_sys_exit_group+0x3f/0x40 [ 63.834550][ T5062] do_syscall_64+0xfb/0x240 [ 63.839247][ T5062] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 63.845259][ T5062] [ 63.847759][ T5062] The buggy address belongs to the object at ffff88801e889e00 [ 63.847759][ T5062] which belongs to the cache kmalloc-128 of size 128 [ 63.863917][ T5062] The buggy address is located 112 bytes inside of [ 63.863917][ T5062] freed 128-byte region [ffff88801e889e00, ffff88801e889e80) [ 63.878497][ T5062] [ 63.880907][ T5062] The buggy address belongs to the physical page: [ 63.887523][ T5062] page:ffffea00007a2240 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1e889 [ 63.897880][ T5062] flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff) [ 63.911177][ T5062] page_type: 0xffffffff() [ 63.915511][ T5062] raw: 00fff00000000800 ffff888014c418c0 dead000000000122 0000000000000000 [ 63.925254][ T5062] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 63.934737][ T5062] page dumped because: kasan: bad access detected [ 63.941182][ T5062] page_owner tracks the page as allocated [ 63.946983][ T5062] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 5228, tgid 5228 (syz-executor415), ts 63272044847, free_ts 63271865540 [ 63.965941][ T5062] post_alloc_hook+0x1ea/0x210 [ 63.970973][ T5062] get_page_from_freelist+0x33ea/0x3580 [ 63.976602][ T5062] __alloc_pages+0x256/0x680 [ 63.981810][ T5062] alloc_slab_page+0x5f/0x160 [ 63.986748][ T5062] new_slab+0x84/0x2f0 [ 63.990803][ T5062] ___slab_alloc+0xd1b/0x13e0 [ 63.995664][ T5062] __kmalloc_node_track_caller+0x2d4/0x4e0 [ 64.001934][ T5062] krealloc+0x7d/0x120 [ 64.006145][ T5062] check_stack_access_within_bounds+0x5b0/0x940 [ 64.012503][ T5062] check_mem_access+0x865/0x1e60 [ 64.017815][ T5062] do_check+0x87dd/0x10500 [ 64.022754][ T5062] do_check_common+0x14bd/0x1dd0 [ 64.028751][ T5062] bpf_check+0x136ab/0x190c0 [ 64.033426][ T5062] bpf_prog_load+0x1667/0x20f0 [ 64.038385][ T5062] __sys_bpf+0x4ee/0x810 [ 64.043117][ T5062] __x64_sys_bpf+0x7c/0x90 [ 64.047763][ T5062] page last free pid 5228 tgid 5228 stack trace: [ 64.054118][ T5062] free_unref_page_prepare+0x968/0xa90 [ 64.059721][ T5062] free_unref_page+0x37/0x3f0 [ 64.064654][ T5062] vfree+0x186/0x2e0 [ 64.068857][ T5062] bpf_prog_calc_tag+0x663/0x900 [ 64.073968][ T5062] resolve_pseudo_ldimm64+0xe2/0x1650 [ 64.079722][ T5062] bpf_check+0x6175/0x190c0 [ 64.084323][ T5062] bpf_prog_load+0x1667/0x20f0 [ 64.089865][ T5062] __sys_bpf+0x4ee/0x810 [ 64.094406][ T5062] __x64_sys_bpf+0x7c/0x90 [ 64.099480][ T5062] do_syscall_64+0xfb/0x240 [ 64.104058][ T5062] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 64.110394][ T5062] [ 64.113006][ T5062] Memory state around the buggy address: [ 64.118670][ T5062] ffff88801e889d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.126952][ T5062] ffff88801e889d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.135214][ T5062] >ffff88801e889e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.143815][ T5062] ^ [ 64.151788][ T5062] ffff88801e889e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.159880][ T5062] ffff88801e889f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.168830][ T5062] ================================================================== [ 64.177484][ T5062] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 64.185100][ T5062] CPU: 0 PID: 5062 Comm: syz-executor415 Not tainted 6.8.0-syzkaller-05243-g14bb1e8c8d4a #0 [ 64.195620][ T5062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 64.207232][ T5062] Call Trace: [ 64.210541][ T5062] [ 64.213482][ T5062] dump_stack_lvl+0x1e7/0x2e0 [ 64.218870][ T5062] ? __pfx_dump_stack_lvl+0x10/0x10 [ 64.224154][ T5062] ? __pfx__printk+0x10/0x10 [ 64.229286][ T5062] ? lock_release+0xbf/0x9d0 [ 64.234314][ T5062] ? vscnprintf+0x5d/0x90 [ 64.238733][ T5062] panic+0x349/0x860 [ 64.242625][ T5062] ? check_panic_on_warn+0x21/0xb0 [ 64.247833][ T5062] ? __pfx_panic+0x10/0x10 [ 64.252335][ T5062] ? mark_lock+0x9a/0x350 [ 64.256663][ T5062] ? _raw_spin_unlock_irqrestore+0xd8/0x140 [ 64.262647][ T5062] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 64.268828][ T5062] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 64.275241][ T5062] ? print_report+0x502/0x550 [ 64.279922][ T5062] check_panic_on_warn+0x86/0xb0 [ 64.284886][ T5062] ? bpf_trace_run2+0x17b/0x530 [ 64.289786][ T5062] end_report+0x6e/0x140 [ 64.294072][ T5062] kasan_report+0x154/0x180 [ 64.298676][ T5062] ? bpf_trace_run2+0x17b/0x530 [ 64.303819][ T5062] bpf_trace_run2+0x17b/0x530 [ 64.308547][ T5062] ? __pfx_bpf_trace_run2+0x10/0x10 [ 64.314028][ T5062] ? tomoyo_realpath_from_path+0xc2/0x5e0 [ 64.320986][ T5062] ? tomoyo_realpath_from_path+0xc2/0x5e0 [ 64.327077][ T5062] kfree+0x291/0x380 [ 64.331490][ T5062] tomoyo_realpath_from_path+0xc2/0x5e0 [ 64.337422][ T5062] tomoyo_path_number_perm+0x23a/0x880 [ 64.342911][ T5062] ? do_raw_spin_unlock+0x13c/0x8b0 [ 64.348144][ T5062] ? tomoyo_path_number_perm+0x208/0x880 [ 64.354223][ T5062] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 64.361161][ T5062] ? ext4_fname_free_filename+0x89/0xb0 [ 64.367013][ T5062] ? kfree+0x4e/0x380 [ 64.371041][ T5062] ? d_alloc+0x142/0x190 [ 64.375690][ T5062] ? _raw_spin_unlock+0x28/0x50 [ 64.382033][ T5062] ? d_alloc+0x142/0x190 [ 64.386464][ T5062] ? current_check_access_path+0x181/0x4c0 [ 64.392366][ T5062] tomoyo_path_mkdir+0xe7/0x130 [ 64.397803][ T5062] ? __pfx_current_check_access_path+0x10/0x10 [ 64.404604][ T5062] ? __pfx_tomoyo_path_mkdir+0x10/0x10 [ 64.411291][ T5062] ? __pfx_filename_create+0x10/0x10 [ 64.417944][ T5062] ? __pfx_lock_release+0x10/0x10 [ 64.423161][ T5062] security_path_mkdir+0xe8/0x140 [ 64.428704][ T5062] do_mkdirat+0x1c4/0x3a0 [ 64.433500][ T5062] ? __pfx_do_mkdirat+0x10/0x10 [ 64.438921][ T5062] ? getname_flags+0x1fe/0x4f0 [ 64.443780][ T5062] __x64_sys_mkdir+0x6e/0x80 [ 64.449515][ T5062] do_syscall_64+0xfb/0x240 [ 64.454417][ T5062] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 64.460435][ T5062] RIP: 0033:0x7f42b933e517 [ 64.464851][ T5062] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 64.486079][ T5062] RSP: 002b:00007ffe28d0c728 EFLAGS: 00000206 ORIG_RAX: 0000000000000053 [ 64.495111][ T5062] RAX: ffffffffffffffda RBX: 000000000000f742 RCX: 00007f42b933e517 [ 64.503788][ T5062] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00007ffe28d0c760 [ 64.512021][ T5062] RBP: 0000000000001472 R08: 0000000000000004 R09: 00007ffe28d0c4c6 [ 64.520256][ T5062] R10: 0000000000000000 R11: 0000000000000206 R12: 00007ffe28d0c74c [ 64.528235][ T5062] R13: 00007ffe28d0c780 R14: 00007ffe28d0c760 R15: 0000000000000020 [ 64.536666][ T5062] [ 64.540130][ T5062] Kernel Offset: disabled [ 64.544766][ T5062] Rebooting in 86400 seconds..