================================================================== BUG: KASAN: stack-out-of-bounds in __get_unaligned_cpu32 include/linux/unaligned/packed_struct.h:19 [inline] BUG: KASAN: stack-out-of-bounds in jhash include/linux/jhash.h:82 [inline] BUG: KASAN: stack-out-of-bounds in hash+0x3cc/0xab0 kernel/bpf/bloom_filter.c:39 Read of size 4 at addr ffffc90001576bc0 by task kworker/u4:4/56 CPU: 1 PID: 56 Comm: kworker/u4:4 Not tainted 6.1.83-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Workqueue: writeback wb_workfn (flush-8:0) Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106 print_address_description mm/kasan/report.c:284 [inline] print_report+0x15f/0x4f0 mm/kasan/report.c:395 kasan_report+0x136/0x160 mm/kasan/report.c:495 __get_unaligned_cpu32 include/linux/unaligned/packed_struct.h:19 [inline] jhash include/linux/jhash.h:82 [inline] hash+0x3cc/0xab0 kernel/bpf/bloom_filter.c:39 bloom_map_peek_elem+0xb1/0x1b0 kernel/bpf/bloom_filter.c:51 bpf_prog_00798911c748094f+0x3a/0x3e bpf_dispatcher_nop_func include/linux/bpf.h:989 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2273 [inline] bpf_trace_run8+0x2e5/0x4e0 kernel/trace/bpf_trace.c:2318 __bpf_trace_jbd2_handle_stats+0x43/0x60 include/trace/events/jbd2.h:210 __traceiter_jbd2_handle_stats+0x9c/0xf0 include/trace/events/jbd2.h:210 trace_jbd2_handle_stats include/trace/events/jbd2.h:210 [inline] jbd2_journal_stop+0xd5a/0xdf0 fs/jbd2/transaction.c:1859 __ext4_journal_stop+0xf8/0x190 fs/ext4/ext4_jbd2.c:127 ext4_writepages+0x2cb8/0x3de0 fs/ext4/inode.c:2856 do_writepages+0x3a2/0x670 mm/page-writeback.c:2469 __writeback_single_inode+0x15d/0x11e0 fs/fs-writeback.c:1612 writeback_sb_inodes+0xc2b/0x1b20 fs/fs-writeback.c:1903 __writeback_inodes_wb+0x114/0x400 fs/fs-writeback.c:1974 wb_writeback+0x4b1/0xe10 fs/fs-writeback.c:2079 wb_check_old_data_flush fs/fs-writeback.c:2179 [inline] wb_do_writeback fs/fs-writeback.c:2232 [inline] wb_workfn+0xbec/0x1020 fs/fs-writeback.c:2260 process_one_work+0x8a9/0x11d0 kernel/workqueue.c:2292 worker_thread+0xa47/0x1200 kernel/workqueue.c:2439 kthread+0x28d/0x320 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:307 The buggy address belongs to stack of task kworker/u4:4/56 and is located at offset 0 in frame: bpf_trace_run8+0x0/0x4e0 This frame has 1 object: [32, 96) 'args' The buggy address belongs to the virtual mapping at [ffffc90001570000, ffffc90001579000) created by: copy_process+0x637/0x4060 kernel/fork.c:2098 The buggy address belongs to the physical page: page:ffffea000052b9c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14ae7 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 0000000000000000 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2dc2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), pid 2, tgid 2 (kthreadd), ts 4969016518, free_ts 0 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x18d/0x1b0 mm/page_alloc.c:2513 prep_new_page mm/page_alloc.c:2520 [inline] get_page_from_freelist+0x31a1/0x3320 mm/page_alloc.c:4279 __alloc_pages+0x28d/0x770 mm/page_alloc.c:5545 vm_area_alloc_pages mm/vmalloc.c:2983 [inline] __vmalloc_area_node mm/vmalloc.c:3051 [inline] __vmalloc_node_range+0x96c/0x1460 mm/vmalloc.c:3223 alloc_thread_stack_node kernel/fork.c:311 [inline] dup_task_struct+0x3e5/0x6d0 kernel/fork.c:988 copy_process+0x637/0x4060 kernel/fork.c:2098 kernel_clone+0x222/0x920 kernel/fork.c:2682 kernel_thread+0x152/0x1d0 kernel/fork.c:2742 create_kthread kernel/kthread.c:399 [inline] kthreadd+0x596/0x760 kernel/kthread.c:746 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:307 page_owner free stack trace missing Memory state around the buggy address: ffffc90001576a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc90001576b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc90001576b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 ^ ffffc90001576c00: 00 00 00 00 f3 f3 f3 f3 00 00 00 00 00 00 00 00 ffffc90001576c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================