==================================================================
BUG: KASAN: slab-use-after-free in __bpf_trace_run kernel/trace/bpf_trace.c:2376 [inline]
BUG: KASAN: slab-use-after-free in bpf_trace_run1+0xcb/0x510 kernel/trace/bpf_trace.c:2430
Read of size 8 at addr ffff8880327c7718 by task syz-executor.3/18856
CPU: 0 PID: 18856 Comm: syz-executor.3 Not tainted 6.8.0-syzkaller-05235-g4c2a26fc80bc #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:377 [inline]
print_report+0x169/0x550 mm/kasan/report.c:488
kasan_report+0x143/0x180 mm/kasan/report.c:601
__bpf_trace_run kernel/trace/bpf_trace.c:2376 [inline]
bpf_trace_run1+0xcb/0x510 kernel/trace/bpf_trace.c:2430
__traceiter_rcu_utilization+0x74/0xb0 include/trace/events/rcu.h:27
trace_rcu_utilization+0x194/0x1c0 include/trace/events/rcu.h:27
rcu_core+0x11f1/0x1830 kernel/rcu/tree.c:2479
__do_softirq+0x2bc/0x943 kernel/softirq.c:554
invoke_softirq kernel/softirq.c:428 [inline]
__irq_exit_rcu+0xf2/0x1c0 kernel/softirq.c:633
irq_exit_rcu+0x9/0x30 kernel/softirq.c:645
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:lock_release+0x71/0x9d0 kernel/locking/lockdep.c:5762
Code: 41 48 c7 44 24 68 8b 83 8b 8d 48 c7 44 24 70 b0 bf 71 81 4c 8d 64 24 60 49 c1 ec 03 48 b8 f1 f1 f1 f1 04 f2 00 f2 4b 89 04 3c <48> b8 f2 f2 00 f3 f3 f3 f3 f3 4b 89 44 3c 08 0f 1f 44 00 00 65 8b
RSP: 0018:ffffc90010b97180 EFLAGS: 00000a06
RAX: f200f204f1f1f1f1 RBX: 0000000000000001 RCX: ffff888021db8000
RDX: 0000000000000000 RSI: ffffffff820419e6 RDI: ffffffff8e1318a0
RBP: ffffc90010b972a8 R08: ffffffff82041ba8 R09: 1ffffffff2598ea0
R10: dffffc0000000000 R11: fffffbfff2598ea1 R12: 1ffff92002172e3c
R13: ffffffff820419e6 R14: ffffffff820419e6 R15: dffffc0000000000
rcu_lock_release include/linux/rcupdate.h:308 [inline]
rcu_read_unlock_sched include/linux/rcupdate.h:863 [inline]
pfn_valid+0x3e0/0x440 include/linux/mmzone.h:2026
page_table_check_set+0x25/0x700 mm/page_table_check.c:105
__page_table_check_ptes_set+0x220/0x280 mm/page_table_check.c:196
page_table_check_ptes_set include/linux/page_table_check.h:74 [inline]
set_ptes include/linux/pgtable.h:241 [inline]
copy_present_pte mm/memory.c:993 [inline]
copy_pte_range mm/memory.c:1102 [inline]
copy_pmd_range mm/memory.c:1187 [inline]
copy_pud_range mm/memory.c:1224 [inline]
copy_p4d_range mm/memory.c:1248 [inline]
copy_page_range+0x2c7f/0x4240 mm/memory.c:1346
dup_mmap kernel/fork.c:747 [inline]
dup_mm kernel/fork.c:1687 [inline]
copy_mm+0x12f5/0x21b0 kernel/fork.c:1736
copy_process+0x187a/0x3df0 kernel/fork.c:2389
kernel_clone+0x21e/0x8d0 kernel/fork.c:2796
__do_sys_clone kernel/fork.c:2939 [inline]
__se_sys_clone kernel/fork.c:2923 [inline]
__x64_sys_clone+0x258/0x2a0 kernel/fork.c:2923
do_syscall_64+0xfb/0x240
entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f686247add3
Code: 1f 84 00 00 00 00 00 64 48 8b 04 25 10 00 00 00 45 31 c0 31 d2 31 f6 bf 11 00 20 01 4c 8d 90 d0 02 00 00 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 89 c2 85 c0 75 2c 64 48 8b 04 25 10 00 00
RSP: 002b:00007fff50178ca8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f686247add3
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
R10: 000055557e26f750 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001
Allocated by task 20384:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
__kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
kasan_kmalloc include/linux/kasan.h:211 [inline]
kmalloc_trace+0x1d9/0x360 mm/slub.c:4012
kmalloc include/linux/slab.h:590 [inline]
kzalloc include/linux/slab.h:711 [inline]
bpf_raw_tp_link_attach+0x2a0/0x6e0 kernel/bpf/syscall.c:3816
bpf_raw_tracepoint_open+0x1c2/0x240 kernel/bpf/syscall.c:3863
__sys_bpf+0x3c0/0x810 kernel/bpf/syscall.c:5673
__do_sys_bpf kernel/bpf/syscall.c:5738 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5736 [inline]
__x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5736
do_syscall_64+0xfb/0x240
entry_SYSCALL_64_after_hwframe+0x6d/0x75
Freed by task 20410:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:589
poison_slab_object+0xa6/0xe0 mm/kasan/common.c:240
__kasan_slab_free+0x37/0x60 mm/kasan/common.c:256
kasan_slab_free include/linux/kasan.h:184 [inline]
slab_free_hook mm/slub.c:2121 [inline]
slab_free mm/slub.c:4299 [inline]
kfree+0x14a/0x380 mm/slub.c:4409
bpf_link_release+0x3b/0x50 kernel/bpf/syscall.c:3071
__fput+0x429/0x8a0 fs/file_table.c:423
task_work_run+0x24f/0x310 kernel/task_work.c:180
exit_task_work include/linux/task_work.h:38 [inline]
do_exit+0xa1b/0x27e0 kernel/exit.c:878
__do_sys_exit kernel/exit.c:994 [inline]
__se_sys_exit kernel/exit.c:992 [inline]
__pfx___ia32_sys_exit+0x0/0x10 kernel/exit.c:992
do_syscall_64+0xfb/0x240
entry_SYSCALL_64_after_hwframe+0x6d/0x75
The buggy address belongs to the object at ffff8880327c7700
which belongs to the cache kmalloc-128 of size 128
The buggy address is located 24 bytes inside of
freed 128-byte region [ffff8880327c7700, ffff8880327c7780)
The buggy address belongs to the physical page:
page:ffffea0000c9f1c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x327c7
ksm flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff)
page_type: 0xffffffff()
raw: 00fff00000000800 ffff888014c418c0 ffffea0000b08940 dead000000000003
raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 9872, tgid 9870 (syz-executor.4), ts 229913966958, free_ts 229575197079
set_page_owner include/linux/page_owner.h:31 [inline]
post_alloc_hook+0x1ea/0x210 mm/page_alloc.c:1533
prep_new_page mm/page_alloc.c:1540 [inline]
get_page_from_freelist+0x33ea/0x3580 mm/page_alloc.c:3311
__alloc_pages+0x256/0x680 mm/page_alloc.c:4569
__alloc_pages_node include/linux/gfp.h:238 [inline]
alloc_pages_node include/linux/gfp.h:261 [inline]
alloc_slab_page+0x5f/0x160 mm/slub.c:2190
allocate_slab mm/slub.c:2354 [inline]
new_slab+0x84/0x2f0 mm/slub.c:2407
___slab_alloc+0xd1b/0x13e0 mm/slub.c:3540
__slab_alloc mm/slub.c:3625 [inline]
__slab_alloc_node mm/slub.c:3678 [inline]
slab_alloc_node mm/slub.c:3850 [inline]
kmalloc_trace+0x267/0x360 mm/slub.c:4007
kmalloc include/linux/slab.h:590 [inline]
genl_dumpit_info_alloc net/netlink/genetlink.c:913 [inline]
genl_start+0x1cb/0x6d0 net/netlink/genetlink.c:984
__netlink_dump_start+0x45c/0x780 net/netlink/af_netlink.c:2377
genl_family_rcv_msg_dumpit net/netlink/genetlink.c:1074 [inline]
genl_family_rcv_msg net/netlink/genetlink.c:1190 [inline]
genl_rcv_msg+0x88c/0xec0 net/netlink/genetlink.c:1208
netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2559
genl_rcv+0x28/0x40 net/netlink/genetlink.c:1217
netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]
netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1361
netlink_sendmsg+0x8e1/0xcb0 net/netlink/af_netlink.c:1905
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg+0x221/0x270 net/socket.c:745
____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
page last free pid 9747 tgid 9747 stack trace:
reset_page_owner include/linux/page_owner.h:24 [inline]
free_pages_prepare mm/page_alloc.c:1140 [inline]
free_unref_page_prepare+0x968/0xa90 mm/page_alloc.c:2346
free_unref_page+0x37/0x3f0 mm/page_alloc.c:2486
discard_slab mm/slub.c:2453 [inline]
__put_partials+0xeb/0x130 mm/slub.c:2922
put_cpu_partial+0x17c/0x250 mm/slub.c:2997
__slab_free+0x302/0x410 mm/slub.c:4166
qlink_free mm/kasan/quarantine.c:163 [inline]
qlist_free_all+0x5e/0xc0 mm/kasan/quarantine.c:179
kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286
__kasan_slab_alloc+0x23/0x80 mm/kasan/common.c:322
kasan_slab_alloc include/linux/kasan.h:201 [inline]
slab_post_alloc_hook mm/slub.c:3813 [inline]
slab_alloc_node mm/slub.c:3860 [inline]
kmem_cache_alloc+0x172/0x350 mm/slub.c:3867
kmem_cache_zalloc include/linux/slab.h:701 [inline]
alloc_buffer_head+0x2d/0x2a0 fs/buffer.c:3001
folio_alloc_buffers+0x2da/0x840 fs/buffer.c:924
create_empty_buffers+0x3a/0x740 fs/buffer.c:1650
ext4_block_write_begin+0x27d/0x1850 fs/ext4/inode.c:1038
ext4_da_write_begin+0x5e8/0xa50 fs/ext4/inode.c:2894
generic_perform_write+0x322/0x640 mm/filemap.c:3921
ext4_buffered_write_iter+0xc6/0x350 fs/ext4/file.c:299
Memory state around the buggy address:
ffff8880327c7600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff8880327c7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff8880327c7700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff8880327c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ffff8880327c7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
==================================================================
----------------
Code disassembly (best guess):
0: 41 rex.B
1: 48 c7 44 24 68 8b 83 movq $0xffffffff8d8b838b,0x68(%rsp)
8: 8b 8d
a: 48 c7 44 24 70 b0 bf movq $0xffffffff8171bfb0,0x70(%rsp)
11: 71 81
13: 4c 8d 64 24 60 lea 0x60(%rsp),%r12
18: 49 c1 ec 03 shr $0x3,%r12
1c: 48 b8 f1 f1 f1 f1 04 movabs $0xf200f204f1f1f1f1,%rax
23: f2 00 f2
26: 4b 89 04 3c mov %rax,(%r12,%r15,1)
* 2a: 48 b8 f2 f2 00 f3 f3 movabs $0xf3f3f3f3f300f2f2,%rax <-- trapping instruction
31: f3 f3 f3
34: 4b 89 44 3c 08 mov %rax,0x8(%r12,%r15,1)
39: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
3e: 65 gs
3f: 8b .byte 0x8b