BUG: stack guard page was hit at ffffc90001178000 (stack is ffffc90001170000..ffffc90001177fff) kernel stack overflow (page fault): 0000 [#1] SMP KASAN PTI CPU: 1 PID: 1803 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 RIP: 0010:jhash2 include/linux/jhash.h:126 [inline] RIP: 0010:hash kernel/bpf/bloom_filter.c:35 [inline] RIP: 0010:peek_elem+0x13f/0x4e0 kernel/bpf/bloom_filter.c:50 Code: 00 00 00 48 89 f1 48 c1 e9 03 42 0f b6 3c 39 48 89 f1 83 e1 07 83 c1 03 40 38 f9 7c 09 40 84 ff 0f 85 9a 02 00 00 48 8d 7e 04 <8b> 2e 48 89 f9 48 c1 e9 03 46 0f b6 04 39 48 89 f9 83 e1 07 83 c1 RSP: 0018:ffffc90001177ad8 EFLAGS: 00010282 RAX: 00000000c0a409db RBX: 00000000b6075723 RCX: ffffffff8165617f RDX: 0000000091afdf00 RSI: ffffc90001178000 RDI: ffffc90001178004 RBP: 0000000019b10981 R08: 0000000000000000 R09: 000000003ffffe8a R10: fffffbfff0d80bac R11: ffffffff85658120 R12: ffff88811a9b5590 R13: ffff88811a9b5400 R14: 0000000000000000 R15: dffffc0000000000 FS: 00005555573ec480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90001178000 CR3: 00000001206f6000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ____bpf_map_peek_elem kernel/bpf/helpers.c:108 [inline] bpf_map_peek_elem+0x51/0x80 kernel/bpf/helpers.c:106 ___bpf_prog_run+0x2ea0/0x7130 kernel/bpf/core.c:1549 __bpf_prog_run32+0x79/0xb0 kernel/bpf/core.c:1775 bpf_dispatcher_nop_func include/linux/bpf.h:721 [inline] __bpf_prog_run include/linux/filter.h:624 [inline] bpf_prog_run include/linux/filter.h:631 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:1951 [inline] bpf_trace_run2+0xb4/0x190 kernel/trace/bpf_trace.c:1988 __traceiter_ext4_drop_inode+0x58/0xa0 include/trace/events/ext4.h:238 trace_ext4_drop_inode include/trace/events/ext4.h:238 [inline] ext4_drop_inode+0x109/0x130 fs/ext4/super.c:1328 iput_final fs/inode.c:1634 [inline] iput fs/inode.c:1690 [inline] iput+0x241/0x640 fs/inode.c:1676 do_unlinkat+0x34a/0x550 fs/namei.c:4176 __do_sys_unlink fs/namei.c:4217 [inline] __se_sys_unlink fs/namei.c:4215 [inline] __x64_sys_unlink+0xa0/0xe0 fs/namei.c:4215 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3c/0x90 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7feb9365a557 Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffdf8a6d438 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007feb9365a557 RDX: 00007ffdf8a6d460 RSI: 00007ffdf8a6d4f0 RDI: 00007ffdf8a6d4f0 RBP: 00007ffdf8a6d4f0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffdf8a6e5b0 R13: 00007feb936a63b9 R14: 000000000000c81d R15: 0000000000000004 Modules linked in: ---[ end trace 6cc7572f4dbc03bb ]--- RIP: 0010:jhash2 include/linux/jhash.h:126 [inline] RIP: 0010:hash kernel/bpf/bloom_filter.c:35 [inline] RIP: 0010:peek_elem+0x13f/0x4e0 kernel/bpf/bloom_filter.c:50 Code: 00 00 00 48 89 f1 48 c1 e9 03 42 0f b6 3c 39 48 89 f1 83 e1 07 83 c1 03 40 38 f9 7c 09 40 84 ff 0f 85 9a 02 00 00 48 8d 7e 04 <8b> 2e 48 89 f9 48 c1 e9 03 46 0f b6 04 39 48 89 f9 83 e1 07 83 c1 RSP: 0018:ffffc90001177ad8 EFLAGS: 00010282 RAX: 00000000c0a409db RBX: 00000000b6075723 RCX: ffffffff8165617f RDX: 0000000091afdf00 RSI: ffffc90001178000 RDI: ffffc90001178004 RBP: 0000000019b10981 R08: 0000000000000000 R09: 000000003ffffe8a R10: fffffbfff0d80bac R11: ffffffff85658120 R12: ffff88811a9b5590 R13: ffff88811a9b5400 R14: 0000000000000000 R15: dffffc0000000000 FS: 00005555573ec480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90001178000 CR3: 00000001206f6000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 00 48 89 add %cl,-0x77(%rax) 5: f1 int1 6: 48 c1 e9 03 shr $0x3,%rcx a: 42 0f b6 3c 39 movzbl (%rcx,%r15,1),%edi f: 48 89 f1 mov %rsi,%rcx 12: 83 e1 07 and $0x7,%ecx 15: 83 c1 03 add $0x3,%ecx 18: 40 38 f9 cmp %dil,%cl 1b: 7c 09 jl 0x26 1d: 40 84 ff test %dil,%dil 20: 0f 85 9a 02 00 00 jne 0x2c0 26: 48 8d 7e 04 lea 0x4(%rsi),%rdi * 2a: 8b 2e mov (%rsi),%ebp <-- trapping instruction 2c: 48 89 f9 mov %rdi,%rcx 2f: 48 c1 e9 03 shr $0x3,%rcx 33: 46 0f b6 04 39 movzbl (%rcx,%r15,1),%r8d 38: 48 89 f9 mov %rdi,%rcx 3b: 83 e1 07 and $0x7,%ecx 3e: 83 .byte 0x83 3f: c1 .byte 0xc1