BUG: unable to handle page fault for address: ffff8881e6a39000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 7801067 P4D 7801067 PUD 1e1d5b063 PMD 1dd85b063 PTE ffff8881d7e3a268
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 164 Comm: udevd Not tainted 5.4.290-syzkaller-00002-g41adfeb3d639 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
RIP: 0010:qlist_free_all+0x3b/0xb0 mm/kasan/quarantine.c:165
Code: ff 0f 84 85 00 00 00 49 89 f5 49 bf 00 00 00 00 00 ea ff ff 49 bc 00 00 00 80 7f 77 00 00 eb 1a 48 ff c9 48 89 c8 48 8b 70 18 <48> 8b 1f e8 0d 05 00 00 48 89 df 48 85 db 74 3b 4c 89 ee 4d 85 ed
RSP: 0018:ffff8881ec1afa58 EFLAGS: 00010286
RAX: ffffea00079a8e00 RBX: ffff8881e6a39000 RCX: ffffea00079a8e00
RDX: 0000000080100009 RSI: ffff8881f5c0c000 RDI: ffff8881e6a39000
RBP: 00000000000002f2 R08: ffff8881e7ca1e00 R09: ffffffff81944010
R10: ffff8881e7ca1e00 R11: dffffc0000000001 R12: 0000777f80000000
R13: 0000000000000000 R14: ffff8881ec1afa88 R15: ffffea0000000000
FS: 00007fdffad17c80(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff8881e6a39000 CR3: 00000001edbbc000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
quarantine_reduce+0x1d9/0x210 mm/kasan/quarantine.c:260
__kasan_kmalloc+0x41/0x210 mm/kasan/common.c:507
slab_post_alloc_hook mm/slab.h:584 [inline]
slab_alloc_node mm/slub.c:2829 [inline]
slab_alloc mm/slub.c:2837 [inline]
kmem_cache_alloc+0xd9/0x250 mm/slub.c:2842
getname_flags+0xb8/0x4e0 fs/namei.c:141
user_path_at_empty+0x28/0x50 fs/namei.c:2703
do_readlinkat+0x114/0x3a0 fs/stat.c:398
__do_sys_readlink fs/stat.c:431 [inline]
__se_sys_readlink fs/stat.c:428 [inline]
__x64_sys_readlink+0x7b/0x90 fs/stat.c:428
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
RIP: 0033:0x7fdffae43d47
Code: 73 01 c3 48 8b 0d e1 90 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 59 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d b1 90 0d 00 f7 d8 64 89 01 48
RSP: 002b:00007ffd3bb06b28 EFLAGS: 00000246 ORIG_RAX: 0000000000000059
RAX: ffffffffffffffda RBX: 00007ffd3bb06b38 RCX: 00007fdffae43d47
RDX: 0000000000000400 RSI: 00007ffd3bb06b38 RDI: 00007ffd3bb07018
RBP: 0000000000000400 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000007 R11: 0000000000000246 R12: 00007ffd3bb07018
R13: 00007ffd3bb06f88 R14: 0000562913b942c0 R15: 0000000000000000
Modules linked in:
CR2: ffff8881e6a39000
---[ end trace d2fbb6d0c28e2eb0 ]---
RIP: 0010:qlist_free_all+0x3b/0xb0 mm/kasan/quarantine.c:165
Code: ff 0f 84 85 00 00 00 49 89 f5 49 bf 00 00 00 00 00 ea ff ff 49 bc 00 00 00 80 7f 77 00 00 eb 1a 48 ff c9 48 89 c8 48 8b 70 18 <48> 8b 1f e8 0d 05 00 00 48 89 df 48 85 db 74 3b 4c 89 ee 4d 85 ed
RSP: 0018:ffff8881ec1afa58 EFLAGS: 00010286
RAX: ffffea00079a8e00 RBX: ffff8881e6a39000 RCX: ffffea00079a8e00
RDX: 0000000080100009 RSI: ffff8881f5c0c000 RDI: ffff8881e6a39000
RBP: 00000000000002f2 R08: ffff8881e7ca1e00 R09: ffffffff81944010
R10: ffff8881e7ca1e00 R11: dffffc0000000001 R12: 0000777f80000000
R13: 0000000000000000 R14: ffff8881ec1afa88 R15: ffffea0000000000
FS: 00007fdffad17c80(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff8881e6a39000 CR3: 00000001edbbc000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
----------------
Code disassembly (best guess):
0: ff 0f decl (%rdi)
2: 84 85 00 00 00 49 test %al,0x49000000(%rbp)
8: 89 f5 mov %esi,%ebp
a: 49 bf 00 00 00 00 00 movabs $0xffffea0000000000,%r15
11: ea ff ff
14: 49 bc 00 00 00 80 7f movabs $0x777f80000000,%r12
1b: 77 00 00
1e: eb 1a jmp 0x3a
20: 48 ff c9 dec %rcx
23: 48 89 c8 mov %rcx,%rax
26: 48 8b 70 18 mov 0x18(%rax),%rsi
* 2a: 48 8b 1f mov (%rdi),%rbx <-- trapping instruction
2d: e8 0d 05 00 00 call 0x53f
32: 48 89 df mov %rbx,%rdi
35: 48 85 db test %rbx,%rbx
38: 74 3b je 0x75
3a: 4c 89 ee mov %r13,%rsi
3d: 4d 85 ed test %r13,%r13