================================================================== BUG: KASAN: null-ptr-deref in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: null-ptr-deref in atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline] BUG: KASAN: null-ptr-deref in buffer_busy fs/buffer.c:2882 [inline] BUG: KASAN: null-ptr-deref in drop_buffers+0x74/0x4b4 fs/buffer.c:2894 Read of size 4 at addr 0000000000000060 by task syz-executor.4/405 CPU: 1 PID: 405 Comm: syz-executor.4 Tainted: G B 6.8.0-rc5-syzkaller-g59a96b711109 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:291 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:298 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 print_report+0xe4/0x518 mm/kasan/report.c:491 kasan_report+0xd8/0x138 mm/kasan/report.c:601 kasan_check_range+0x254/0x294 mm/kasan/generic.c:189 __kasan_check_read+0x20/0x30 mm/kasan/shadow.c:31 instrument_atomic_read include/linux/instrumented.h:68 [inline] atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline] buffer_busy fs/buffer.c:2882 [inline] drop_buffers+0x74/0x4b4 fs/buffer.c:2894 try_to_free_buffers+0x1e0/0x308 fs/buffer.c:2924 filemap_release_folio+0x1ec/0x248 mm/filemap.c:4089 shrink_folio_list+0x1bb4/0x4b84 mm/vmscan.c:1369 shrink_inactive_list mm/vmscan.c:1914 [inline] shrink_list mm/vmscan.c:2155 [inline] shrink_lruvec+0x12a4/0x27b4 mm/vmscan.c:5681 shrink_node_memcgs mm/vmscan.c:5867 [inline] shrink_node+0xe10/0x2268 mm/vmscan.c:5902 shrink_zones mm/vmscan.c:6141 [inline] do_try_to_free_pages+0x5f8/0x14fc mm/vmscan.c:6203 try_to_free_pages+0x8b8/0x10d8 mm/vmscan.c:6438 __perform_reclaim mm/page_alloc.c:3768 [inline] __alloc_pages_direct_reclaim mm/page_alloc.c:3790 [inline] __alloc_pages_slowpath+0xa8c/0x1d58 mm/page_alloc.c:4195 __alloc_pages+0x3bc/0x698 mm/page_alloc.c:4580 __alloc_pages_node include/linux/gfp.h:238 [inline] alloc_pages_node include/linux/gfp.h:261 [inline] alloc_slab_page+0x9c/0x160 mm/slub.c:2190 allocate_slab mm/slub.c:2362 [inline] new_slab+0x210/0x2f4 mm/slub.c:2407 ___slab_alloc+0xb54/0x1010 mm/slub.c:3540 __slab_alloc mm/slub.c:3625 [inline] __slab_alloc_node mm/slub.c:3678 [inline] slab_alloc_node mm/slub.c:3850 [inline] __do_kmalloc_node mm/slub.c:3980 [inline] __kmalloc+0x3ac/0x5d4 mm/slub.c:3994 kmalloc include/linux/slab.h:594 [inline] tomoyo_realpath_from_path+0xc8/0x4cc security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_number_perm+0x1ec/0x6a8 security/tomoyo/file.c:723 tomoyo_path_mkdir+0xd8/0x11c security/tomoyo/tomoyo.c:179 security_path_mkdir+0xec/0x13c security/security.c:1819 do_mkdirat+0x1b4/0x574 fs/namei.c:4142 __do_sys_mkdirat fs/namei.c:4160 [inline] __se_sys_mkdirat fs/namei.c:4158 [inline] __arm64_sys_mkdirat+0x90/0xa8 fs/namei.c:4158 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 ================================================================== Unable to handle kernel paging request at virtual address dfff80000000000c KASAN: null-ptr-deref in range [0x0000000000000060-0x0000000000000067] Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [dfff80000000000c] address between user and kernel address ranges Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 405 Comm: syz-executor.4 Tainted: G B 6.8.0-rc5-syzkaller-g59a96b711109 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : raw_atomic_read include/linux/atomic/atomic-arch-fallback.h:457 [inline] pc : atomic_read include/linux/atomic/atomic-instrumented.h:33 [inline] pc : buffer_busy fs/buffer.c:2882 [inline] pc : drop_buffers+0x80/0x4b4 fs/buffer.c:2894 lr : instrument_atomic_read include/linux/instrumented.h:68 [inline] lr : atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline] lr : buffer_busy fs/buffer.c:2882 [inline] lr : drop_buffers+0x74/0x4b4 fs/buffer.c:2894 sp : ffff800097ca6270 x29: ffff800097ca62a0 x28: 1fffffbff864d378 x27: ffff0000cc292e70 x26: dfff800000000000 x25: 1ffff00012f94c60 x24: dfff800000000000 x23: 0000000000000000 x22: fffffdffc3269bc8 x21: 0000000000000000 x20: 0000000000000060 x19: 0000000000000000 x18: 1fffe00036800396 x17: ffff80008ec8d000 x16: ffff80008ad5a610 x15: 0000000000000001 x14: 1ffff000123e1a9c x13: 0000000000000000 x12: 0000000000000000 x11: ffff7000123e1a9d x10: 0000000000ff0100 x9 : 0000000000000003 x8 : 000000000000000c x7 : 1fffe00036800397 x6 : ffff800080297af0 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff8000801c0904 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: raw_atomic_read include/linux/atomic/atomic-arch-fallback.h:457 [inline] atomic_read include/linux/atomic/atomic-instrumented.h:33 [inline] buffer_busy fs/buffer.c:2882 [inline] drop_buffers+0x80/0x4b4 fs/buffer.c:2894 try_to_free_buffers+0x1e0/0x308 fs/buffer.c:2924 filemap_release_folio+0x1ec/0x248 mm/filemap.c:4089 shrink_folio_list+0x1bb4/0x4b84 mm/vmscan.c:1369 shrink_inactive_list mm/vmscan.c:1914 [inline] shrink_list mm/vmscan.c:2155 [inline] shrink_lruvec+0x12a4/0x27b4 mm/vmscan.c:5681 shrink_node_memcgs mm/vmscan.c:5867 [inline] shrink_node+0xe10/0x2268 mm/vmscan.c:5902 shrink_zones mm/vmscan.c:6141 [inline] do_try_to_free_pages+0x5f8/0x14fc mm/vmscan.c:6203 try_to_free_pages+0x8b8/0x10d8 mm/vmscan.c:6438 __perform_reclaim mm/page_alloc.c:3768 [inline] __alloc_pages_direct_reclaim mm/page_alloc.c:3790 [inline] __alloc_pages_slowpath+0xa8c/0x1d58 mm/page_alloc.c:4195 __alloc_pages+0x3bc/0x698 mm/page_alloc.c:4580 __alloc_pages_node include/linux/gfp.h:238 [inline] alloc_pages_node include/linux/gfp.h:261 [inline] alloc_slab_page+0x9c/0x160 mm/slub.c:2190 allocate_slab mm/slub.c:2362 [inline] new_slab+0x210/0x2f4 mm/slub.c:2407 ___slab_alloc+0xb54/0x1010 mm/slub.c:3540 __slab_alloc mm/slub.c:3625 [inline] __slab_alloc_node mm/slub.c:3678 [inline] slab_alloc_node mm/slub.c:3850 [inline] __do_kmalloc_node mm/slub.c:3980 [inline] __kmalloc+0x3ac/0x5d4 mm/slub.c:3994 kmalloc include/linux/slab.h:594 [inline] tomoyo_realpath_from_path+0xc8/0x4cc security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_number_perm+0x1ec/0x6a8 security/tomoyo/file.c:723 tomoyo_path_mkdir+0xd8/0x11c security/tomoyo/tomoyo.c:179 security_path_mkdir+0xec/0x13c security/security.c:1819 do_mkdirat+0x1b4/0x574 fs/namei.c:4142 __do_sys_mkdirat fs/namei.c:4160 [inline] __se_sys_mkdirat fs/namei.c:4158 [inline] __arm64_sys_mkdirat+0x90/0xa8 fs/namei.c:4158 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 Code: 97f86821 d343fe88 12000a89 11000d29 (38fa6908) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 97f86821 bl 0xffffffffffe1a084 4: d343fe88 lsr x8, x20, #3 8: 12000a89 and w9, w20, #0x7 c: 11000d29 add w9, w9, #0x3 * 10: 38fa6908 ldrsb w8, [x8, x26] <-- trapping instruction