general protection fault, probably for non-canonical address 0xe0e0dce0e0e0e0e0: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0x0707070707070700-0x0707070707070707] CPU: 1 PID: 4876 Comm: systemd-udevd Not tainted 5.14.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__debug_check_no_obj_freed lib/debugobjects.c:976 [inline] RIP: 0010:debug_check_no_obj_freed+0x1d3/0x420 lib/debugobjects.c:1018 Code: 39 00 0f 85 0f 02 00 00 48 89 45 08 4d 89 30 4c 89 c7 4d 89 68 08 e8 7c d0 ff ff 48 85 ed 74 2c 49 89 e8 4c 89 c0 48 c1 e8 03 <42> 80 3c 38 00 0f 84 2e ff ff ff 4c 89 c7 4c 89 44 24 38 e8 a5 55 RSP: 0018:ffffc9000110f9a0 EFLAGS: 00010003 RAX: 00e0e0e0e0e0e0e0 RBX: ffff888172916000 RCX: ffffffff815b9800 RDX: 1ffffffff207e6dc RSI: 0000000000000004 RDI: ffff888000104520 RBP: 0707070707070707 R08: 0707070707070707 R09: ffff8880951dd7f0 R10: fffff52000221f22 R11: 000000000000003f R12: 0000000000000015 R13: dead000000000122 R14: dead000000000100 R15: dffffc0000000000 FS: 00007fd291ffb8c0(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000050 CR3: 000000001defe000 CR4: 00000000001526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: slab_free_hook mm/slub.c:1600 [inline] slab_free_freelist_hook+0x171/0x240 mm/slub.c:1650 slab_free mm/slub.c:3210 [inline] kfree+0xe4/0x530 mm/slub.c:4264 tomoyo_realpath_from_path+0x191/0x620 security/tomoyo/realpath.c:291 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_perm+0x21b/0x400 security/tomoyo/file.c:822 security_inode_getattr+0xcf/0x140 security/security.c:1332 vfs_getattr fs/stat.c:139 [inline] vfs_fstat+0x43/0xb0 fs/stat.c:164 __do_sys_newfstat+0x81/0x100 fs/stat.c:404 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fd290e6d2e2 Code: 48 8b 05 b9 db 2b 00 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 83 ff 01 77 33 48 63 fe b8 05 00 00 00 48 89 d6 0f 05 <48> 3d 00 f0 ff ff 77 06 f3 c3 0f 1f 40 00 48 8b 15 81 db 2b 00 f7 RSP: 002b:00007ffe309621e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000005 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd290e6d2e2 RDX: 00007ffe30962200 RSI: 00007ffe30962200 RDI: 000000000000000e RBP: 00007ffe309623a0 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000080000 R11: 0000000000000246 R12: 000055765f8290b0 R13: 000055765f81a010 R14: 000055765f82c7b0 R15: 00007ffe30962360 Modules linked in: ---[ end trace 17968ac800949b98 ]--- RIP: 0010:__debug_check_no_obj_freed lib/debugobjects.c:976 [inline] RIP: 0010:debug_check_no_obj_freed+0x1d3/0x420 lib/debugobjects.c:1018 Code: 39 00 0f 85 0f 02 00 00 48 89 45 08 4d 89 30 4c 89 c7 4d 89 68 08 e8 7c d0 ff ff 48 85 ed 74 2c 49 89 e8 4c 89 c0 48 c1 e8 03 <42> 80 3c 38 00 0f 84 2e ff ff ff 4c 89 c7 4c 89 44 24 38 e8 a5 55 RSP: 0018:ffffc9000110f9a0 EFLAGS: 00010003 RAX: 00e0e0e0e0e0e0e0 RBX: ffff888172916000 RCX: ffffffff815b9800 RDX: 1ffffffff207e6dc RSI: 0000000000000004 RDI: ffff888000104520 RBP: 0707070707070707 R08: 0707070707070707 R09: ffff8880951dd7f0 R10: fffff52000221f22 R11: 000000000000003f R12: 0000000000000015 R13: dead000000000122 R14: dead000000000100 R15: dffffc0000000000 FS: 00007fd291ffb8c0(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000050 CR3: 000000001defe000 CR4: 00000000001526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400