Oops: general protection fault, probably for non-canonical address 0xdffffc0000000008: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000040-0x0000000000000047] CPU: 1 UID: 0 PID: 9950 Comm: syz.3.1115 Not tainted 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:memcmp+0x13f/0x1d0 lib/string.c:676 Code: 00 0f 85 1a ff ff ff 49 83 ec 08 48 83 c3 08 48 83 c5 08 49 83 fc 07 0f 86 fb fe ff ff 48 89 d8 48 89 de 48 c1 e8 03 83 e6 07 <42> 0f b6 14 28 48 8d 43 07 48 89 c1 48 c1 e9 03 42 0f b6 0c 29 40 RSP: 0018:ffffc90003787720 EFLAGS: 00010202 RAX: 0000000000000008 RBX: 0000000000000044 RCX: ffffc9000d46a000 RDX: 0000000000000020 RSI: 0000000000000004 RDI: 0000000000000044 RBP: ffff88803405cf44 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000002 R12: 0000000000000020 R13: dffffc0000000000 R14: 0000000000000003 R15: 0000000000000042 FS: 00007f833ad3b6c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000793000 CR3: 000000002f066000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ima_lookup_digest_entry security/integrity/ima/ima_queue.c:58 [inline] ima_add_template_entry+0x4c0/0x840 security/integrity/ima/ima_queue.c:172 ima_store_template+0xdc/0x150 security/integrity/ima/ima_api.c:122 ima_store_measurement+0x223/0x5c0 security/integrity/ima/ima_api.c:383 process_measurement+0x1bcb/0x2370 security/integrity/ima/ima_main.c:380 ima_file_mmap+0x1b3/0x1e0 security/integrity/ima/ima_main.c:462 security_mmap_file+0x8bd/0x990 security/security.c:2977 vm_mmap_pgoff+0xdb/0x360 mm/util.c:576 ksys_mmap_pgoff+0x1c8/0x5c0 mm/mmap.c:542 __do_sys_mmap arch/x86/kernel/sys_x86_64.c:89 [inline] __se_sys_mmap arch/x86/kernel/sys_x86_64.c:82 [inline] __x64_sys_mmap+0x125/0x190 arch/x86/kernel/sys_x86_64.c:82 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f8339f85d29 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f833ad3b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f833a175fa0 RCX: 00007f8339f85d29 RDX: 00004000000000df RSI: 000000000000000c RDI: 0000000000000000 RBP: 00007f833a001b08 R08: 0000000000010006 R09: 0000300000000000 R10: 0000000000044eb2 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f833a175fa0 R15: 00007ffd207436c8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:memcmp+0x13f/0x1d0 lib/string.c:676 Code: 00 0f 85 1a ff ff ff 49 83 ec 08 48 83 c3 08 48 83 c5 08 49 83 fc 07 0f 86 fb fe ff ff 48 89 d8 48 89 de 48 c1 e8 03 83 e6 07 <42> 0f b6 14 28 48 8d 43 07 48 89 c1 48 c1 e9 03 42 0f b6 0c 29 40 RSP: 0018:ffffc90003787720 EFLAGS: 00010202 RAX: 0000000000000008 RBX: 0000000000000044 RCX: ffffc9000d46a000 RDX: 0000000000000020 RSI: 0000000000000004 RDI: 0000000000000044 RBP: ffff88803405cf44 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000002 R12: 0000000000000020 R13: dffffc0000000000 R14: 0000000000000003 R15: 0000000000000042 FS: 00007f833ad3b6c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000087b000 CR3: 000000002f066000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 0f 85 1a ff ff ff jne 0xffffff20 6: 49 83 ec 08 sub $0x8,%r12 a: 48 83 c3 08 add $0x8,%rbx e: 48 83 c5 08 add $0x8,%rbp 12: 49 83 fc 07 cmp $0x7,%r12 16: 0f 86 fb fe ff ff jbe 0xffffff17 1c: 48 89 d8 mov %rbx,%rax 1f: 48 89 de mov %rbx,%rsi 22: 48 c1 e8 03 shr $0x3,%rax 26: 83 e6 07 and $0x7,%esi * 29: 42 0f b6 14 28 movzbl (%rax,%r13,1),%edx <-- trapping instruction 2e: 48 8d 43 07 lea 0x7(%rbx),%rax 32: 48 89 c1 mov %rax,%rcx 35: 48 c1 e9 03 shr $0x3,%rcx 39: 42 0f b6 0c 29 movzbl (%rcx,%r13,1),%ecx 3e: 40 rex