ci2 starts bisection 2024-03-08 00:16:26.995363373 +0000 UTC m=+39977.550229189 bisecting fixing commit since 6139f2a02fe0ac7a08389b4eb786e0c659039ddd building syzkaller on 60bf9982e3c5f47dee643bd88d86c7f0b631e32d ensuring issue is reproducible on original commit 6139f2a02fe0ac7a08389b4eb786e0c659039ddd testing commit 6139f2a02fe0ac7a08389b4eb786e0c659039ddd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 420511dfb2718579d0e0f3afe4349d2c92510841fb5c6cebd84d1ff399f5c050 all runs: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str representative crash: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str, types: [UNKNOWN] check whether we can drop unnecessary instrumentation disabling configs for [LEAK UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit 6139f2a02fe0ac7a08389b4eb786e0c659039ddd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 07117c2c0716c090763db2d0e9166efb7145ca75c7cbd4bcdc69fd6d9d4b5874 all runs: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str representative crash: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str, types: [UNKNOWN] the bug reproduces without the instrumentation disabling configs for [BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed kconfig minimization: base=3703 full=7266 leaves diff=1981 split chunks (needed=false): <1981> split chunk #0 of len 1981 into 5 parts testing without sub-chunk 1/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG KASAN LOCKDEP], they are not needed testing commit 6139f2a02fe0ac7a08389b4eb786e0c659039ddd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c8c397fe70de49ea8bc205be87f77d5936e0c5258b74695fdd6f9a3092e2b733 all runs: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str representative crash: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [LEAK UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit 6139f2a02fe0ac7a08389b4eb786e0c659039ddd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: d251fd79f44913e9d316eac1893cbe6b61afbd25085dd302a1c2e0755d3e16c0 all runs: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str representative crash: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit 6139f2a02fe0ac7a08389b4eb786e0c659039ddd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: b75036a6f7f350d7a871c2316361ead552bf80190c1321d8fc6a4883b6e80435 all runs: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str representative crash: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG KASAN LOCKDEP], they are not needed testing commit 6139f2a02fe0ac7a08389b4eb786e0c659039ddd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 84f9d9cb89117624c20c6f15729cc37d6b36bc013e9e89272e73163af317bd7d run #0: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str run #1: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str run #2: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str run #3: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str run #4: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str run #5: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str run #6: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str run #7: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str run #8: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str run #9: basic kernel testing failed: failed to copy binary to VM: failed to run ["scp" "-P" "22" "-F" "/dev/null" "-o" "UserKnownHostsFile=/dev/null" "-o" "BatchMode=yes" "-o" "IdentitiesOnly=yes" "-o" "StrictHostKeyChecking=no" "-o" "ConnectTimeout=10" "-v" "/tmp/syz-executor2257619946" "root@10.128.0.124:./syz-executor2257619946"]: exit status 255 Executing: program /usr/bin/ssh host 10.128.0.124, user root, command sftp OpenSSH_9.2p1 Debian-2+deb12u1, OpenSSL 3.0.11 19 Sep 2023 debug1: Reading configuration data /dev/null debug1: Connecting to 10.128.0.124 [10.128.0.124] port 22. debug1: connect to address 10.128.0.124 port 22: Connection timed out ssh: connect to host 10.128.0.124 port 22: Connection timed out scp: Connection closed representative crash: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit 6139f2a02fe0ac7a08389b4eb786e0c659039ddd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 9244ac58b6f12bf08cdd19c12686268b32047f2976b01f518717f0440588a219 all runs: OK false negative chance: 0.000 minimized to 393 configs; suspects: [ARCH_ENABLE_MEMORY_HOTREMOVE ATM BCMA BLK_DEV_ZONED BPF_SYSCALL CARDBUS CFG80211 CFG80211_WEXT CMA CONTIG_ALLOC CRYPTO_842 CRYPTO_LZ4 CRYPTO_LZ4HC CRYPTO_LZO CRYPTO_ZSTD DVB_CORE EXTCON FB FRONTSWAP GPIOLIB HID_ZEROPLUS I2C_MUX IIO IRQ_REMAP LIBNVDIMM MEDIA_ANALOG_TV_SUPPORT MEDIA_CAMERA_SUPPORT MEDIA_CEC_SUPPORT MEDIA_CONTROLLER MEDIA_DIGITAL_TV_SUPPORT MEDIA_RADIO_SUPPORT MEDIA_SDR_SUPPORT MEDIA_SUPPORT MEDIA_TEST_SUPPORT MEDIA_USB_SUPPORT MEMORY_HOTPLUG MEMORY_HOTPLUG_SPARSE MEMORY_HOTREMOVE MFD_VIPERBOARD PARPORT PCCARD PCMCIA PHONET RADIO_ADAPTERS RADIO_SI470X RADIO_SI4713 RC_CORE RFKILL SND SOUND SPI SSB TAP TUN USB_AMD5536UDC USB_ATM USB_CONFIGFS USB_CONFIGFS_F_UAC1_LEGACY USB_CONFIGFS_F_UAC2 USB_CONFIGFS_F_UVC USB_CONFIGFS_MASS_STORAGE USB_CONFIGFS_NCM USB_CONFIGFS_OBEX USB_CONFIGFS_PHONET USB_CONFIGFS_RNDIS USB_CONFIGFS_SERIAL USB_CXACRU USB_CYPRESS_CY7C63 USB_CYTHERM USB_DSBR USB_DUMMY_HCD USB_DWC2 USB_DWC2_HOST USB_DWC2_PCI USB_DWC3 USB_DWC3_GADGET USB_DWC3_OF_SIMPLE USB_DWC3_PCI USB_DWC3_ULPI USB_DYNAMIC_MINORS USB_EG20T USB_EHCI_HCD_PLATFORM USB_EHCI_ROOT_HUB_TT USB_EHSET_TEST_FIXTURE USB_EMI26 USB_EMI62 USB_EPSON2888 USB_EZUSB_FX2 USB_FEW_INIT_RETRIES USB_FOTG210_HCD USB_FOTG210_UDC USB_FTDI_ELAN USB_F_ACM USB_F_ECM USB_F_EEM USB_F_FS USB_F_HID USB_F_MASS_STORAGE USB_F_MIDI USB_F_NCM USB_F_OBEX USB_F_PHONET USB_F_PRINTER USB_F_RNDIS USB_F_SERIAL USB_F_SS_LB USB_F_SUBSET USB_F_TCM USB_F_UAC1 USB_F_UAC1_LEGACY USB_F_UAC2 USB_F_UVC USB_GADGET USB_GADGETFS USB_GADGET_DEBUG_FILES USB_GADGET_DEBUG_FS USB_GL860 USB_GOKU USB_GPIO_VBUS USB_GR_UDC USB_GSPCA USB_GSPCA_BENQ USB_GSPCA_CONEX USB_GSPCA_CPIA1 USB_GSPCA_DTCS033 USB_GSPCA_ETOMS USB_GSPCA_FINEPIX USB_GSPCA_JEILINJ USB_GSPCA_JL2005BCD USB_GSPCA_KINECT USB_GSPCA_KONICA USB_GSPCA_MARS USB_GSPCA_MR97310A USB_GSPCA_NW80X USB_GSPCA_OV519 USB_GSPCA_OV534 USB_GSPCA_OV534_9 USB_GSPCA_PAC207 USB_GSPCA_PAC7302 USB_GSPCA_PAC7311 USB_GSPCA_SE401 USB_GSPCA_SN9C2028 USB_GSPCA_SN9C20X USB_GSPCA_SONIXB USB_GSPCA_SONIXJ USB_GSPCA_SPCA1528 USB_GSPCA_SPCA500 USB_GSPCA_SPCA501 USB_GSPCA_SPCA505 USB_GSPCA_SPCA506 USB_GSPCA_SPCA508 USB_GSPCA_SPCA561 USB_GSPCA_SQ905 USB_GSPCA_SQ905C USB_GSPCA_SQ930X USB_GSPCA_STK014 USB_GSPCA_STK1135 USB_GSPCA_STV0680 USB_GSPCA_SUNPLUS USB_GSPCA_T613 USB_GSPCA_TOPRO USB_GSPCA_TOUPTEK USB_GSPCA_TV8532 USB_GSPCA_VC032X USB_GSPCA_VICAM USB_GSPCA_XIRLINK_CIT USB_GSPCA_ZC3XX USB_HACKRF USB_HCD_BCMA USB_HCD_SSB USB_HSIC_USB3503 USB_HSIC_USB4604 USB_HSO USB_HUB_USB251XB USB_IDMOUSE USB_IOWARRIOR USB_IPHETH USB_ISIGHTFW USB_ISP116X_HCD USB_ISP1301 USB_ISP1760 USB_ISP1760_DUAL_ROLE USB_ISP1760_HCD USB_ISP1761_UDC USB_KAWETH USB_KC2190 USB_KEENE USB_LAN78XX USB_LCD USB_LD USB_LEDS_TRIGGER_USBPORT USB_LED_TRIG USB_LEGOTOWER USB_LIBCOMPOSITE USB_LINK_LAYER_TEST USB_M5602 USB_MA901 USB_MAX3421_HCD USB_MDC800 USB_MICROTEK USB_MR800 USB_MSI2500 USB_MUSB_DUAL_ROLE USB_MUSB_HDRC USB_MV_U3D USB_MV_UDC USB_NET2272 USB_NET2272_DMA USB_NET2280 USB_NET_AX88179_178A USB_NET_AX8817X USB_NET_CDCETHER USB_NET_CDC_EEM USB_NET_CDC_MBIM USB_NET_CDC_NCM USB_NET_CDC_SUBSET USB_NET_CDC_SUBSET_ENABLE USB_NET_CH9200 USB_NET_CX82310_ETH USB_NET_DM9601 USB_NET_GL620A USB_NET_HUAWEI_CDC_NCM USB_NET_INT51X1 USB_NET_KALMIA USB_NET_MCS7830 USB_NET_NET1080 USB_NET_PLUSB USB_NET_QMI_WWAN USB_NET_RNDIS_HOST USB_NET_RNDIS_WLAN USB_NET_SMSC75XX USB_NET_SMSC95XX USB_NET_SR9700 USB_NET_SR9800 USB_NET_ZAURUS USB_OHCI_HCD_PLATFORM USB_OTG USB_OTG_FSM USB_OXU210HP_HCD USB_PEGASUS USB_PULSE8_CEC USB_PWC USB_PWC_INPUT_EVDEV USB_PXA27X USB_R8A66597 USB_R8A66597_HCD USB_RAINSHADOW_CEC USB_RAREMONO USB_RAW_GADGET USB_RTL8150 USB_RTL8152 USB_RTL8153_ECM USB_S2255 USB_SERIAL USB_SERIAL_AIRCABLE USB_SERIAL_ARK3116 USB_SERIAL_BELKIN USB_SERIAL_CH341 USB_SERIAL_CONSOLE USB_SERIAL_CP210X USB_SERIAL_CYBERJACK USB_SERIAL_CYPRESS_M8 USB_SERIAL_DEBUG USB_SERIAL_DIGI_ACCELEPORT USB_SERIAL_EDGEPORT USB_SERIAL_EDGEPORT_TI USB_SERIAL_EMPEG USB_SERIAL_F81232 USB_SERIAL_F8153X USB_SERIAL_FTDI_SIO USB_SERIAL_GARMIN USB_SERIAL_GENERIC USB_SERIAL_IPAQ USB_SERIAL_IPW USB_SERIAL_IR USB_SERIAL_IUU USB_SERIAL_KEYSPAN USB_SERIAL_KEYSPAN_PDA USB_SERIAL_KLSI USB_SERIAL_KOBIL_SCT USB_SERIAL_MCT_U232 USB_SERIAL_METRO USB_SERIAL_MOS7715_PARPORT USB_SERIAL_MOS7720 USB_SERIAL_MOS7840 USB_SERIAL_MXUPORT USB_SERIAL_NAVMAN USB_SERIAL_OMNINET USB_SERIAL_OPTICON USB_SERIAL_OPTION USB_SERIAL_OTI6858 USB_SERIAL_PL2303 USB_SERIAL_QCAUX USB_SERIAL_QT2 USB_SERIAL_QUALCOMM USB_SERIAL_SAFE USB_SERIAL_SIERRAWIRELESS USB_SERIAL_SIMPLE USB_SERIAL_SPCP8X5 USB_SERIAL_SSU100 USB_SERIAL_SYMBOL USB_SERIAL_TI USB_SERIAL_UPD78F0730 USB_SERIAL_VISOR USB_SERIAL_WHITEHEAT USB_SERIAL_WISHBONE USB_SERIAL_WWAN USB_SERIAL_XR USB_SERIAL_XSENS_MT USB_SEVSEG USB_SI470X USB_SI4713 USB_SIERRA_NET USB_SISUSBVGA USB_SL811_CS USB_SL811_HCD USB_SL811_HCD_ISO USB_SNP_CORE USB_SPEEDTOUCH USB_STKWEBCAM USB_STORAGE_ALAUDA USB_STORAGE_CYPRESS_ATACB USB_STORAGE_DATAFAB USB_STORAGE_ENE_UB6250 USB_STORAGE_FREECOM USB_STORAGE_ISD200 USB_STORAGE_JUMPSHOT USB_STORAGE_KARMA USB_STORAGE_ONETOUCH USB_STORAGE_SDDR09 USB_STORAGE_SDDR55 USB_STORAGE_USBAT USB_STV06XX USB_TEST USB_TMC USB_TRANCEVIBRATOR USB_U132_HCD USB_UAS USB_UEAGLEATM USB_ULPI_BUS USB_USBNET USB_USS720 USB_U_AUDIO USB_U_ETHER USB_U_SERIAL USB_VIDEO_CLASS USB_VIDEO_CLASS_INPUT_EVDEV USB_VL600 USB_WDM USB_XHCI_DBGCAP USB_XHCI_PLATFORM USB_XUSBATM USB_YUREX USB_ZR364XX USERFAULTFD USERIO USERMODE_DRIVER USER_RETURN_NOTIFIER U_SERIAL_CONSOLE V4L2_MEM2MEM_DEV V4L_TEST_DRIVERS VALIDATE_FS_PARSER VDPA VETH VFIO VFIO_IOMMU_TYPE1 VFIO_PCI VFIO_PCI_CORE VFIO_PCI_INTX VFIO_PCI_MMAP VFIO_VIRQFD VGASTATE VHOST VHOST_CROSS_ENDIAN_LEGACY VHOST_IOTLB VHOST_NET VHOST_RING VHOST_VDPA VHOST_VSOCK VIDEOBUF2_CORE VIDEOBUF2_DMA_CONTIG VIDEOBUF2_DMA_SG VIDEOBUF2_MEMOPS VIDEOBUF2_V4L2 VIDEOBUF2_VMALLOC VIDEOBUF_GEN VIDEOBUF_VMALLOC VIDEO_AU0828 VIDEO_AU0828_RC VIDEO_AU0828_V4L2 VIDEO_CPIA2 VIDEO_CS53L32A VIDEO_CX231XX VIDEO_CX231XX_ALSA VIDEO_CX231XX_DVB VIDEO_CX231XX_RC VIDEO_CX2341X VIDEO_CX25840 VIDEO_DEV VIDEO_EM28XX VIDEO_EM28XX_ALSA VIDEO_EM28XX_DVB VIDEO_EM28XX_RC VIDEO_EM28XX_V4L2 VIDEO_GO7007 VIDEO_GO7007_LOADER VIDEO_GO7007_USB VIDEO_GO7007_USB_S2250_BOARD VIDEO_HDPVR VIDEO_MSP3400 VIDEO_PVRUSB2 VIDEO_PVRUSB2_DVB VIDEO_PVRUSB2_SYSFS VIDEO_SAA711X VIDEO_STK1160 VIDEO_STK1160_COMMON VIDEO_TM6000 VIDEO_TM6000_ALSA VIDEO_TM6000_DVB VIDEO_TUNER VIDEO_TVEEPROM VIDEO_USBTV VIDEO_V4L2 VIDEO_V4L2_I2C VIDEO_V4L2_SUBDEV_API VIDEO_V4L2_TPG VIDEO_VICODEC VIDEO_VIM2M VIDEO_VIMC VIDEO_VIVID VIDEO_VIVID_CEC VIDEO_WM8775 VIPERBOARD_ADC VIRTIO_BALLOON VIRTIO_DMA_SHARED_BUFFER VIRTIO_MEM VIRTIO_MMIO VIRTIO_MMIO_CMDLINE_DEVICES VIRTIO_PMEM VIRTIO_VDPA VIRTIO_VSOCKETS VIRTIO_VSOCKETS_COMMON VIRT_WIFI VLAN_8021Q VLAN_8021Q_GVRP VLAN_8021Q_MVRP VMAP_PFN VMWARE_VMCI VMXNET3 VP_VDPA VSOCKETS VSOCKETS_DIAG VSOCKETS_LOOPBACK VSOCKMON VT_HW_CONSOLE_BINDING VXFS_FS WANT_DEV_COREDUMP WEXT_CORE WEXT_PRIV WEXT_PROC WIREGUARD WIRELESS WIRELESS_EXT WLAN WLAN_VENDOR_ADMTEK X86_SGX X86_X2APIC X86_X32 XARRAY_MULTI XDP_SOCKETS XDP_SOCKETS_DIAG XFRM_ESPINTCP XFRM_INTERFACE XFRM_IPCOMP XFRM_MIGRATE XFRM_OFFLOAD XFRM_STATISTICS XFRM_SUB_POLICY XFRM_USER_COMPAT XFS_FS XFS_POSIX_ACL XFS_QUOTA XFS_RT XOR_BLOCKS YENTA YENTA_ENE_TUNE YENTA_O2 YENTA_RICOH YENTA_TI YENTA_TOSHIBA ZBUD ZEROPLUS_FF ZONEFS_FS ZPOOL ZRAM ZRAM_DEF_COMP_LZORLE ZSMALLOC ZSTD_COMPRESS ZSWAP ZSWAP_COMPRESSOR_DEFAULT_LZO ZSWAP_DEFAULT_ON ZSWAP_ZPOOL_DEFAULT_ZBUD] disabling configs for [UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing current HEAD 57436264850706f50887bbb2148ee2cc797c9485 testing commit 57436264850706f50887bbb2148ee2cc797c9485 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 33d4fc311bf3d91504563789613b99fde5a9a07f13e4822e942aa1a527dd4513 all runs: crashed: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str representative crash: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str, types: [UNKNOWN] crash still not fixed/happens on the oldest tested release revisions tested: 8, total time: 50m47.59577033s (build: 18m43.48570265s, test: 30m12.269026613s) crash still not fixed or there were kernel test errors commit msg: Linux 5.15.151 crash: BUG: unable to handle kernel paging request in bpf_probe_read_kernel_str BUG: unable to handle page fault for address: ffffffffff600000 #PF: supervisor read access in kernel mode #PF: error_code(0x0001) - permissions violation PGD 2c24067 P4D 2c24067 PUD 2c26067 PMD 2c49067 PTE 8000000002c05165 Oops: 0001 [#1] SMP CPU: 1 PID: 1164 Comm: udevd Not tainted 5.15.151-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 RIP: 0010:strncpy_from_kernel_nofault+0x55/0xb0 mm/maccess.c:92 Code: af 01 00 83 80 f8 15 00 00 01 31 f6 48 89 ea eb 17 48 83 c2 01 48 83 c3 01 48 89 d0 48 29 e8 84 c9 74 2e 4c 39 e0 7d 29 89 f0 <8a> 0a 85 c0 88 0b 74 df 65 48 8b 04 25 00 af 01 00 83 a8 f8 15 00 RSP: 0018:ffffc90000187908 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffffc90000187978 RCX: 0000000000000010 RDX: ffffffffff600000 RSI: 0000000000000000 RDI: ffffffffff600000 RBP: ffffffffff600000 R08: ffffffffff600000 R09: 0000000000000000 R10: 0000000000000000 R11: ffffffff8293f316 R12: 0000000000000005 R13: 00000000000001a4 R14: ffffc90000187ac8 R15: ffff888100da06c0 FS: 00007f7fd89bdc80(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600000 CR3: 000000010f03f000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_probe_read_kernel_str_common kernel/trace/bpf_trace.c:255 [inline] ____bpf_probe_read_kernel_str kernel/trace/bpf_trace.c:264 [inline] bpf_probe_read_kernel_str+0x18/0x40 kernel/trace/bpf_trace.c:261 ___bpf_prog_run+0xddc/0x1ef0 kernel/bpf/core.c:1564 __bpf_prog_run32+0x31/0x60 kernel/bpf/core.c:1784 bpf_dispatcher_nop_func include/linux/bpf.h:780 [inline] __bpf_prog_run include/linux/filter.h:625 [inline] bpf_prog_run include/linux/filter.h:632 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline] bpf_trace_run2+0x4f/0xc0 kernel/trace/bpf_trace.c:1917 trace_kfree include/trace/events/kmem.h:118 [inline] kfree+0x2ea/0x490 mm/slub.c:4549 tomoyo_path_number_perm+0x1c8/0x200 security/tomoyo/file.c:736 tomoyo_path_mknod+0x5c/0x90 security/tomoyo/tomoyo.c:239 security_path_mknod+0x3d/0x60 security/security.c:1147 may_o_create fs/namei.c:3284 [inline] lookup_open.isra.0+0x1f1/0x800 fs/namei.c:3425 open_last_lookups fs/namei.c:3532 [inline] path_openat+0x2c9/0xaf0 fs/namei.c:3739 do_filp_open+0xa4/0x150 fs/namei.c:3769 do_sys_openat2+0x92/0x160 fs/open.c:1211 do_sys_open fs/open.c:1227 [inline] __do_sys_openat fs/open.c:1243 [inline] __se_sys_openat fs/open.c:1238 [inline] __x64_sys_openat+0x4f/0x90 fs/open.c:1238 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7f7fd8ae89a4 Code: 24 20 48 8d 44 24 30 48 89 44 24 28 64 8b 04 25 18 00 00 00 85 c0 75 2c 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 76 60 48 8b 15 55 a4 0d 00 f7 d8 64 89 02 48 83 RSP: 002b:00007ffd4925fde0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00005629bdd5c040 RCX: 00007f7fd8ae89a4 RDX: 0000000000080141 RSI: 00005629bdd3f0d8 RDI: 00000000ffffff9c RBP: 00005629bdd3f0d8 R08: 00000000ffffffff R09: 0000000000000000 R10: 00000000000001a4 R11: 0000000000000246 R12: 0000000000080141 R13: ffffffffffffffff R14: 00000000ffffffff R15: 00000000ffffffff Modules linked in: CR2: ffffffffff600000 ---[ end trace a3248a22b7a91f5e ]--- RIP: 0010:strncpy_from_kernel_nofault+0x55/0xb0 mm/maccess.c:92 Code: af 01 00 83 80 f8 15 00 00 01 31 f6 48 89 ea eb 17 48 83 c2 01 48 83 c3 01 48 89 d0 48 29 e8 84 c9 74 2e 4c 39 e0 7d 29 89 f0 <8a> 0a 85 c0 88 0b 74 df 65 48 8b 04 25 00 af 01 00 83 a8 f8 15 00 RSP: 0018:ffffc90000187908 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffffc90000187978 RCX: 0000000000000010 RDX: ffffffffff600000 RSI: 0000000000000000 RDI: ffffffffff600000 RBP: ffffffffff600000 R08: ffffffffff600000 R09: 0000000000000000 R10: 0000000000000000 R11: ffffffff8293f316 R12: 0000000000000005 R13: 00000000000001a4 R14: ffffc90000187ac8 R15: ffff888100da06c0 FS: 00007f7fd89bdc80(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600000 CR3: 000000010f03f000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: af scas %es:(%rdi),%eax 1: 01 00 add %eax,(%rax) 3: 83 80 f8 15 00 00 01 addl $0x1,0x15f8(%rax) a: 31 f6 xor %esi,%esi c: 48 89 ea mov %rbp,%rdx f: eb 17 jmp 0x28 11: 48 83 c2 01 add $0x1,%rdx 15: 48 83 c3 01 add $0x1,%rbx 19: 48 89 d0 mov %rdx,%rax 1c: 48 29 e8 sub %rbp,%rax 1f: 84 c9 test %cl,%cl 21: 74 2e je 0x51 23: 4c 39 e0 cmp %r12,%rax 26: 7d 29 jge 0x51 28: 89 f0 mov %esi,%eax * 2a: 8a 0a mov (%rdx),%cl <-- trapping instruction 2c: 85 c0 test %eax,%eax 2e: 88 0b mov %cl,(%rbx) 30: 74 df je 0x11 32: 65 48 8b 04 25 00 af mov %gs:0x1af00,%rax 39: 01 00 3b: 83 .byte 0x83 3c: a8 f8 test $0xf8,%al 3e: 15 .byte 0x15