BUG: unable to handle page fault for address: ffffffffff600000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 2c24067 P4D 2c24067 PUD 2c26067 PMD 2c49067 PTE 0 Oops: 0000 [#1] SMP CPU: 0 PID: 2136 Comm: udevd Not tainted 5.11.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 RIP: 0010:copy_from_kernel_nofault mm/maccess.c:31 [inline] RIP: 0010:copy_from_kernel_nofault+0x4e/0xf0 mm/maccess.c:25 Code: 25 40 6f 01 00 83 80 f8 14 00 00 01 49 83 fc 07 76 3f 31 c9 eb 12 49 83 ec 08 48 83 c5 08 48 83 c3 08 49 83 fc 07 76 29 89 c8 <48> 8b 13 85 c0 48 89 55 00 74 e1 65 48 8b 04 25 40 6f 01 00 83 a8 RSP: 0018:ffffc90006afbaf0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffffffffff600000 RCX: 0000000000000000 RDX: 00007fffffffffff RSI: 0000000000000008 RDI: ffffffffff600000 RBP: ffffc90006afbb70 R08: 0000000000000246 R09: 0000000000000000 R10: 0000000000000000 R11: ffff88810ca19e00 R12: 0000000000000008 R13: ffffffffff600000 R14: ffff88810c7c3000 R15: 0000000000000001 FS: 00007f368af30c80(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600000 CR3: 000000010c822000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_probe_read_kernel_common kernel/trace/bpf_trace.c:225 [inline] ____bpf_probe_read_kernel kernel/trace/bpf_trace.c:237 [inline] bpf_probe_read_kernel+0x2e/0x60 kernel/trace/bpf_trace.c:234 ___bpf_prog_run+0xe0/0x19a0 kernel/bpf/core.c:1513 __bpf_prog_run32+0x34/0x60 kernel/bpf/core.c:1678 bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2088 [inline] bpf_trace_run2+0x52/0xc0 kernel/trace/bpf_trace.c:2125 trace_kfree include/trace/events/kmem.h:138 [inline] kfree+0x1e0/0x500 mm/slub.c:4108 tomoyo_realpath_from_path+0x37/0x180 security/tomoyo/realpath.c:253 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_perm+0xe9/0x1e0 security/tomoyo/file.c:822 security_inode_getattr+0x25/0x40 security/security.c:1280 vfs_getattr fs/stat.c:121 [inline] vfs_statx+0x80/0x120 fs/stat.c:189 vfs_fstatat fs/stat.c:207 [inline] __do_sys_newfstatat+0x31/0x70 fs/stat.c:376 do_syscall_64+0x2e/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f368b05b5f4 Code: 64 c7 00 09 00 00 00 83 c8 ff c3 48 89 f2 b9 00 01 00 00 48 89 fe bf 9c ff ff ff e9 00 00 00 00 41 89 ca b8 06 01 00 00 0f 05 <45> 31 c0 3d 00 f0 ff ff 76 10 48 8b 15 03 a8 0d 00 f7 d8 41 83 c8 RSP: 002b:00007ffddb88b908 EFLAGS: 00000206 ORIG_RAX: 0000000000000106 RAX: ffffffffffffffda RBX: 00007f368b133460 RCX: 00007f368b05b5f4 RDX: 00007ffddb88b910 RSI: 00007f368b0f8130 RDI: 000000000000000c RBP: 0000559f401c5ea0 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000001000 R11: 0000000000000206 R12: 0000000000000006 R13: 0000000000000006 R14: 0000559f401c5ea0 R15: 0000000000000000 Modules linked in: CR2: ffffffffff600000 ---[ end trace 0b9394f3a8b89183 ]--- RIP: 0010:copy_from_kernel_nofault mm/maccess.c:31 [inline] RIP: 0010:copy_from_kernel_nofault+0x4e/0xf0 mm/maccess.c:25 Code: 25 40 6f 01 00 83 80 f8 14 00 00 01 49 83 fc 07 76 3f 31 c9 eb 12 49 83 ec 08 48 83 c5 08 48 83 c3 08 49 83 fc 07 76 29 89 c8 <48> 8b 13 85 c0 48 89 55 00 74 e1 65 48 8b 04 25 40 6f 01 00 83 a8 RSP: 0018:ffffc90006afbaf0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffffffffff600000 RCX: 0000000000000000 RDX: 00007fffffffffff RSI: 0000000000000008 RDI: ffffffffff600000 RBP: ffffc90006afbb70 R08: 0000000000000246 R09: 0000000000000000 R10: 0000000000000000 R11: ffff88810ca19e00 R12: 0000000000000008 R13: ffffffffff600000 R14: ffff88810c7c3000 R15: 0000000000000001 FS: 00007f368af30c80(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600000 CR3: 000000010c822000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 25 40 6f 01 00 and $0x16f40,%eax 5: 83 80 f8 14 00 00 01 addl $0x1,0x14f8(%rax) c: 49 83 fc 07 cmp $0x7,%r12 10: 76 3f jbe 0x51 12: 31 c9 xor %ecx,%ecx 14: eb 12 jmp 0x28 16: 49 83 ec 08 sub $0x8,%r12 1a: 48 83 c5 08 add $0x8,%rbp 1e: 48 83 c3 08 add $0x8,%rbx 22: 49 83 fc 07 cmp $0x7,%r12 26: 76 29 jbe 0x51 28: 89 c8 mov %ecx,%eax * 2a: 48 8b 13 mov (%rbx),%rdx <-- trapping instruction 2d: 85 c0 test %eax,%eax 2f: 48 89 55 00 mov %rdx,0x0(%rbp) 33: 74 e1 je 0x16 35: 65 48 8b 04 25 40 6f mov %gs:0x16f40,%rax 3c: 01 00 3e: 83 .byte 0x83 3f: a8 .byte 0xa8