BUG: unable to handle page fault for address: ffffc90000ca2030 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 10000067 P4D 10000067 PUD 101aa067 PMD 10a9d067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 8631 Comm: systemd-udevd Not tainted 5.10.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline] RIP: 0010:__bpf_trace_run kernel/trace/bpf_trace.c:2088 [inline] RIP: 0010:bpf_trace_run3+0x143/0x3f0 kernel/trace/bpf_trace.c:2126 Code: f7 ff 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 9f 02 00 00 48 8d 73 38 48 8d 7c 24 28 53 30 e8 f5 2a f7 ff e8 70 f6 6a 07 31 ff 89 c3 89 c6 e8 35 23 RSP: 0018:ffffc90001a2f5b0 EFLAGS: 00010082 RAX: 0000000000000000 RBX: ffffc90000ca2000 RCX: ffffffff817974fe RDX: 0000000000000000 RSI: ffffc90000ca2038 RDI: ffffc90001a2f5d8 RBP: 1ffff92000345eb7 R08: 0000000000000000 R09: ffffffff8eb907a7 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 R13: ffff8880186f1ac0 R14: 0000000000000001 R15: ffff88801fcc8000 FS: 00007f78b86908c0(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90000ca2030 CR3: 00000000a2ccc000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: __bpf_trace_sched_switch+0xdc/0x120 include/trace/events/sched.h:222 __traceiter_sched_switch+0x64/0xb0 include/trace/events/sched.h:222 trace_sched_switch include/trace/events/sched.h:222 [inline] __schedule+0x1165/0x2150 kernel/sched/core.c:5075 preempt_schedule_irq+0x4e/0x90 kernel/sched/core.c:5340 irqentry_exit_cond_resched kernel/entry/common.c:393 [inline] irqentry_exit_cond_resched kernel/entry/common.c:385 [inline] irqentry_exit+0x7a/0xa0 kernel/entry/common.c:423 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:628 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:196 Code: fc ff ff 48 c7 c7 c0 fb 38 8b 48 89 54 24 08 48 89 34 24 e8 02 4f 60 02 48 8b 54 24 08 48 8b 34 24 e9 a1 fd ff ff 0f 1f 40 00 <65> 48 8b 14 25 00 f0 01 00 65 8b 05 50 52 91 7e a9 00 01 ff 00 48 RSP: 0018:ffffc90001a2f910 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 000000000000000f RCX: ffffffff83822447 RDX: 0000000000000000 RSI: ffff8880186f1ac0 RDI: 0000000000000005 RBP: ffff888024cec800 R08: 0000000000000001 R09: ffffffff8f05bf87 R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000026 R13: 0000000000000224 R14: dffffc0000000000 R15: 0000000000000000 tomoyo_domain_quota_is_ok+0x31a/0x550 security/tomoyo/util.c:1092 tomoyo_supervisor+0x2f2/0xef0 security/tomoyo/common.c:2089 tomoyo_audit_path_number_log security/tomoyo/file.c:235 [inline] tomoyo_path_number_perm+0x419/0x590 security/tomoyo/file.c:734 security_path_chmod+0xe0/0x150 security/security.c:1153 chmod_common+0x156/0x3f0 fs/open.c:578 vfs_fchmod fs/open.c:598 [inline] __do_sys_fchmod fs/open.c:607 [inline] __se_sys_fchmod fs/open.c:601 [inline] __x64_sys_fchmod+0x10e/0x190 fs/open.c:601 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f78b75035c7 Code: 73 01 c3 48 8b 0d d1 d8 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 5b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a1 d8 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffdb1f6b8f8 EFLAGS: 00000206 ORIG_RAX: 000000000000005b RAX: ffffffffffffffda RBX: 0000560d8a9c8840 RCX: 00007f78b75035c7 RDX: 0000000000000000 RSI: 00000000000001a4 RDI: 000000000000000f RBP: 00007ffdb1f6b9c0 R08: 0000560d8a9c8220 R09: 0000000000000230 R10: 0000000000000000 R11: 0000000000000206 R12: 00007ffdb1f6b900 R13: 0000000000000001 R14: 0000000000000000 R15: 000000000000000e Modules linked in: CR2: ffffc90000ca2030 ---[ end trace 90eaad98028cb1bc ]--- RIP: 0010:bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline] RIP: 0010:__bpf_trace_run kernel/trace/bpf_trace.c:2088 [inline] RIP: 0010:bpf_trace_run3+0x143/0x3f0 kernel/trace/bpf_trace.c:2126 Code: f7 ff 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 9f 02 00 00 48 8d 73 38 48 8d 7c 24 28 53 30 e8 f5 2a f7 ff e8 70 f6 6a 07 31 ff 89 c3 89 c6 e8 35 23 RSP: 0018:ffffc90001a2f5b0 EFLAGS: 00010082 RAX: 0000000000000000 RBX: ffffc90000ca2000 RCX: ffffffff817974fe RDX: 0000000000000000 RSI: ffffc90000ca2038 RDI: ffffc90001a2f5d8 RBP: 1ffff92000345eb7 R08: 0000000000000000 R09: ffffffff8eb907a7 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 R13: ffff8880186f1ac0 R14: 0000000000000001 R15: ffff88801fcc8000 FS: 00007f78b86908c0(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90000ca2030 CR3: 00000000a2ccc000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600