BUG: unable to handle page fault for address: ffffc90000f4e030 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 10000067 P4D 10000067 PUD 101ab067 PMD 10e17067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 4899 Comm: systemd-udevd Not tainted 5.11.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline] RIP: 0010:__bpf_trace_run kernel/trace/bpf_trace.c:2088 [inline] RIP: 0010:bpf_trace_run3+0x143/0x3f0 kernel/trace/bpf_trace.c:2126 Code: f7 ff 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 9f 02 00 00 48 8d 73 38 48 8d 7c 24 28 53 30 e8 f5 1d f7 ff e8 20 50 70 07 31 ff 89 c3 89 c6 e8 65 25 RSP: 0018:ffffc900015ef230 EFLAGS: 00010086 RAX: 0000000000000000 RBX: ffffc90000f4e000 RCX: ffffffff817b5a3e RDX: 0000000000000000 RSI: ffffc90000f4e038 RDI: ffffc900015ef258 RBP: 1ffff920002bde47 R08: 0000000000000000 R09: ffffffff8cef564f R10: ffffffff817b5735 R11: 0000000000000000 R12: 0000000000000000 R13: ffff888019850000 R14: 0000000000000001 R15: ffff888016ae0000 FS: 00007fe0388df8c0(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90000f4e030 CR3: 00000000120b8000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __bpf_trace_sched_switch+0xdc/0x120 include/trace/events/sched.h:222 __traceiter_sched_switch+0x64/0xb0 include/trace/events/sched.h:222 trace_sched_switch include/trace/events/sched.h:222 [inline] __schedule+0x11a6/0x21a0 kernel/sched/core.c:5061 preempt_schedule_irq+0x4e/0x90 kernel/sched/core.c:5326 irqentry_exit_cond_resched kernel/entry/common.c:393 [inline] irqentry_exit_cond_resched kernel/entry/common.c:385 [inline] irqentry_exit+0x7a/0xa0 kernel/entry/common.c:423 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:628 RIP: 0010:check_kcov_mode+0x2c/0x40 kernel/kcov.c:174 Code: 05 39 82 8f 7e 89 c2 81 e2 00 01 00 00 a9 00 01 ff 00 74 10 31 c0 85 d2 74 15 8b 96 cc 14 00 00 85 d2 74 0b 8b 86 a8 14 00 00 <39> f8 0f 94 c0 c3 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 31 c0 RSP: 0018:ffffc900015ef598 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 000000000000000d RCX: ffff888019850000 RDX: 0000000000000000 RSI: ffff888019850000 RDI: 0000000000000003 RBP: ffff888021518000 R08: 0000000000000000 R09: 000000000000000d R10: ffffffff8385d2fa R11: 0000000000000010 R12: 0000000000000004 R13: 000000000000008c R14: dffffc0000000000 R15: 0000000000000000 write_comp_data kernel/kcov.c:218 [inline] __sanitizer_cov_trace_const_cmp1+0x22/0x80 kernel/kcov.c:270 tomoyo_domain_quota_is_ok+0x32a/0x550 security/tomoyo/util.c:1092 tomoyo_supervisor+0x2f2/0xef0 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x270/0x3a0 security/tomoyo/file.c:573 tomoyo_check_open_permission+0x33e/0x380 security/tomoyo/file.c:777 tomoyo_file_open security/tomoyo/tomoyo.c:313 [inline] tomoyo_file_open+0xa3/0xd0 security/tomoyo/tomoyo.c:308 security_file_open+0x52/0x4f0 security/security.c:1576 do_dentry_open+0x358/0x11b0 fs/open.c:804 do_open fs/namei.c:3254 [inline] path_openat+0x1b9a/0x2730 fs/namei.c:3371 do_filp_open+0x17e/0x3c0 fs/namei.c:3398 do_sys_openat2+0x16d/0x420 fs/open.c:1172 do_sys_open fs/open.c:1188 [inline] __do_sys_open fs/open.c:1196 [inline] __se_sys_open fs/open.c:1192 [inline] __x64_sys_open+0x119/0x1c0 fs/open.c:1192 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fe03772a9b1 Code: f7 d8 bf ff ff ff ff 64 89 02 eb cb 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 80 3f 00 74 1b be 00 08 09 00 b8 02 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 1f 89 c7 e9 00 ff ff ff 48 8b 05 b1 54 2e 00 RSP: 002b:00007ffefb6773e8 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 000056015dec8f10 RCX: 00007fe03772a9b1 RDX: 00000000000000ff RSI: 0000000000090800 RDI: 000056015deb0160 RBP: 00007fe0388df710 R08: 000056015deb0530 R09: 0000000000001010 R10: 00007fe037a10b58 R11: 0000000000000202 R12: 0000000000000000 R13: 000056015deb0160 R14: 00000000000000ff R15: 000056015deb0160 Modules linked in: CR2: ffffc90000f4e030 ---[ end trace 33291db73f28d37e ]--- RIP: 0010:bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline] RIP: 0010:__bpf_trace_run kernel/trace/bpf_trace.c:2088 [inline] RIP: 0010:bpf_trace_run3+0x143/0x3f0 kernel/trace/bpf_trace.c:2126 Code: f7 ff 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 9f 02 00 00 48 8d 73 38 48 8d 7c 24 28 53 30 e8 f5 1d f7 ff e8 20 50 70 07 31 ff 89 c3 89 c6 e8 65 25 RSP: 0018:ffffc900015ef230 EFLAGS: 00010086 RAX: 0000000000000000 RBX: ffffc90000f4e000 RCX: ffffffff817b5a3e RDX: 0000000000000000 RSI: ffffc90000f4e038 RDI: ffffc900015ef258 RBP: 1ffff920002bde47 R08: 0000000000000000 R09: ffffffff8cef564f R10: ffffffff817b5735 R11: 0000000000000000 R12: 0000000000000000 R13: ffff888019850000 R14: 0000000000000001 R15: ffff888016ae0000 FS: 00007fe0388df8c0(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90000f4e030 CR3: 00000000120b8000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400