BUG: unable to handle page fault for address: ffffc90000cd6030 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 10000067 P4D 10000067 PUD 101ab067 PMD 10a9e067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 14467 Comm: systemd-udevd Not tainted 5.11.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline] RIP: 0010:__bpf_trace_run kernel/trace/bpf_trace.c:2088 [inline] RIP: 0010:bpf_trace_run3+0x143/0x3f0 kernel/trace/bpf_trace.c:2126 Code: f7 ff 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 9f 02 00 00 48 8d 73 38 48 8d 7c 24 28 53 30 e8 45 1b f7 ff e8 b0 42 7e 07 31 ff 89 c3 89 c6 e8 b5 22 RSP: 0018:ffffc900021ff240 EFLAGS: 00010082 RAX: 0000000000000000 RBX: ffffc90000cd6000 RCX: ffffffff817bb2ce RDX: 0000000000000000 RSI: ffffc90000cd6038 RDI: ffffc900021ff268 RBP: 1ffff9200043fe49 R08: 0000000000000000 R09: ffffffff8d03928f R10: ffffffff817bafc5 R11: 0000000000000000 R12: 0000000000000000 R13: ffff8880205d1bc0 R14: 0000000000000001 R15: ffff888010da0000 FS: 00007f8250d4f8c0(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90000cd6030 CR3: 00000000781c3000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __bpf_trace_sched_switch+0xdc/0x120 include/trace/events/sched.h:222 __traceiter_sched_switch+0x64/0xb0 include/trace/events/sched.h:222 trace_sched_switch include/trace/events/sched.h:222 [inline] __schedule+0x11a6/0x21a0 kernel/sched/core.c:5061 preempt_schedule_irq+0x4e/0x90 kernel/sched/core.c:5326 irqentry_exit_cond_resched kernel/entry/common.c:393 [inline] irqentry_exit_cond_resched kernel/entry/common.c:385 [inline] irqentry_exit+0x7a/0xa0 kernel/entry/common.c:423 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:628 RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 kernel/kcov.c:197 Code: 81 e1 00 01 00 00 65 48 8b 14 25 00 f0 01 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 cc 14 00 00 85 c0 74 2b 8b 82 a8 14 00 00 <83> f8 02 75 20 48 8b 8a b0 14 00 00 8b 92 ac 14 00 00 48 8b 01 48 RSP: 0018:ffffc900021ff5a8 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff8880205d1bc0 RSI: ffffffff838887ea RDI: 0000000000000003 RBP: ffff8880116bd980 R08: 0000000000000000 R09: ffffffff83888699 R10: ffffffff838887d7 R11: 0000000000000000 R12: 0000000000000026 R13: 0000000000000315 R14: dffffc0000000000 R15: 0000000000000000 tomoyo_domain_quota_is_ok+0x31a/0x550 security/tomoyo/util.c:1092 tomoyo_supervisor+0x2f2/0xef0 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x270/0x3a0 security/tomoyo/file.c:573 tomoyo_check_open_permission+0x33e/0x380 security/tomoyo/file.c:777 tomoyo_file_open security/tomoyo/tomoyo.c:313 [inline] tomoyo_file_open+0xa3/0xd0 security/tomoyo/tomoyo.c:308 security_file_open+0x52/0x4f0 security/security.c:1576 do_dentry_open+0x358/0x11b0 fs/open.c:804 do_open fs/namei.c:3254 [inline] path_openat+0x1b9a/0x2730 fs/namei.c:3371 do_filp_open+0x17e/0x3c0 fs/namei.c:3398 do_sys_openat2+0x16d/0x420 fs/open.c:1172 do_sys_open fs/open.c:1188 [inline] __do_sys_open fs/open.c:1196 [inline] __se_sys_open fs/open.c:1192 [inline] __x64_sys_open+0x119/0x1c0 fs/open.c:1192 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f824fe96840 Code: 73 01 c3 48 8b 0d 68 77 20 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 89 bb 20 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 1e f6 ff ff 48 89 04 24 RSP: 002b:00007ffe82557368 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 0000000000000702 RCX: 00007f824fe96840 RDX: 0000000000000002 RSI: 0000000000080000 RDI: 00007ffe82557370 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000012 R10: 0000000000000064 R11: 0000000000000246 R12: 00007ffe825583c0 R13: 00007ffe82559450 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: CR2: ffffc90000cd6030 ---[ end trace 34404c5749e68016 ]--- RIP: 0010:bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline] RIP: 0010:__bpf_trace_run kernel/trace/bpf_trace.c:2088 [inline] RIP: 0010:bpf_trace_run3+0x143/0x3f0 kernel/trace/bpf_trace.c:2126 Code: f7 ff 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 9f 02 00 00 48 8d 73 38 48 8d 7c 24 28 53 30 e8 45 1b f7 ff e8 b0 42 7e 07 31 ff 89 c3 89 c6 e8 b5 22 RSP: 0018:ffffc900021ff240 EFLAGS: 00010082 RAX: 0000000000000000 RBX: ffffc90000cd6000 RCX: ffffffff817bb2ce RDX: 0000000000000000 RSI: ffffc90000cd6038 RDI: ffffc900021ff268 RBP: 1ffff9200043fe49 R08: 0000000000000000 R09: ffffffff8d03928f R10: ffffffff817bafc5 R11: 0000000000000000 R12: 0000000000000000 R13: ffff8880205d1bc0 R14: 0000000000000001 R15: ffff888010da0000 FS: 00007f8250d4f8c0(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90000cd6030 CR3: 00000000781c3000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400