general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 8640 Comm: systemd-udevd Not tainted 5.8.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__switch_to_asm+0x0/0x40 arch/x86/entry/entry_64.S:228 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90018bcf728 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffff8880ae735e18 RCX: 0000000000000000 RDX: 1ffff11015ce6bc2 RSI: ffff8880868ee4c0 RDI: ffff8880561162c0 RBP: ffffc90018bcf7f8 R08: 0000000000000001 R09: ffff888056116b88 R10: fffffbfff155cb29 R11: 0000000000000000 R12: ffff8880ae735e00 R13: ffff8880561162c0 R14: ffff8880868ee4c0 R15: ffff8880561166f0 FS: 00007f3b96fdb8c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3b95ed04fb CR3: 000000008688a000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: context_switch kernel/sched/core.c:3453 [inline] __schedule+0x8e1/0x1eb0 kernel/sched/core.c:4178 preempt_schedule_irq+0xb0/0x150 kernel/sched/core.c:4436 idtentry_exit_cond_resched arch/x86/entry/common.c:621 [inline] idtentry_exit_cond_rcu+0xc0/0xf0 arch/x86/entry/common.c:668 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:596 RIP: 0010:check_kcov_mode kernel/kcov.c:163 [inline] RIP: 0010:write_comp_data+0x13/0x80 kernel/kcov.c:218 Code: 48 8b 80 f8 13 00 00 c3 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 49 89 f2 65 8b 05 16 4c 8e 7e 65 48 8b 34 25 00 ff 01 00 00 01 ff 00 74 0f f6 c4 01 74 59 8b 86 04 14 00 00 85 c0 74 4f RSP: 0018:ffffc90018bcf8f0 EFLAGS: 00000206 RAX: 0000000080000000 RBX: 0000000000000005 RCX: ffffffff8362656a RDX: 0000000000000005 RSI: ffff8880561162c0 RDI: 0000000000000001 RBP: ffff88809d5e1580 R08: 0000000000000001 R09: ffffffff8cab9727 R10: 0000000000000010 R11: 0000000000000000 R12: 0000000000000020 R13: 0000000000000329 R14: dffffc0000000000 R15: 0000000000000000 tomoyo_domain_quota_is_ok+0x32a/0x550 security/tomoyo/util.c:1070 tomoyo_supervisor+0x2d4/0xeb0 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x25c/0x360 security/tomoyo/file.c:573 tomoyo_path_perm+0x2e7/0x3f0 security/tomoyo/file.c:838 security_inode_getattr+0xcf/0x140 security/security.c:1278 vfs_getattr fs/stat.c:121 [inline] vfs_statx_fd+0x70/0xf0 fs/stat.c:151 vfs_fstat include/linux/fs.h:3312 [inline] __do_sys_newfstat+0x88/0x100 fs/stat.c:398 do_syscall_64+0x60/0xe0 arch/x86/entry/common.c:359 entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: unable to handle page fault for address: 0000000040000000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 8688b067 P4D 8688b067 PUD 0 Oops: 0002 [#2] PREEMPT SMP KASAN CPU: 1 PID: 8640 Comm: systemd-udevd Not tainted 5.8.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:in_gate_area_no_mm+0x0/0x6a arch/x86/entry/vsyscall/vsyscall_64.c:343 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90018bceda8 EFLAGS: 00010012 RAX: 0000000040000000 RBX: ffffc90018bcee48 RCX: ffffffff816a5e70 RDX: ffff8880561162c0 RSI: ffffffff816a5e9b RDI: 00007f3b95e4e2e2 RBP: 00007f3b95e4e2e2 R08: ffffc90018bcef58 R09: ffffffff8c8cc109 R10: 00007f3b95e4e2e2 R11: 0000000000000000 R12: ffffc90018bcef58 R13: 0000000000000001 R14: 00007f3b95e4e2e2 R15: ffffc90018bcee68 FS: 00007f3b96fdb8c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000040000000 CR3: 000000008688a000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: is_kernel include/linux/kallsyms.h:43 [inline] is_ksym_addr include/linux/kallsyms.h:49 [inline] kallsyms_lookup+0xc3/0x2e0 kernel/kallsyms.c:290 __sprint_symbol+0x9c/0x1c0 kernel/kallsyms.c:363 symbol_string+0x14c/0x370 lib/vsprintf.c:969 pointer+0x185/0x970 lib/vsprintf.c:2226 vsnprintf+0x5b2/0x14f0 lib/vsprintf.c:2624 vscnprintf+0x29/0x80 lib/vsprintf.c:2723 vprintk_store+0x44/0x4a0 kernel/printk/printk.c:1942 vprintk_emit+0x139/0x770 kernel/printk/printk.c:2003 vprintk_func+0x8f/0x1a6 kernel/printk/printk_safe.c:393 printk+0xba/0xed kernel/printk/printk.c:2070 show_ip+0x22/0x30 arch/x86/kernel/dumpstack.c:124 show_iret_regs+0x10/0x32 arch/x86/kernel/dumpstack.c:131 __show_regs+0x18/0x50 arch/x86/kernel/process_64.c:72 show_trace_log_lvl+0x255/0x2b4 arch/x86/kernel/dumpstack.c:274 show_regs arch/x86/kernel/dumpstack.c:408 [inline] __die_body arch/x86/kernel/dumpstack.c:393 [inline] die_addr.cold+0x8/0xd arch/x86/kernel/dumpstack.c:433 __exc_general_protection arch/x86/kernel/traps.c:593 [inline] exc_general_protection+0x193/0x2d0 arch/x86/kernel/traps.c:523 asm_exc_general_protection+0x1e/0x30 arch/x86/include/asm/idtentry.h:559 RIP: 0010:__switch_to_asm+0x0/0x40 arch/x86/entry/entry_64.S:228 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90018bcf728 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffff8880ae735e18 RCX: 0000000000000000 RDX: 1ffff11015ce6bc2 RSI: ffff8880868ee4c0 RDI: ffff8880561162c0 RBP: ffffc90018bcf7f8 R08: 0000000000000001 R09: ffff888056116b88 R10: fffffbfff155cb29 R11: 0000000000000000 R12: ffff8880ae735e00 R13: ffff8880561162c0 R14: ffff8880868ee4c0 R15: ffff8880561166f0 context_switch kernel/sched/core.c:3453 [inline] __schedule+0x8e1/0x1eb0 kernel/sched/core.c:4178 preempt_schedule_irq+0xb0/0x150 kernel/sched/core.c:4436 idtentry_exit_cond_resched arch/x86/entry/common.c:621 [inline] idtentry_exit_cond_rcu+0xc0/0xf0 arch/x86/entry/common.c:668 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:596 RIP: 0010:check_kcov_mode kernel/kcov.c:163 [inline] RIP: 0010:write_comp_data+0x13/0x80 kernel/kcov.c:218 Code: 48 8b 80 f8 13 00 00 c3 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 49 89 f2 65 8b 05 16 4c 8e 7e 65 48 8b 34 25 00 ff 01 00 00 01 ff 00 74 0f f6 c4 01 74 59 8b 86 04 14 00 00 85 c0 74 4f RSP: 0018:ffffc90018bcf8f0 EFLAGS: 00000206 RAX: 0000000080000000 RBX: 0000000000000005 RCX: ffffffff8362656a RDX: 0000000000000005 RSI: ffff8880561162c0 RDI: 0000000000000001 RBP: ffff88809d5e1580 R08: 0000000000000001 R09: ffffffff8cab9727 R10: 0000000000000010 R11: 0000000000000000 R12: 0000000000000020 R13: 0000000000000329 R14: dffffc0000000000 R15: 0000000000000000 tomoyo_domain_quota_is_ok+0x32a/0x550 security/tomoyo/util.c:1070 tomoyo_supervisor+0x2d4/0xeb0 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x25c/0x360 security/tomoyo/file.c:573 tomoyo_path_perm+0x2e7/0x3f0 security/tomoyo/file.c:838 security_inode_getattr+0xcf/0x140 security/security.c:1278 vfs_getattr fs/stat.c:121 [inline] vfs_statx_fd+0x70/0xf0 fs/stat.c:151 vfs_fstat include/linux/fs.h:3312 [inline] __do_sys_newfstat+0x88/0x100 fs/stat.c:398 do_syscall_64+0x60/0xe0 arch/x86/entry/common.c:359 entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: unable to handle page fault for address: 0000000040000000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 8688b067 P4D 8688b067 PUD 0 Oops: 0002 [#3] PREEMPT SMP KASAN CPU: 1 PID: 8640 Comm: systemd-udevd Not tainted 5.8.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:in_gate_area_no_mm+0x0/0x6a arch/x86/entry/vsyscall/vsyscall_64.c:343 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90018bce290 EFLAGS: 00010012 RAX: 0000000040000000 RBX: ffffc90018bce330 RCX: ffffffff816a5e70 RDX: ffff8880561162c0 RSI: ffffffff816a5e9b RDI: 00007f3b95e4e2e2 RBP: 00007f3b95e4e2e2 R08: ffffc90018bce440 R09: ffff8880ae7243bb R10: 00007f3b95e4e2e2 R11: 0000000000000001 R12: ffffc90018bce440 R13: 0000000000000001 R14: 00007f3b95e4e2e2 R15: ffffc90018bce350 FS: 00007f3b96fdb8c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000040000000 CR3: 000000008688a000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: is_kernel include/linux/kallsyms.h:43 [inline] is_ksym_addr include/linux/kallsyms.h:49 [inline] kallsyms_lookup+0xc3/0x2e0 kernel/kallsyms.c:290 __sprint_symbol+0x9c/0x1c0 kernel/kallsyms.c:363 symbol_string+0x14c/0x370 lib/vsprintf.c:969 pointer+0x185/0x970 lib/vsprintf.c:2226 vsnprintf+0x5b2/0x14f0 lib/vsprintf.c:2624 vscnprintf+0x29/0x80 lib/vsprintf.c:2723 printk_safe_log_store+0xf5/0x250 kernel/printk/printk_safe.c:94 vprintk_safe kernel/printk/printk_safe.c:347 [inline] vprintk_func+0xef/0x1a6 kernel/printk/printk_safe.c:390 printk+0xba/0xed kernel/printk/printk.c:2070 show_ip+0x22/0x30 arch/x86/kernel/dumpstack.c:124 show_iret_regs+0x10/0x32 arch/x86/kernel/dumpstack.c:131 __show_regs+0x18/0x50 arch/x86/kernel/process_64.c:72 show_trace_log_lvl+0x255/0x2b4 arch/x86/kernel/dumpstack.c:274 show_regs arch/x86/kernel/dumpstack.c:447 [inline] __die_body arch/x86/kernel/dumpstack.c:393 [inline] __die+0x51/0x90 arch/x86/kernel/dumpstack.c:407 no_context+0x56b/0x9f0 arch/x86/mm/fault.c:695 __bad_area_nosemaphore+0xa9/0x480 arch/x86/mm/fault.c:789 do_user_addr_fault+0x783/0xd00 arch/x86/mm/fault.c:1171 handle_page_fault arch/x86/mm/fault.c:1365 [inline] exc_page_fault+0xab/0x170 arch/x86/mm/fault.c:1418 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:565 RIP: 0010:in_gate_area_no_mm+0x0/0x6a arch/x86/entry/vsyscall/vsyscall_64.c:343 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90018bceda8 EFLAGS: 00010012 RAX: 0000000040000000 RBX: ffffc90018bcee48 RCX: ffffffff816a5e70 RDX: ffff8880561162c0 RSI: ffffffff816a5e9b RDI: 00007f3b95e4e2e2 RBP: 00007f3b95e4e2e2 R08: ffffc90018bcef58 R09: ffffffff8c8cc Lost 130 message(s)!