general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 9607 Comm: systemd-udevd Not tainted 5.8.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__switch_to_asm+0x0/0x40 arch/x86/entry/entry_64.S:228 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90008e8f728 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffff8880ae735e18 RCX: 0000000000000000 RDX: 1ffff11015ce6bc2 RSI: ffff888053dc61c0 RDI: ffff88805014a180 RBP: ffffc90008e8f7f8 R08: 0000000000000001 R09: ffff88805014aa48 R10: fffffbfff155cb09 R11: 0000000000000000 R12: ffff8880ae735e00 R13: ffff88805014a180 R14: ffff888053dc61c0 R15: ffff88805014a5b0 FS: 00007fd30202c8c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd301e15028 CR3: 0000000053db2000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: context_switch kernel/sched/core.c:3453 [inline] __schedule+0x8e1/0x1eb0 kernel/sched/core.c:4178 preempt_schedule_irq+0xb0/0x150 kernel/sched/core.c:4436 idtentry_exit_cond_resched arch/x86/entry/common.c:621 [inline] idtentry_exit_cond_rcu+0xc0/0xf0 arch/x86/entry/common.c:668 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:596 RIP: 0010:tomoyo_domain_quota_is_ok+0x307/0x550 security/tomoyo/util.c:1071 Code: 41 5d 41 5e 41 5f c3 41 bc 01 00 00 00 31 db e8 9f 55 11 fe 89 d9 44 89 e0 31 ff d3 f8 83 e0 01 41 89 c7 89 c6 e8 09 52 11 fe <45> 85 ff 74 09 e8 7f 55 11 fe 41 83 c5 01 e8 76 55 11 fe 8d 73 01 RSP: 0018:ffffc90008e8f8f8 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 0000000000000005 RCX: ffffffff83626197 RDX: 0000000000000001 RSI: ffff88805014a180 RDI: 0000000000000005 RBP: ffff88809ee80500 R08: 0000000000000001 R09: ffffffff8cab9727 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000020 R13: 000000000000021f R14: dffffc0000000000 R15: 0000000000000001 tomoyo_supervisor+0x2d4/0xeb0 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x25c/0x360 security/tomoyo/file.c:573 tomoyo_path_perm+0x2e7/0x3f0 security/tomoyo/file.c:838 security_inode_getattr+0xcf/0x140 security/security.c:1278 vfs_getattr fs/stat.c:121 [inline] vfs_statx_fd+0x70/0xf0 fs/stat.c:151 vfs_fstat include/linux/fs.h:3312 [inline] __do_sys_newfstat+0x88/0x100 fs/stat.c:398 do_syscall_64+0x60/0xe0 arch/x86/entry/common.c:359 entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: unable to handle page fault for address: 0000000040000000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 53db3067 P4D 53db3067 PUD 0 Oops: 0002 [#2] PREEMPT SMP KASAN CPU: 1 PID: 9607 Comm: systemd-udevd Not tainted 5.8.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:in_gate_area_no_mm+0x0/0x6a arch/x86/entry/vsyscall/vsyscall_64.c:343 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90008e8eda8 EFLAGS: 00010012 RAX: 0000000040000000 RBX: ffffc90008e8ee48 RCX: ffffffff816a5e30 RDX: ffff88805014a180 RSI: ffffffff816a5e5b RDI: 00007fd300e9f2e2 RBP: 00007fd300e9f2e2 R08: ffffc90008e8ef58 R09: ffffffff8c8cc109 R10: 00007fd300e9f2e2 R11: 0000000000000000 R12: ffffc90008e8ef58 R13: 0000000000000001 R14: 00007fd300e9f2e2 R15: ffffc90008e8ee68 FS: 00007fd30202c8c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000040000000 CR3: 0000000053db2000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: is_kernel include/linux/kallsyms.h:43 [inline] is_ksym_addr include/linux/kallsyms.h:49 [inline] kallsyms_lookup+0xc3/0x2e0 kernel/kallsyms.c:290 __sprint_symbol+0x9c/0x1c0 kernel/kallsyms.c:363 symbol_string+0x14c/0x370 lib/vsprintf.c:969 pointer+0x185/0x970 lib/vsprintf.c:2226 vsnprintf+0x5b2/0x14f0 lib/vsprintf.c:2624 vscnprintf+0x29/0x80 lib/vsprintf.c:2723 vprintk_store+0x44/0x4a0 kernel/printk/printk.c:1942 vprintk_emit+0x139/0x770 kernel/printk/printk.c:2003 vprintk_func+0x8f/0x1a6 kernel/printk/printk_safe.c:393 printk+0xba/0xed kernel/printk/printk.c:2070 show_ip+0x22/0x30 arch/x86/kernel/dumpstack.c:124 show_iret_regs+0x10/0x32 arch/x86/kernel/dumpstack.c:131 __show_regs+0x18/0x50 arch/x86/kernel/process_64.c:72 show_trace_log_lvl+0x255/0x2b4 arch/x86/kernel/dumpstack.c:274 show_regs arch/x86/kernel/dumpstack.c:408 [inline] __die_body arch/x86/kernel/dumpstack.c:393 [inline] die_addr.cold+0x8/0xd arch/x86/kernel/dumpstack.c:433 __exc_general_protection arch/x86/kernel/traps.c:593 [inline] exc_general_protection+0x193/0x2d0 arch/x86/kernel/traps.c:523 asm_exc_general_protection+0x1e/0x30 arch/x86/include/asm/idtentry.h:559 RIP: 0010:__switch_to_asm+0x0/0x40 arch/x86/entry/entry_64.S:228 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90008e8f728 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffff8880ae735e18 RCX: 0000000000000000 RDX: 1ffff11015ce6bc2 RSI: ffff888053dc61c0 RDI: ffff88805014a180 RBP: ffffc90008e8f7f8 R08: 0000000000000001 R09: ffff88805014aa48 R10: fffffbfff155cb09 R11: 0000000000000000 R12: ffff8880ae735e00 R13: ffff88805014a180 R14: ffff888053dc61c0 R15: ffff88805014a5b0 context_switch kernel/sched/core.c:3453 [inline] __schedule+0x8e1/0x1eb0 kernel/sched/core.c:4178 preempt_schedule_irq+0xb0/0x150 kernel/sched/core.c:4436 idtentry_exit_cond_resched arch/x86/entry/common.c:621 [inline] idtentry_exit_cond_rcu+0xc0/0xf0 arch/x86/entry/common.c:668 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:596 RIP: 0010:tomoyo_domain_quota_is_ok+0x307/0x550 security/tomoyo/util.c:1071 Code: 41 5d 41 5e 41 5f c3 41 bc 01 00 00 00 31 db e8 9f 55 11 fe 89 d9 44 89 e0 31 ff d3 f8 83 e0 01 41 89 c7 89 c6 e8 09 52 11 fe <45> 85 ff 74 09 e8 7f 55 11 fe 41 83 c5 01 e8 76 55 11 fe 8d 73 01 RSP: 0018:ffffc90008e8f8f8 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 0000000000000005 RCX: ffffffff83626197 RDX: 0000000000000001 RSI: ffff88805014a180 RDI: 0000000000000005 RBP: ffff88809ee80500 R08: 0000000000000001 R09: ffffffff8cab9727 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000020 R13: 000000000000021f R14: dffffc0000000000 R15: 0000000000000001 tomoyo_supervisor+0x2d4/0xeb0 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x25c/0x360 security/tomoyo/file.c:573 tomoyo_path_perm+0x2e7/0x3f0 security/tomoyo/file.c:838 security_inode_getattr+0xcf/0x140 security/security.c:1278 vfs_getattr fs/stat.c:121 [inline] vfs_statx_fd+0x70/0xf0 fs/stat.c:151 vfs_fstat include/linux/fs.h:3312 [inline] __do_sys_newfstat+0x88/0x100 fs/stat.c:398 do_syscall_64+0x60/0xe0 arch/x86/entry/common.c:359 entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: unable to handle page fault for address: 0000000040000000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 53db3067 P4D 53db3067 PUD 0 Oops: 0002 [#3] PREEMPT SMP KASAN CPU: 1 PID: 9607 Comm: systemd-udevd Not tainted 5.8.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:in_gate_area_no_mm+0x0/0x6a arch/x86/entry/vsyscall/vsyscall_64.c:343 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90008e8e290 EFLAGS: 00010012 RAX: 0000000040000000 RBX: ffffc90008e8e330 RCX: ffffffff816a5e30 RDX: ffff88805014a180 RSI: ffffffff816a5e5b RDI: 00007fd300e9f2e2 RBP: 00007fd300e9f2e2 R08: ffffc90008e8e440 R09: ffff8880ae72435e R10: 00007fd300e9f2e2 R11: 0000000000000001 R12: ffffc90008e8e440 R13: 0000000000000001 R14: 00007fd300e9f2e2 R15: ffffc90008e8e350 FS: 00007fd30202c8c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000040000000 CR3: 0000000053db2000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: is_kernel include/linux/kallsyms.h:43 [inline] is_ksym_addr include/linux/kallsyms.h:49 [inline] kallsyms_lookup+0xc3/0x2e0 kernel/kallsyms.c:290 __sprint_symbol+0x9c/0x1c0 kernel/kallsyms.c:363 symbol_string+0x14c/0x370 lib/vsprintf.c:969 pointer+0x185/0x970 lib/vsprintf.c:2226 vsnprintf+0x5b2/0x14f0 lib/vsprintf.c:2624 vscnprintf+0x29/0x80 lib/vsprintf.c:2723 printk_safe_log_store+0xf5/0x250 kernel/printk/printk_safe.c:94 vprintk_safe kernel/printk/printk_safe.c:347 [inline] vprintk_func+0xef/0x1a6 kernel/printk/printk_safe.c:390 printk+0xba/0xed kernel/printk/printk.c:2070 show_ip+0x22/0x30 arch/x86/kernel/dumpstack.c:124 show_iret_regs+0x10/0x32 arch/x86/kernel/dumpstack.c:131 __show_regs+0x18/0x50 arch/x86/kernel/process_64.c:72 show_trace_log_lvl+0x255/0x2b4 arch/x86/kernel/dumpstack.c:274 show_regs arch/x86/kernel/dumpstack.c:447 [inline] __die_body arch/x86/kernel/dumpstack.c:393 [inline] __die+0x51/0x90 arch/x86/kernel/dumpstack.c:407 no_context+0x56b/0x9f0 arch/x86/mm/fault.c:695 __bad_area_nosemaphore+0xa9/0x480 arch/x86/mm/fault.c:789 do_user_addr_fault+0x783/0xd00 arch/x86/mm/fault.c:1171 handle_page_fault arch/x86/mm/fault.c:1365 [inline] exc_page_fault+0xab/0x170 arch/x86/mm/fault.c:1418 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:565 RIP: 0010:in_gate_area_no_mm+0x0/0x6a arch/x86/entry/vsyscall/vsyscall_64.c:343 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90008e8eda8 EFLAGS: 00010012 RAX: 0000000040000000 RBX: ffffc90008e8ee48 RCX: ffffffff816a5e30 RDX: ffff88805014a180 RSI: ffffffff816a5e5b RDI: 00007fd300e9f2e2 RBP: 00007fd300e9f2e2 R08: ffffc90008e8ef58 R09: ffffffff8c8cc109 R10: 00007fd300e9f2e2 R11: 0000000000000000 R12: ffffc90008e8ef58 R13: 0000000000000001 R Lost 124 message(s)!