BUG: kernel NULL pointer dereference, address: 00000000000000c0 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 2955 Comm: systemd-journal Not tainted 5.16.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:qlink_to_object mm/kasan/quarantine.c:129 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:134 [inline] RIP: 0010:qlist_free_all+0x35/0xc0 mm/kasan/quarantine.c:165 Code: f5 48 83 ec 08 48 8b 37 48 85 f6 0f 84 96 00 00 00 49 be 00 00 00 00 00 ea ff ff 49 89 fd 49 bc 00 00 00 00 00 fc ff df eb 2d <48> 63 87 c0 00 00 00 48 c7 c2 35 5b be 81 4c 8b 3e 48 29 c6 48 89 RSP: 0018:ffffc90001aefa20 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: ffff888077f9a000 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffff888000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000002e R10: ffffffff8134de7a R11: 000000000000003f R12: dffffc0000000000 R13: ffffc90001aefa58 R14: ffffea0000000000 R15: ffff888000000000 FS: 00007f265dbe48c0(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000000c0 CR3: 000000007f3ff000 CR4: 00000000003526e0 Call Trace: kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:272 __kasan_slab_alloc+0xa2/0xc0 mm/kasan/common.c:444 kasan_slab_alloc include/linux/kasan.h:259 [inline] slab_post_alloc_hook mm/slab.h:519 [inline] slab_alloc_node mm/slub.c:3234 [inline] slab_alloc mm/slub.c:3242 [inline] __kmalloc+0x1e7/0x340 mm/slub.c:4419 kmalloc include/linux/slab.h:595 [inline] tomoyo_realpath_from_path+0xc3/0x620 security/tomoyo/realpath.c:254 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_perm+0x21b/0x400 security/tomoyo/file.c:822 security_inode_getattr+0xcf/0x140 security/security.c:1334 vfs_getattr fs/stat.c:157 [inline] vfs_fstat+0x43/0xb0 fs/stat.c:182 __do_sys_newfstat+0x81/0x100 fs/stat.c:422 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f265ce9f2e2 Code: 48 8b 05 b9 db 2b 00 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 83 ff 01 77 33 48 63 fe b8 05 00 00 00 48 89 d6 0f 05 <48> 3d 00 f0 ff ff 77 06 f3 c3 0f 1f 40 00 48 8b 15 81 db 2b 00 f7 RSP: 002b:00007ffcc1a5f0e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000005 RAX: ffffffffffffffda RBX: 00007f265d15a440 RCX: 00007f265ce9f2e2 RDX: 00007ffcc1a5f0f0 RSI: 00007ffcc1a5f0f0 RDI: 0000000000000015 RBP: 000055e249705a00 R08: 0000000000000b40 R09: 000055e249705c30 R10: 000055e249705a00 R11: 0000000000000246 R12: 0000000000000001 R13: 000000000000001b R14: 000055e249705c30 R15: 000000000000001b Modules linked in: CR2: 00000000000000c0 ---[ end trace e5be1023e1a20ca1 ]--- RIP: 0010:qlink_to_object mm/kasan/quarantine.c:129 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:134 [inline] RIP: 0010:qlist_free_all+0x35/0xc0 mm/kasan/quarantine.c:165 Code: f5 48 83 ec 08 48 8b 37 48 85 f6 0f 84 96 00 00 00 49 be 00 00 00 00 00 ea ff ff 49 89 fd 49 bc 00 00 00 00 00 fc ff df eb 2d <48> 63 87 c0 00 00 00 48 c7 c2 35 5b be 81 4c 8b 3e 48 29 c6 48 89 RSP: 0018:ffffc90001aefa20 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: ffff888077f9a000 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffff888000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000002e R10: ffffffff8134de7a R11: 000000000000003f R12: dffffc0000000000 R13: ffffc90001aefa58 R14: ffffea0000000000 R15: ffff888000000000 FS: 00007f265dbe48c0(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000000c0 CR3: 000000007f3ff000 CR4: 00000000003526e0 ---------------- Code disassembly (best guess): 0: f5 cmc 1: 48 83 ec 08 sub $0x8,%rsp 5: 48 8b 37 mov (%rdi),%rsi 8: 48 85 f6 test %rsi,%rsi b: 0f 84 96 00 00 00 je 0xa7 11: 49 be 00 00 00 00 00 movabs $0xffffea0000000000,%r14 18: ea ff ff 1b: 49 89 fd mov %rdi,%r13 1e: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12 25: fc ff df 28: eb 2d jmp 0x57 * 2a: 48 63 87 c0 00 00 00 movslq 0xc0(%rdi),%rax <-- trapping instruction 31: 48 c7 c2 35 5b be 81 mov $0xffffffff81be5b35,%rdx 38: 4c 8b 3e mov (%rsi),%r15 3b: 48 29 c6 sub %rax,%rsi 3e: 48 rex.W 3f: 89 .byte 0x89