BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 6493d067 P4D 6493d067 PUD 63ce8067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 2 PID: 11266 Comm: syz-executor.0 Not tainted 5.7.0-syzkaller #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 RIP: 0010:__read_once_size include/linux/compiler.h:252 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x43/0x60 kernel/kcov.c:202 Code: 24 74 0f 80 e6 01 74 35 8b 90 04 14 00 00 85 d2 74 2b 8b 90 e0 13 00 00 83 fa 02 75 20 48 8b 88 e8 13 00 00 8b 80 e4 13 00 00 <48> 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 c3 66 0f RSP: 0018:ffffc9000bd9fa18 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000002 RSI: ffffffff83639e74 RDI: 0000000000000001 RBP: ffff888026fc9c00 R08: ffff888063185680 R09: fffffbfff190e62d R10: ffffffff8c873167 R11: fffffbfff190e62c R12: 0000000000000100 R13: 0000000000000305 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88802d000000(0063) knlGS:00000000f5d86b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000062791000 CR4: 0000000000340ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: tomoyo_domain_quota_is_ok+0x2f4/0x500 security/tomoyo/util.c:1071 tomoyo_supervisor+0x2d5/0xf00 security/tomoyo/common.c:2089 tomoyo_audit_path_number_log security/tomoyo/file.c:235 [inline] tomoyo_path_number_perm+0x3e9/0x4d0 security/tomoyo/file.c:734 security_file_ioctl+0x6c/0xb0 security/security.c:1465 __do_compat_sys_ioctl fs/ioctl.c:826 [inline] __se_compat_sys_ioctl fs/ioctl.c:816 [inline] __ia32_compat_sys_ioctl+0xb6/0x2b0 fs/ioctl.c:816 do_syscall_32_irqs_on arch/x86/entry/common.c:337 [inline] do_fast_syscall_32+0x270/0xe90 arch/x86/entry/common.c:396 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 Modules linked in: CR2: 0000000000000000 ---[ end trace 125511f9378c41e5 ]--- RIP: 0010:__read_once_size include/linux/compiler.h:252 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x43/0x60 kernel/kcov.c:202 Code: 24 74 0f 80 e6 01 74 35 8b 90 04 14 00 00 85 d2 74 2b 8b 90 e0 13 00 00 83 fa 02 75 20 48 8b 88 e8 13 00 00 8b 80 e4 13 00 00 <48> 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 c3 66 0f RSP: 0018:ffffc9000bd9fa18 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000002 RSI: ffffffff83639e74 RDI: 0000000000000001 RBP: ffff888026fc9c00 R08: ffff888063185680 R09: fffffbfff190e62d R10: ffffffff8c873167 R11: fffffbfff190e62c R12: 0000000000000100 R13: 0000000000000305 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88802d000000(0063) knlGS:00000000f5d86b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000062791000 CR4: 0000000000340ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400