BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 63c4e067 P4D 63c4e067 PUD 62fa8067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 10214 Comm: syz-executor.3 Not tainted 5.7.0-syzkaller #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 RIP: 0010:__read_once_size include/linux/compiler.h:252 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x43/0x60 kernel/kcov.c:202 Code: 24 74 0f 80 e6 01 74 35 8b 90 04 14 00 00 85 d2 74 2b 8b 90 e0 13 00 00 83 fa 02 75 20 48 8b 88 e8 13 00 00 8b 80 e4 13 00 00 <48> 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 c3 66 0f RSP: 0018:ffffc900050df4e8 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000008 RCX: 0000000000000000 RDX: 0000000000000002 RSI: ffffffff83639e74 RDI: 0000000000000001 RBP: ffff8880283d3280 R08: ffff8880607cc940 R09: fffffbfff190e62d R10: ffffffff8c873167 R11: fffffbfff190e62c R12: 0000000000000100 R13: 00000000000002f9 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88802cf00000(0063) knlGS:00000000f5df4b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000063c4f000 CR4: 0000000000340ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: tomoyo_domain_quota_is_ok+0x2f4/0x500 security/tomoyo/util.c:1071 tomoyo_supervisor+0x2d5/0xf00 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x257/0x360 security/tomoyo/file.c:573 tomoyo_check_open_permission+0x307/0x370 security/tomoyo/file.c:780 tomoyo_file_open security/tomoyo/tomoyo.c:313 [inline] tomoyo_file_open+0xa3/0xd0 security/tomoyo/tomoyo.c:308 security_file_open+0x6e/0x410 security/security.c:1553 do_dentry_open+0x3e9/0x1340 fs/open.c:815 do_open fs/namei.c:3229 [inline] path_openat+0x1e59/0x27d0 fs/namei.c:3346 do_filp_open+0x192/0x260 fs/namei.c:3373 do_sys_openat2+0x585/0x7d0 fs/open.c:1179 do_sys_open+0xc3/0x140 fs/open.c:1195 do_syscall_32_irqs_on arch/x86/entry/common.c:337 [inline] do_fast_syscall_32+0x270/0xe90 arch/x86/entry/common.c:396 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 Modules linked in: CR2: 0000000000000000 ---[ end trace 82c5a99bf373e6aa ]--- RIP: 0010:__read_once_size include/linux/compiler.h:252 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x43/0x60 kernel/kcov.c:202 Code: 24 74 0f 80 e6 01 74 35 8b 90 04 14 00 00 85 d2 74 2b 8b 90 e0 13 00 00 83 fa 02 75 20 48 8b 88 e8 13 00 00 8b 80 e4 13 00 00 <48> 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 c3 66 0f RSP: 0018:ffffc900050df4e8 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000008 RCX: 0000000000000000 RDX: 0000000000000002 RSI: ffffffff83639e74 RDI: 0000000000000001 RBP: ffff8880283d3280 R08: ffff8880607cc940 R09: fffffbfff190e62d R10: ffffffff8c873167 R11: fffffbfff190e62c R12: 0000000000000100 R13: 00000000000002f9 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88802cf00000(0063) knlGS:00000000f5df4b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000063c4f000 CR4: 0000000000340ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400