BUG: kernel NULL pointer dereference, address: 00000000000000c0 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 72251067 P4D 72251067 PUD 1898f067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 6570 Comm: syz-fuzzer Not tainted 5.15.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:qlink_to_object mm/kasan/quarantine.c:129 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:134 [inline] RIP: 0010:qlist_free_all+0x35/0xc0 mm/kasan/quarantine.c:165 Code: f5 48 83 ec 08 48 8b 37 48 85 f6 0f 84 96 00 00 00 49 be 00 00 00 00 00 ea ff ff 49 89 fd 49 bc 00 00 00 00 00 fc ff df eb 2d <48> 63 87 c0 00 00 00 48 c7 c2 a5 4b be 81 4c 8b 3e 48 29 c6 48 89 RSP: 0018:ffffc90002bdf878 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: ffff88807b834800 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffff888000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000002e R10: ffffffff81348f0a R11: 000000000000003f R12: dffffc0000000000 R13: ffffc90002bdf8b0 R14: ffffea0000000000 R15: ffff888000000000 FS: 000000c0000d2090(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000000c0 CR3: 000000006f2b2000 CR4: 00000000003526f0 Call Trace: kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:272 __kasan_slab_alloc+0x95/0xb0 mm/kasan/common.c:444 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook mm/slab.h:519 [inline] slab_alloc_node mm/slub.c:3213 [inline] __kmalloc_node_track_caller+0x23d/0x340 mm/slub.c:4947 kmalloc_reserve net/core/skbuff.c:355 [inline] __alloc_skb+0xde/0x340 net/core/skbuff.c:426 alloc_skb_fclone include/linux/skbuff.h:1166 [inline] sk_stream_alloc_skb+0x109/0xc30 net/ipv4/tcp.c:887 tcp_sendmsg_locked+0xc78/0x2f10 net/ipv4/tcp.c:1309 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1461 inet_sendmsg+0x99/0xe0 net/ipv4/af_inet.c:821 sock_sendmsg_nosec net/socket.c:704 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:724 sock_write_iter+0x289/0x3c0 net/socket.c:1057 call_write_iter include/linux/fs.h:2163 [inline] new_sync_write+0x429/0x660 fs/read_write.c:507 vfs_write+0x7cf/0xae0 fs/read_write.c:594 ksys_write+0x1ee/0x250 fs/read_write.c:647 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x4b129b Code: fb ff eb bd e8 46 96 fb ff e9 61 ff ff ff cc e8 3b 62 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 RSP: 002b:000000c001807310 EFLAGS: 00000202 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004b129b RDX: 0000000000000004 RSI: 000000c00000a200 RDI: 0000000000000006 RBP: 000000c001807360 R08: 000000c001807401 R09: 0000000000000004 R10: 0000000000000008 R11: 0000000000000202 R12: 000000000000011e R13: 000000c0004d8000 R14: 000000000000000f R15: 00000000000094e8 Modules linked in: CR2: 00000000000000c0 ---[ end trace d8a4c3f10ec99063 ]--- RIP: 0010:qlink_to_object mm/kasan/quarantine.c:129 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:134 [inline] RIP: 0010:qlist_free_all+0x35/0xc0 mm/kasan/quarantine.c:165 Code: f5 48 83 ec 08 48 8b 37 48 85 f6 0f 84 96 00 00 00 49 be 00 00 00 00 00 ea ff ff 49 89 fd 49 bc 00 00 00 00 00 fc ff df eb 2d <48> 63 87 c0 00 00 00 48 c7 c2 a5 4b be 81 4c 8b 3e 48 29 c6 48 89 RSP: 0018:ffffc90002bdf878 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: ffff88807b834800 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffff888000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000002e R10: ffffffff81348f0a R11: 000000000000003f R12: dffffc0000000000 R13: ffffc90002bdf8b0 R14: ffffea0000000000 R15: ffff888000000000 FS: 000000c0000d2090(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000000c0 CR3: 000000006f2b2000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: f5 cmc 1: 48 83 ec 08 sub $0x8,%rsp 5: 48 8b 37 mov (%rdi),%rsi 8: 48 85 f6 test %rsi,%rsi b: 0f 84 96 00 00 00 je 0xa7 11: 49 be 00 00 00 00 00 movabs $0xffffea0000000000,%r14 18: ea ff ff 1b: 49 89 fd mov %rdi,%r13 1e: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12 25: fc ff df 28: eb 2d jmp 0x57 * 2a: 48 63 87 c0 00 00 00 movslq 0xc0(%rdi),%rax <-- trapping instruction 31: 48 c7 c2 a5 4b be 81 mov $0xffffffff81be4ba5,%rdx 38: 4c 8b 3e mov (%rsi),%r15 3b: 48 29 c6 sub %rax,%rsi 3e: 48 rex.W 3f: 89 .byte 0x89