BUG: kernel NULL pointer dereference, address: 0000000000000134 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 3cd2b067 P4D 3cd2b067 PUD 3cd2a067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 23827 Comm: syz-executor.0 Not tainted 5.6.0-rc7-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:qlink_to_object mm/kasan/quarantine.c:137 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:142 [inline] RIP: 0010:qlist_free_all+0x28/0x140 mm/kasan/quarantine.c:167 Code: d6 90 41 57 41 56 41 55 41 54 55 53 48 8b 1f 48 85 db 0f 84 08 01 00 00 48 89 f5 49 89 fd 48 85 ed 49 89 ee 0f 84 8b 00 00 00 <49> 63 86 34 01 00 00 4c 8b 23 48 29 c3 48 83 3d 2b c3 c4 07 00 0f RSP: 0018:ffffc90005747838 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: ffff888000000000 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffffffff813345ba RDI: 0000000000000007 RBP: 0000000000000000 R08: ffff88805a220080 R09: fffffbfff180e786 R10: fffffbfff180e785 R11: ffffffff8c073c2f R12: ffff888000000000 R13: ffffc90005747870 R14: 0000000000000000 R15: 0000000000000282 FS: 0000000000000000(0000) GS:ffff8880ae700000(0063) knlGS:00000000f5d0cb40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000000000134 CR3: 0000000097e6c000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x159/0x190 mm/kasan/quarantine.c:260 __kasan_kmalloc.constprop.0+0x97/0xd0 mm/kasan/common.c:496 slab_post_alloc_hook mm/slab.h:584 [inline] slab_alloc mm/slab.c:3320 [inline] __do_kmalloc mm/slab.c:3654 [inline] __kmalloc+0x14b/0x7a0 mm/slab.c:3665 kmalloc_array include/linux/slab.h:597 [inline] kcalloc include/linux/slab.h:608 [inline] iter_file_splice_write+0x168/0xb00 fs/splice.c:702 do_splice_from fs/splice.c:863 [inline] direct_splice_actor+0x115/0x160 fs/splice.c:1037 splice_direct_to_actor+0x38c/0x980 fs/splice.c:992 do_splice_direct+0x1a8/0x270 fs/splice.c:1080 do_sendfile+0x549/0xc40 fs/read_write.c:1520 __do_compat_sys_sendfile fs/read_write.c:1596 [inline] __se_compat_sys_sendfile fs/read_write.c:1585 [inline] __ia32_compat_sys_sendfile+0x159/0x220 fs/read_write.c:1585 do_syscall_32_irqs_on arch/x86/entry/common.c:337 [inline] do_fast_syscall_32+0x270/0xe8f arch/x86/entry/common.c:408 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 Modules linked in: CR2: 0000000000000134 ---[ end trace 7d2b17098ae9b2b4 ]--- RIP: 0010:qlink_to_object mm/kasan/quarantine.c:137 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:142 [inline] RIP: 0010:qlist_free_all+0x28/0x140 mm/kasan/quarantine.c:167 Code: d6 90 41 57 41 56 41 55 41 54 55 53 48 8b 1f 48 85 db 0f 84 08 01 00 00 48 89 f5 49 89 fd 48 85 ed 49 89 ee 0f 84 8b 00 00 00 <49> 63 86 34 01 00 00 4c 8b 23 48 29 c3 48 83 3d 2b c3 c4 07 00 0f RSP: 0018:ffffc90005747838 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: ffff888000000000 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffffffff813345ba RDI: 0000000000000007 RBP: 0000000000000000 R08: ffff88805a220080 R09: fffffbfff180e786 R10: fffffbfff180e785 R11: ffffffff8c073c2f R12: ffff888000000000 R13: ffffc90005747870 R14: 0000000000000000 R15: 0000000000000282 FS: 0000000000000000(0000) GS:ffff8880ae700000(0063) knlGS:00000000f5d0cb40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00000000f5ca9db0 CR3: 0000000097e6c000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400