BUG: kernel NULL pointer dereference, address: 0000000000000080 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 9336b067 P4D 9336b067 PUD a1aa0067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 7104 Comm: syz-executor.4 Not tainted 5.9.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:qlink_to_object mm/kasan/quarantine.c:137 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:142 [inline] RIP: 0010:qlist_free_all+0x36/0x160 mm/kasan/quarantine.c:168 Code: 53 48 83 ec 08 48 8b 37 48 85 f6 0f 84 24 01 00 00 48 85 ed 49 89 fd 49 89 ef 49 be 00 00 00 00 00 fc ff df 0f 84 98 00 00 00 <49> 63 87 80 00 00 00 4c 8b 26 48 29 c6 48 83 3d e5 dc 01 08 00 0f RSP: 0018:ffffc90001a07dc8 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: 0000000000000282 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffff888000000000 RDI: 0000000000000007 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000000 R12: ffff888000000000 R13: ffffc90001a07e08 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880ae600000(0063) knlGS:0000000009207900 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000000000080 CR3: 000000008fd8d000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x17e/0x200 mm/kasan/quarantine.c:261 __kasan_kmalloc.constprop.0+0x9e/0xd0 mm/kasan/common.c:442 slab_post_alloc_hook mm/slab.h:518 [inline] slab_alloc mm/slab.c:3312 [inline] kmem_cache_alloc+0x138/0x3a0 mm/slab.c:3482 getname_flags.part.0+0x50/0x4f0 fs/namei.c:138 getname_flags include/linux/audit.h:320 [inline] getname fs/namei.c:209 [inline] __do_sys_rmdir fs/namei.c:3791 [inline] __se_sys_rmdir fs/namei.c:3789 [inline] __ia32_sys_rmdir+0xb1/0x100 fs/namei.c:3789 do_syscall_32_irqs_on arch/x86/entry/common.c:84 [inline] __do_fast_syscall_32+0x57/0x80 arch/x86/entry/common.c:126 do_fast_syscall_32+0x2f/0x70 arch/x86/entry/common.c:149 entry_SYSENTER_compat_after_hwframe+0x4d/0x5c RIP: 0023:0xf7f76549 Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 002b:00000000090aed1c EFLAGS: 00000212 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 00000000090afe10 RCX: 000000000815e6ac RDX: 0000000000000065 RSI: 00000000090afe10 RDI: 00000000080d829e RBP: 00000000090aedac R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: CR2: 0000000000000080 ---[ end trace 3670b4cff6e3e003 ]--- RIP: 0010:qlink_to_object mm/kasan/quarantine.c:137 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:142 [inline] RIP: 0010:qlist_free_all+0x36/0x160 mm/kasan/quarantine.c:168 Code: 53 48 83 ec 08 48 8b 37 48 85 f6 0f 84 24 01 00 00 48 85 ed 49 89 fd 49 89 ef 49 be 00 00 00 00 00 fc ff df 0f 84 98 00 00 00 <49> 63 87 80 00 00 00 4c 8b 26 48 29 c6 48 83 3d e5 dc 01 08 00 0f RSP: 0018:ffffc90001a07dc8 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: 0000000000000282 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffff888000000000 RDI: 0000000000000007 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000000 R12: ffff888000000000 R13: ffffc90001a07e08 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880ae600000(0063) knlGS:0000000009207900 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00007ffcdc940c17 CR3: 000000008fd8d000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400