BUG: kernel NULL pointer dereference, address: 000000000000013c #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 673c2067 P4D 673c2067 PUD 673c3067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 19333 Comm: kworker/u4:1 Not tainted 5.7.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: krdsd rds_connect_worker RIP: 0010:qlink_to_object mm/kasan/quarantine.c:137 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:142 [inline] RIP: 0010:qlist_free_all+0x28/0x140 mm/kasan/quarantine.c:167 Code: d6 90 41 57 41 56 41 55 41 54 55 53 48 8b 1f 48 85 db 0f 84 08 01 00 00 48 89 f5 49 89 fd 48 85 ed 49 89 ee 0f 84 8b 00 00 00 <49> 63 86 3c 01 00 00 4c 8b 23 48 29 c3 48 83 3d ab c1 e3 07 00 0f RSP: 0018:ffffc90006acf5e8 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: ffff888000000000 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffffffff8133965a RDI: 0000000000000007 RBP: 0000000000000000 R08: ffff888000bc2200 R09: fffffbfff185cf4d R10: ffffffff8c2e7a67 R11: fffffbfff185cf4c R12: ffff888000000000 R13: ffffc90006acf620 R14: 0000000000000000 R15: 0000000000000286 FS: 0000000000000000(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000013c CR3: 00000000673c1000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x159/0x190 mm/kasan/quarantine.c:260 __kasan_kmalloc.constprop.0+0x97/0xd0 mm/kasan/common.c:476 slab_post_alloc_hook mm/slab.h:586 [inline] slab_alloc_node mm/slab.c:3263 [inline] kmem_cache_alloc_node+0x13c/0x760 mm/slab.c:3575 __alloc_skb+0xba/0x5a0 net/core/skbuff.c:198 alloc_skb_fclone include/linux/skbuff.h:1133 [inline] sk_stream_alloc_skb net/ipv4/tcp.c:876 [inline] sk_stream_alloc_skb+0x106/0xc70 net/ipv4/tcp.c:853 tcp_connect+0xf98/0x4290 net/ipv4/tcp_output.c:3652 tcp_v4_connect+0x14f0/0x1c10 net/ipv4/tcp_ipv4.c:311 __inet_stream_connect+0x80f/0xe30 net/ipv4/af_inet.c:655 inet_stream_connect+0x53/0xa0 net/ipv4/af_inet.c:719 rds_tcp_conn_path_connect+0x620/0x880 net/rds/tcp_connect.c:172 rds_connect_worker+0x1a5/0x2c0 net/rds/threads.c:176 process_one_work+0x965/0x16a0 kernel/workqueue.c:2268 worker_thread+0x96/0xe20 kernel/workqueue.c:2414 kthread+0x388/0x470 kernel/kthread.c:268 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 Modules linked in: CR2: 000000000000013c ---[ end trace 11b326ca8ef44414 ]--- RIP: 0010:qlink_to_object mm/kasan/quarantine.c:137 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:142 [inline] RIP: 0010:qlist_free_all+0x28/0x140 mm/kasan/quarantine.c:167 Code: d6 90 41 57 41 56 41 55 41 54 55 53 48 8b 1f 48 85 db 0f 84 08 01 00 00 48 89 f5 49 89 fd 48 85 ed 49 89 ee 0f 84 8b 00 00 00 <49> 63 86 3c 01 00 00 4c 8b 23 48 29 c3 48 83 3d ab c1 e3 07 00 0f RSP: 0018:ffffc90006acf5e8 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: ffff888000000000 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffffffff8133965a RDI: 0000000000000007 RBP: 0000000000000000 R08: ffff888000bc2200 R09: fffffbfff185cf4d R10: ffffffff8c2e7a67 R11: fffffbfff185cf4c R12: ffff888000000000 R13: ffffc90006acf620 R14: 0000000000000000 R15: 0000000000000286 FS: 0000000000000000(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000013c CR3: 00000000673c1000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400