BUG: kernel NULL pointer dereference, address: 0000000000000008 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 UID: 0 PID: 4721 Comm: klogd Not tainted 6.14.0-rc1-syzkaller-00034-g92514ef226f5 #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:qlink_to_cache mm/kasan/quarantine.c:131 [inline] RIP: 0010:qlist_free_all+0x69/0x140 mm/kasan/quarantine.c:176 Code: e8 06 48 83 e0 c0 49 8b 4c 05 08 f6 c1 01 0f 85 a8 00 00 00 4c 01 e8 66 90 0f b6 48 33 c1 e1 18 81 f9 00 00 00 f5 48 0f 45 c5 <48> 8b 58 08 4d 8b 34 24 48 63 83 c0 00 00 00 49 29 c4 48 89 df 4c RSP: 0018:ffffc9000211f660 EFLAGS: 00010206 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000ff000000 RDX: 0000000000000000 RSI: 000000000ea81a60 RDI: 000000001fffffff RBP: 0000000000000000 R08: ffffffff816d4945 R09: 1ffffffff285f30e R10: dffffc0000000000 R11: fffffbfff285f30f R12: ffffffff8ea81a60 R13: ffffea0000000000 R14: ffffffff8ea81a60 R15: 0000000000000000 FS: 00007f38681bb500(0000) GS:ffff88801fc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000008 CR3: 00000000118d6000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x23/0x80 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4115 [inline] slab_alloc_node mm/slub.c:4164 [inline] kmem_cache_alloc_node_noprof+0x1d9/0x380 mm/slub.c:4216 __alloc_skb+0x1c3/0x440 net/core/skbuff.c:668 alloc_skb include/linux/skbuff.h:1331 [inline] alloc_skb_with_frags+0xc3/0x820 net/core/skbuff.c:6612 sock_alloc_send_pskb+0x91a/0xa60 net/core/sock.c:2897 unix_dgram_sendmsg+0x5f1/0x1df0 net/unix/af_unix.c:2017 sock_sendmsg_nosec net/socket.c:713 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:728 __sys_sendto+0x363/0x4c0 net/socket.c:2182 __do_sys_sendto net/socket.c:2189 [inline] __se_sys_sendto net/socket.c:2185 [inline] __x64_sys_sendto+0xde/0x100 net/socket.c:2185 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f386831d9b5 Code: 8b 44 24 08 48 83 c4 28 48 98 c3 48 98 c3 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 26 45 31 c9 45 31 c0 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 7a 48 8b 15 44 c4 0c 00 f7 d8 64 89 02 48 83 RSP: 002b:00007ffe770459a8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f386831d9b5 RDX: 0000000000000056 RSI: 0000557afd9c53e0 RDI: 0000000000000003 RBP: 0000557afd9c0910 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000013 R13: 00007f38684ab212 R14: 00007ffe77045aa8 R15: 0000000000000000 Modules linked in: CR2: 0000000000000008 ---[ end trace 0000000000000000 ]--- RIP: 0010:qlink_to_cache mm/kasan/quarantine.c:131 [inline] RIP: 0010:qlist_free_all+0x69/0x140 mm/kasan/quarantine.c:176 Code: e8 06 48 83 e0 c0 49 8b 4c 05 08 f6 c1 01 0f 85 a8 00 00 00 4c 01 e8 66 90 0f b6 48 33 c1 e1 18 81 f9 00 00 00 f5 48 0f 45 c5 <48> 8b 58 08 4d 8b 34 24 48 63 83 c0 00 00 00 49 29 c4 48 89 df 4c RSP: 0018:ffffc9000211f660 EFLAGS: 00010206 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000ff000000 RDX: 0000000000000000 RSI: 000000000ea81a60 RDI: 000000001fffffff RBP: 0000000000000000 R08: ffffffff816d4945 R09: 1ffffffff285f30e R10: dffffc0000000000 R11: fffffbfff285f30f R12: ffffffff8ea81a60 R13: ffffea0000000000 R14: ffffffff8ea81a60 R15: 0000000000000000 FS: 00007f38681bb500(0000) GS:ffff88801fc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000008 CR3: 00000000118d6000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: e8 06 48 83 e0 call 0xe083480b 5: c0 49 8b 4c rorb $0x4c,-0x75(%rcx) 9: 05 08 f6 c1 01 add $0x1c1f608,%eax e: 0f 85 a8 00 00 00 jne 0xbc 14: 4c 01 e8 add %r13,%rax 17: 66 90 xchg %ax,%ax 19: 0f b6 48 33 movzbl 0x33(%rax),%ecx 1d: c1 e1 18 shl $0x18,%ecx 20: 81 f9 00 00 00 f5 cmp $0xf5000000,%ecx 26: 48 0f 45 c5 cmovne %rbp,%rax * 2a: 48 8b 58 08 mov 0x8(%rax),%rbx <-- trapping instruction 2e: 4d 8b 34 24 mov (%r12),%r14 32: 48 63 83 c0 00 00 00 movslq 0xc0(%rbx),%rax 39: 49 29 c4 sub %rax,%r12 3c: 48 89 df mov %rbx,%rdi 3f: 4c rex.WR