kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 10 Comm: ksoftirqd/0 Not tainted 5.4.249-syzkaller-00007-g50533a8b511b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 RIP: 0010:memset_erms+0x9/0x10 arch/x86/lib/memset_64.S:64 Code: c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01 RSP: 0000:ffff8881f5dd7b50 EFLAGS: 00010207 RAX: 000508bffff670ff RBX: 0000000000000100 RCX: 0000000000000400 RDX: 0000000000000400 RSI: 00000000000000ff RDI: e0009d17fffece00 RBP: ffff8881f5dd7d08 R08: ffffffff8154d03e R09: e0009d17fffece00 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffd9c0 R13: dffffc0000000000 R14: ffffffff818f8737 R15: ffff8881da05f1c0 FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000001ffffd00 CR3: 0000000005e0e000 CR4: 00000000003406b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: free_pages_prepare mm/page_alloc.c:1198 [inline] __free_pages_ok+0x1f9/0x950 mm/page_alloc.c:1438 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1800 __do_softirq+0x23b/0x6b7 kernel/softirq.c:292 run_ksoftirqd+0x1f/0x30 kernel/softirq.c:603 smpboot_thread_fn+0x545/0x930 kernel/smpboot.c:165 kthread+0x2da/0x360 kernel/kthread.c:288 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:354 Modules linked in: ---[ end trace fa4dc130a89eec16 ]--- RIP: 0010:memset_erms+0x9/0x10 arch/x86/lib/memset_64.S:64 Code: c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01 RSP: 0000:ffff8881f5dd7b50 EFLAGS: 00010207 RAX: 000508bffff670ff RBX: 0000000000000100 RCX: 0000000000000400 RDX: 0000000000000400 RSI: 00000000000000ff RDI: e0009d17fffece00 RBP: ffff8881f5dd7d08 R08: ffffffff8154d03e R09: e0009d17fffece00 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffd9c0 R13: dffffc0000000000 R14: ffffffff818f8737 R15: ffff8881da05f1c0 FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000001ffffd00 CR3: 0000000005e0e000 CR4: 00000000003406b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: c1 e9 03 shr $0x3,%ecx 3: 40 0f b6 f6 movzbl %sil,%esi 7: 48 b8 01 01 01 01 01 movabs $0x101010101010101,%rax e: 01 01 01 11: 48 0f af c6 imul %rsi,%rax 15: f3 48 ab rep stos %rax,%es:(%rdi) 18: 89 d1 mov %edx,%ecx 1a: f3 aa rep stos %al,%es:(%rdi) 1c: 4c 89 c8 mov %r9,%rax 1f: c3 ret 20: 90 nop 21: 49 89 f9 mov %rdi,%r9 24: 40 88 f0 mov %sil,%al 27: 48 89 d1 mov %rdx,%rcx * 2a: f3 aa rep stos %al,%es:(%rdi) <-- trapping instruction 2c: 4c 89 c8 mov %r9,%rax 2f: c3 ret 30: 90 nop 31: 49 89 fa mov %rdi,%r10 34: 40 0f b6 ce movzbl %sil,%ecx 38: 48 rex.W 39: b8 01 01 01 01 mov $0x1010101,%eax 3e: 01 01 add %eax,(%rcx)