IPVS: ftp: loaded support on port[0] = 21 x86/PAT: syz-executor1:13281 map pfn RAM range req write-combining for [mem 0x1d1530000-0x1d1533fff], got write-back IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 13420 Comm: ip Not tainted 4.16.0-rc7+ #371 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:virt_to_head_page include/linux/mm.h:615 [inline] RIP: 0010:qlink_to_cache mm/kasan/quarantine.c:127 [inline] RIP: 0010:qlist_free_all+0x12b/0x160 mm/kasan/quarantine.c:163 RSP: 0018:ffff8801b122f600 EFLAGS: 00010207 RAX: 1600000033330000 RBX: 0000000000000282 RCX: ffffea0000000000 RDX: 0057ebe000cccc00 RSI: ffff8801b5760a78 RDI: 0000000000000282 RBP: ffff8801b122f638 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 1600000033330000 R15: ffffffff87acabe0 FS: 00007fe48e933700(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000063f210 CR3: 00000001d9782005 CR4: 00000000001606e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x141/0x170 mm/kasan/quarantine.c:259 kasan_kmalloc+0xca/0xe0 mm/kasan/kasan.c:537 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:489 slab_post_alloc_hook mm/slab.h:443 [inline] slab_alloc_node mm/slab.c:3323 [inline] kmem_cache_alloc_node+0x131/0x760 mm/slab.c:3630 __alloc_skb+0xf1/0x780 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:983 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1180 [inline] netlink_sendmsg+0xa86/0xe60 net/netlink/af_netlink.c:1872 sock_sendmsg_nosec net/socket.c:630 [inline] sock_sendmsg+0xca/0x110 net/socket.c:640 ___sys_sendmsg+0x767/0x8b0 net/socket.c:2046 __sys_sendmsg+0xe5/0x210 net/socket.c:2080 SYSC_sendmsg net/socket.c:2091 [inline] SyS_sendmsg+0x2d/0x50 net/socket.c:2087 do_syscall_64+0x281/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x7fe48e054320 RSP: 002b:00007ffedadce9e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007ffedadd2e01 RCX: 00007fe48e054320 RDX: 0000000000000000 RSI: 00007ffedadcea20 RDI: 0000000000000013 RBP: 00007ffedadcea20 R08: 0000000000000000 R09: 000000000000001f R10: 0000000000000000 R11: 0000000000000246 R12: 000000005abe3c66 R13: 0000000000000000 R14: 00000000006395c0 R15: 0000000000000000 Code: 00 00 00 80 48 01 c2 72 44 48 b9 00 00 00 80 ff 77 00 00 48 01 ca 48 b9 00 00 00 00 00 ea ff ff 48 c1 ea 0c 48 c1 e2 06 48 01 ca <48> 8b 4a 20 48 8d 71 ff 83 e1 01 48 0f 45 d6 4c 8b 6a 30 e9 f4 RIP: virt_to_head_page include/linux/mm.h:615 [inline] RSP: ffff8801b122f600 RIP: qlink_to_cache mm/kasan/quarantine.c:127 [inline] RSP: ffff8801b122f600 RIP: qlist_free_all+0x12b/0x160 mm/kasan/quarantine.c:163 RSP: ffff8801b122f600 ---[ end trace 4f7b6f71bf5d139d ]---