kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 4508 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #284 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:virt_to_head_page include/linux/mm.h:615 [inline] RIP: 0010:qlink_to_cache mm/kasan/quarantine.c:127 [inline] RIP: 0010:qlist_free_all+0x12b/0x160 mm/kasan/quarantine.c:163 RSP: 0018:ffff8801b2e9f780 EFLAGS: 00010207 RAX: ffff0203a2144dc0 RBX: 0000000000000282 RCX: ffffea0000000000 RDX: 03ffe7e80e885100 RSI: ffff8801cd8b4ae0 RDI: 0000000000000282 RBP: ffff8801b2e9f7b8 R08: 1ffff100365d3ebe R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: ffff0203a2144dc0 R15: ffffffff87acaba0 FS: 000000000183b940(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000006fc218 CR3: 00000001cde58002 CR4: 00000000001606f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x141/0x170 mm/kasan/quarantine.c:259 kasan_kmalloc+0xca/0xe0 mm/kasan/kasan.c:537 __do_kmalloc_node mm/slab.c:3669 [inline] __kmalloc_node+0x47/0x70 mm/slab.c:3676 kmalloc_node include/linux/slab.h:554 [inline] __vmalloc_area_node mm/vmalloc.c:1686 [inline] __vmalloc_node_range+0x1a1/0x650 mm/vmalloc.c:1759 __vmalloc_node mm/vmalloc.c:1804 [inline] __vmalloc_node_flags mm/vmalloc.c:1818 [inline] vzalloc+0x45/0x50 mm/vmalloc.c:1857 alloc_counters.isra.10+0x9a/0x7e0 net/ipv6/netfilter/ip6_tables.c:830 copy_entries_to_user net/ipv6/netfilter/ip6_tables.c:852 [inline] get_entries net/ipv6/netfilter/ip6_tables.c:1053 [inline] do_ip6t_get_ctl+0x63e/0xaf0 net/ipv6/netfilter/ip6_tables.c:1718 nf_sockopt net/netfilter/nf_sockopt.c:104 [inline] nf_getsockopt+0x6a/0xc0 net/netfilter/nf_sockopt.c:122 ipv6_getsockopt+0x1d5/0x2c0 net/ipv6/ipv6_sockglue.c:1370 tcp_getsockopt+0x82/0xd0 net/ipv4/tcp.c:3338 sock_common_getsockopt+0x95/0xd0 net/core/sock.c:2998 SYSC_getsockopt net/socket.c:1881 [inline] SyS_getsockopt+0x178/0x340 net/socket.c:1863 do_syscall_64+0x281/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x4573aa RSP: 002b:0000000000a3e368 EFLAGS: 00000212 ORIG_RAX: 0000000000000037 RAX: ffffffffffffffda RBX: 0000000000a3e390 RCX: 00000000004573aa RDX: 0000000000000041 RSI: 0000000000000029 RDI: 0000000000000013 RBP: 00000000006ffe40 R08: 0000000000a3e38c R09: 0000000000004000 R10: 0000000000a3e490 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000000013 R14: 0000000000000029 R15: 00000000006fea00 Code: 00 00 00 80 48 01 c2 72 44 48 b9 00 00 00 80 ff 77 00 00 48 01 ca 48 b9 00 00 00 00 00 ea ff ff 48 c1 ea 0c 48 c1 e2 06 48 01 ca <48> 8b 4a 20 48 8d 71 ff 83 e1 01 48 0f 45 d6 4c 8b 6a 30 e9 f4 RIP: virt_to_head_page include/linux/mm.h:615 [inline] RSP: ffff8801b2e9f780 RIP: qlink_to_cache mm/kasan/quarantine.c:127 [inline] RSP: ffff8801b2e9f780 RIP: qlist_free_all+0x12b/0x160 mm/kasan/quarantine.c:163 RSP: ffff8801b2e9f780 ---[ end trace 3fe80984c2902b21 ]---