====================================== | [ 364.953751][ T3370] eth1: renamed from tmp | [ 388.356852][ T3634] eth2: renamed from tmp | [ 433.432525][ T3831] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] SMP KASAN | [ 433.432956][ T3831] KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] [ 433.433519][ T3831] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 433.433738][ T3831] RIP: 0010:kasan_byte_accessible (mm/kasan/generic.c:210) [ 433.433963][ T3831] Code: 00 00 e9 2e fe ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 0f 1f 40 d6 48 b8 00 00 00 00 00 fc ff df 48 c1 ef 03 48 01 c7 <0f> b6 07 3c 07 0f 96 c0 c3 66 90 0f 1f 40 d6 e9 07 1c 00 00 0f 1f All code ======== 0: 00 00 add %al,(%rax) 2: e9 2e fe ff ff jmp 0xfffffffffffffe35 7: 66 66 2e 0f 1f 84 00 data16 cs nopw 0x0(%rax,%rax,1) e: 00 00 00 00 12: 0f 1f 00 nopl (%rax) 15: 0f 1f 40 d6 nopl -0x2a(%rax) 19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 20: fc ff df 23: 48 c1 ef 03 shr $0x3,%rdi 27: 48 01 c7 add %rax,%rdi 2a:* 0f b6 07 movzbl (%rdi),%eax <-- trapping instruction 2d: 3c 07 cmp $0x7,%al 2f: 0f 96 c0 setbe %al 32: c3 ret 33: 66 90 xchg %ax,%ax 35: 0f 1f 40 d6 nopl -0x2a(%rax) 39: e9 07 1c 00 00 jmp 0x1c45 3e: 0f .byte 0xf 3f: 1f (bad) Code starting with the faulting instruction =========================================== 0: 0f b6 07 movzbl (%rdi),%eax 3: 3c 07 cmp $0x7,%al 5: 0f 96 c0 setbe %al 8: c3 ret 9: 66 90 xchg %ax,%ax b: 0f 1f 40 d6 nopl -0x2a(%rax) f: e9 07 1c 00 00 jmp 0x1c1b 14: 0f .byte 0xf 15: 1f (bad) [ 433.434577][ T3831] RSP: 0018:ffffc90009297518 EFLAGS: 00010086 [ 433.434795][ T3831] RAX: dffffc0000000000 RBX: 0000000000001000 RCX: 0000000000000000 [ 433.435057][ T3831] RDX: 0000000000000000 RSI: ffffffff9182d78b RDI: dffffc0000000003 [ 433.435317][ T3831] RBP: 0000000000000019 R08: 0000000000000001 R09: 0000000000000000 [ 433.435582][ T3831] R10: ffffffff8fed38bc R11: ffff88800c302d90 R12: 0000000000000000 [ 433.435844][ T3831] R13: ffffffff9182d78b R14: 0000000000000000 R15: 0000000000000019 [ 433.436099][ T3831] FS: 00007f232fb85800(0000) GS:ffff8880d9018000(0000) knlGS:0000000000000000 [ 433.436404][ T3831] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 433.436622][ T3831] CR2: 00007f232fcb99b0 CR3: 000000000c9ef004 CR4: 0000000000772ef0 [ 433.436879][ T3831] PKRU: 55555554 [ 433.437012][ T3831] Call Trace: [ 433.437141][ T3831] [ 433.437230][ T3831] __kasan_check_byte (mm/kasan/common.c:575) [ 433.437412][ T3831] lock_acquire.part.0 (kernel/locking/lockdep.c:118 kernel/locking/lockdep.c:5844) [ 433.437590][ T3831] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751) [ 433.437770][ T3831] ? lock_acquire (./include/trace/events/lock.h:24 kernel/locking/lockdep.c:5831) [ 433.437943][ T3831] _raw_spin_lock_irq (./include/linux/spinlock_api_smp.h:120 kernel/locking/spinlock.c:170) [ 433.438118][ T3831] ? iomap_read_end (fs/iomap/buffered-io.c:459) [ 433.438294][ T3831] iomap_read_end (fs/iomap/buffered-io.c:459) [ 433.438468][ T3831] iomap_readahead (fs/iomap/buffered-io.c:624) [ 433.438645][ T3831] ? iomap_readahead_iter (fs/iomap/buffered-io.c:624) [ 433.438815][ T3831] ? finish_task_switch.isra.0 (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 kernel/sched/sched.h:1570 kernel/sched/core.c:4995 kernel/sched/core.c:5112) [ 433.439034][ T3831] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751) [ 433.439212][ T3831] fuse_readahead (fs/fuse/file.c:1056) [ 433.439383][ T3831] ? fuse_read_folio (fs/fuse/file.c:1056) [ 433.439561][ T3831] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 433.439735][ T3831] read_pages (./include/linux/pagemap.h:1420 ./include/linux/pagemap.h:1444 mm/readahead.c:165) [ 433.439869][ T3831] ? const_folio_flags.constprop.0 (arch/x86/kvm/../../../virt/kvm/guest_memfd.c:208) [ 433.440083][ T3831] page_cache_ra_unbounded (./include/linux/fs.h:1104 mm/readahead.c:303) [ 433.440265][ T3831] ? page_cache_ra_order (./include/trace/events/readahead.h:43 mm/readahead.c:478) [ 433.440446][ T3831] filemap_fault (mm/filemap.c:3533) [ 433.440623][ T3831] ? read_cache_page_gfp (mm/filemap.c:3493) [ 433.440796][ T3831] ? do_fault_around (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:897 mm/memory.c:5677) [ 433.440973][ T3831] __do_fault (mm/memory.c:5281) [ 433.441106][ T3831] do_read_fault (mm/memory.c:5716) [ 433.441279][ T3831] do_pte_missing (mm/memory.c:5850 mm/memory.c:4362) [ 433.441448][ T3831] handle_pte_fault (mm/memory.c:6234) [ 433.441622][ T3831] ? do_pte_missing (mm/memory.c:6191) [ 433.441796][ T3831] ? pgd_bad (./arch/x86/include/asm/pgtable.h:1156) [ 433.441928][ T3831] __handle_mm_fault (mm/memory.c:6366) [ 433.442097][ T3831] ? __pmd_alloc (mm/memory.c:6274) [ 433.442268][ T3831] ? lock_vma_under_rcu (mm/mmap_lock.c:260) [ 433.442544][ T3831] handle_mm_fault (mm/memory.c:6547) [ 433.442714][ T3831] ? __handle_mm_fault (mm/memory.c:6502) [ 433.442882][ T3831] ? user_statfs (fs/statfs.c:191) [ 433.443053][ T3831] do_user_addr_fault (arch/x86/mm/fault.c:1337) [ 433.443331][ T3831] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751) [ 433.443500][ T3831] exc_page_fault (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:109 ./arch/x86/include/asm/irqflags.h:151 arch/x86/mm/fault.c:1484 arch/x86/mm/fault.c:1532) [ 433.443668][ T3831] asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:618) [ 433.443837][ T3831] RIP: 0033:0x7f232fcb99b0 [ 433.444124][ T3831] Code: Unable to access opcode bytes at 0x7f232fcb9986. Code starting with the faulting instruction =========================================== [ 433.444343][ T3831] RSP: 002b:00007ffe11920238 EFLAGS: 00010246 [ 433.444557][ T3831] RAX: 0000000000000000 RBX: 00007f232ff07870 RCX: 00007f232fd40adb [ 433.444923][ T3831] RDX: fffffffffffffeb0 RSI: 00007f232feff074 RDI: 00007f232feff295 [ 433.445179][ T3831] RBP: 0000000000000008 R08: 0000000000000000 R09: 00000000069682ac [ 433.445437][ T3831] R10: fffffffffffffeb0 R11: 0000000000000246 R12: 00007ffe11920378 Finger prints: kasan_byte_accessible:__kasan_check_byte:_raw_spin_lock_irq:iomap_read_end:iomap_readahead