====================================== | [ 1258.505097][ C2] ================================================================== | [ 1258.505360][ C2] BUG: KASAN: null-ptr-deref in sock_def_write_space_wfree (./arch/x86/include/asm/bitops.h:206 ./arch/x86/include/asm/bitops.h:238 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 net/core/sock.c:3397) | [ 1258.505593][ C2] Read of size 8 at addr 0000000000000008 by task fq_band_pktlimi/10243 | [ 1258.505812][ C2] [ 1258.506122][ C2] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 1258.506458][ C2] Call Trace: [ 1258.506579][ C2] [ 1258.506657][ C2] dump_stack_lvl (lib/dump_stack.c:117) [ 1258.506814][ C2] kasan_report (mm/kasan/report.c:603) [ 1258.506933][ C2] ? sock_def_write_space_wfree (./arch/x86/include/asm/bitops.h:206 ./arch/x86/include/asm/bitops.h:238 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 net/core/sock.c:3397) [ 1258.507121][ C2] kasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189) [ 1258.507272][ C2] sock_def_write_space_wfree (./arch/x86/include/asm/bitops.h:206 ./arch/x86/include/asm/bitops.h:238 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 net/core/sock.c:3397) [ 1258.507422][ C2] sock_wfree (./include/linux/rcupdate.h:810 net/core/sock.c:2471) [ 1258.507534][ C2] skb_release_head_state (net/core/skbuff.c:1162 (discriminator 3)) [ 1258.507690][ C2] consume_skb (net/core/skbuff.c:1174 net/core/skbuff.c:1189 net/core/skbuff.c:1405 net/core/skbuff.c:1399) [ 1258.507801][ C2] dummy_xmit (drivers/net/dummy.c:66) [ 1258.507914][ C2] ? trace_net_dev_start_xmit (./include/trace/events/net.h:14 (discriminator 52)) [ 1258.508061][ C2] dev_hard_start_xmit (./include/linux/netdevice.h:4875 ./include/linux/netdevice.h:4889 net/core/dev.c:3563 net/core/dev.c:3579) [ 1258.508212][ C2] sch_direct_xmit (net/sched/sch_generic.c:343) [ 1258.508366][ C2] ? __pfx_sch_direct_xmit (net/sched/sch_generic.c:318) [ 1258.508517][ C2] __qdisc_run (net/sched/sch_generic.c:416) [ 1258.508664][ C2] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5719) [ 1258.508817][ C2] ? __pfx___qdisc_run (net/sched/sch_generic.c:412) [ 1258.508964][ C2] ? do_raw_spin_lock (./arch/x86/include/asm/atomic.h:115 ./include/linux/atomic/atomic-arch-fallback.h:2170 ./include/linux/atomic/atomic-instrumented.h:1302 ./include/asm-generic/qspinlock.h:111 kernel/locking/spinlock_debug.c:116) [ 1258.509110][ C2] ? __pfx_do_raw_spin_lock (kernel/locking/spinlock_debug.c:114) [ 1258.509256][ C2] ? lock_acquire (kernel/locking/lockdep.c:5727) [ 1258.509403][ C2] ? net_tx_action (./include/linux/spinlock.h:352 net/core/dev.c:5250) [ 1258.509550][ C2] net_tx_action (./include/net/sch_generic.h:217 ./include/net/pkt_sched.h:128 ./include/net/pkt_sched.h:124 net/core/dev.c:5266) [ 1258.509698][ C2] __do_softirq (kernel/softirq.c:554) [ 1258.509847][ C2] irq_exit_rcu (kernel/softirq.c:428 kernel/softirq.c:633 kernel/softirq.c:645) [ 1258.509959][ C2] sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1043 arch/x86/kernel/apic/apic.c:1043) [ 1258.510110][ C2] [ 1258.510188][ C2] [ 1258.510264][ C2] asm_sysvec_apic_timer_interrupt (./arch/x86/include/asm/idtentry.h:702) [ 1258.510448][ C2] RIP: 0010:stack_depot_save_flags (./include/linux/jhash.h:122 lib/stackdepot.c:514 lib/stackdepot.c:614) [ 1258.510638][ C2] Code: 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 44 89 f2 48 8d 04 12 89 c6 8d 3c 85 7b 71 f5 75 83 f8 03 0f 86 1c 03 00 00 <41> 89 fc 89 f8 48 89 e9 44 8b 01 44 03 61 08 83 ee 03 48 83 c1 0c All code ======== 0: 89 e8 mov %ebp,%eax 2: 5b pop %rbx 3: 5d pop %rbp 4: 41 5c pop %r12 6: 41 5d pop %r13 8: 41 5e pop %r14 a: 41 5f pop %r15 c: c3 ret d: cc int3 e: cc int3 f: cc int3 10: cc int3 11: 44 89 f2 mov %r14d,%edx 14: 48 8d 04 12 lea (%rdx,%rdx,1),%rax 18: 89 c6 mov %eax,%esi 1a: 8d 3c 85 7b 71 f5 75 lea 0x75f5717b(,%rax,4),%edi 21: 83 f8 03 cmp $0x3,%eax 24: 0f 86 1c 03 00 00 jbe 0x346 2a:* 41 89 fc mov %edi,%r12d <-- trapping instruction 2d: 89 f8 mov %edi,%eax 2f: 48 89 e9 mov %rbp,%rcx 32: 44 8b 01 mov (%rcx),%r8d 35: 44 03 61 08 add 0x8(%rcx),%r12d 39: 83 ee 03 sub $0x3,%esi 3c: 48 83 c1 0c add $0xc,%rcx Code starting with the faulting instruction =========================================== 0: 41 89 fc mov %edi,%r12d 3: 89 f8 mov %edi,%eax 5: 48 89 e9 mov %rbp,%rcx 8: 44 8b 01 mov (%rcx),%r8d b: 44 03 61 08 add 0x8(%rcx),%r12d f: 83 ee 03 sub $0x3,%esi 12: 48 83 c1 0c add $0xc,%rcx [ 1258.511177][ C2] RSP: 0018:ffffc90000bdf7b0 EFLAGS: 00000202 [ 1258.511374][ C2] RAX: 0000000000000016 RBX: 0000000000002800 RCX: 0000000000000001 [ 1258.511594][ C2] RDX: 000000000000000b RSI: 0000000000000016 RDI: 0000000075f571d3 [ 1258.511813][ C2] RBP: ffffc90000bdf810 R08: ffffffffb6bc8d4c R09: fffffbfff75b2bea [ 1258.512030][ C2] R10: ffffffffbad95f57 R11: ffffc90000bdf719 R12: 0000000000000000 [ 1258.512249][ C2] R13: 0000000000000000 R14: 000000000000000b R15: 0000000000000001 [ 1258.512473][ C2] ? is_bpf_text_address (./include/linux/rcupdate.h:339 ./include/linux/rcupdate.h:814 kernel/bpf/core.c:769) [ 1258.512625][ C2] set_track_prepare (mm/slub.c:889) [ 1258.512773][ C2] ? kasan_quarantine_reduce (./include/linux/srcu.h:285 mm/kasan/quarantine.c:287) [ 1258.512920][ C2] ? __kasan_slab_alloc (mm/kasan/common.c:322) [ 1258.513067][ C2] ? kmem_cache_alloc (./include/linux/kasan.h:201 mm/slub.c:3798 mm/slub.c:3845 mm/slub.c:3852) [ 1258.513214][ C2] ? anon_vma_fork (mm/rmap.c:94 mm/rmap.c:361) [ 1258.513362][ C2] ? dup_mmap (kernel/fork.c:714) [ 1258.513516][ C2] ? copy_mm (kernel/fork.c:1688 kernel/fork.c:1736) [ 1258.513626][ C2] ? copy_process (kernel/fork.c:2389) [ 1258.513774][ C2] ? kernel_clone (./include/linux/random.h:26 kernel/fork.c:2797) [ 1258.513921][ C2] ? __do_sys_clone (kernel/fork.c:2928) [ 1258.514069][ C2] ? do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 1258.514215][ C2] ? entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129) [ 1258.514397][ C2] ? mark_held_locks (kernel/locking/lockdep.c:4274) [ 1258.514544][ C2] free_to_partial_list (mm/slub.c:4026) [ 1258.514692][ C2] ? qlist_free_all (mm/kasan/quarantine.c:163 mm/kasan/quarantine.c:179) [ 1258.514843][ C2] qlist_free_all (mm/kasan/quarantine.c:174) [ 1258.514990][ C2] kasan_quarantine_reduce (./include/linux/srcu.h:285 mm/kasan/quarantine.c:287) [ 1258.515137][ C2] __kasan_slab_alloc (mm/kasan/common.c:322) [ 1258.515284][ C2] kmem_cache_alloc (./include/linux/kasan.h:201 mm/slub.c:3798 mm/slub.c:3845 mm/slub.c:3852) [ 1258.515433][ C2] anon_vma_fork (mm/rmap.c:94 mm/rmap.c:361) [ 1258.515581][ C2] ? __init_rwsem (./arch/x86/include/asm/atomic.h:28 ./include/linux/atomic/atomic-arch-fallback.h:503 ./include/linux/atomic/atomic-instrumented.h:68 ./include/linux/osq_lock.h:25 kernel/locking/rwsem.c:328) [ 1258.515730][ C2] dup_mmap (kernel/fork.c:714) [ 1258.515843][ C2] ? __pfx_dup_mmap (kernel/fork.c:630) [ 1258.515995][ C2] ? mm_init.isra.0 (./arch/x86/include/asm/atomic.h:97 ./include/linux/atomic/atomic-arch-fallback.h:749 ./include/linux/atomic/atomic-instrumented.h:253 ./include/linux/refcount.h:184 ./include/linux/refcount.h:241 ./include/linux/refcount.h:258 ./include/linux/user_namespace.h:162 kernel/fork.c:1307) [ 1258.516145][ C2] ? __raw_spin_lock_init (kernel/locking/spinlock_debug.c:27) [ 1258.516293][ C2] copy_mm (kernel/fork.c:1688 kernel/fork.c:1736) [ 1258.516403][ C2] copy_process (kernel/fork.c:2389) [ 1258.516552][ C2] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228) [ 1258.516700][ C2] ? __pfx_copy_process (kernel/fork.c:2138) [ 1258.516851][ C2] ? call_rcu_zapped (kernel/locking/lockdep.c:6200) [ 1258.517000][ C2] kernel_clone (./include/linux/random.h:26 kernel/fork.c:2797) [ 1258.517146][ C2] ? find_held_lock (kernel/locking/lockdep.c:5244) [ 1258.517298][ C2] ? __pfx_kernel_clone (kernel/fork.c:2756) [ 1258.517452][ C2] ? __lock_release (kernel/locking/lockdep.c:5430) [ 1258.517600][ C2] ? __might_fault (mm/memory.c:6216 mm/memory.c:6209) [ 1258.517749][ C2] ? __pfx___lock_release (kernel/locking/lockdep.c:5406) [ 1258.517896][ C2] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 52)) [ 1258.518041][ C2] ? lockdep_hardirqs_on_prepare.part.0 (kernel/locking/lockdep.c:4300 kernel/locking/lockdep.c:4359) [ 1258.518224][ C2] ? __might_fault (mm/memory.c:6216 mm/memory.c:6209) [ 1258.518371][ C2] ? lock_acquire (kernel/locking/lockdep.c:5727) [ 1258.518519][ C2] ? __might_fault (mm/memory.c:6216 mm/memory.c:6209) [ 1258.518670][ C2] __do_sys_clone (kernel/fork.c:2928) [ 1258.518815][ C2] ? __pfx___do_sys_clone (kernel/fork.c:2928) [ 1258.518965][ C2] ? lockdep_hardirqs_on_prepare.part.0 (kernel/locking/lockdep.c:4300 kernel/locking/lockdep.c:4359) [ 1258.519148][ C2] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 1258.519294][ C2] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129) [ 1258.519474][ C2] RIP: 0033:0x7f9d21f0fa17 [ 1258.519625][ C2] Code: 00 00 00 f3 0f 1e fa 64 48 8b 04 25 10 00 00 00 45 31 c0 31 d2 31 f6 bf 11 00 20 01 4c 8d 90 d0 02 00 00 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 39 41 89 c0 85 c0 75 2a 64 48 8b 04 25 10 00 All code ======== 0: 00 00 add %al,(%rax) 2: 00 f3 add %dh,%bl 4: 0f 1e fa nop %edx 7: 64 48 8b 04 25 10 00 mov %fs:0x10,%rax e: 00 00 10: 45 31 c0 xor %r8d,%r8d 13: 31 d2 xor %edx,%edx 15: 31 f6 xor %esi,%esi 17: bf 11 00 20 01 mov $0x1200011,%edi 1c: 4c 8d 90 d0 02 00 00 lea 0x2d0(%rax),%r10 23: b8 38 00 00 00 mov $0x38,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 39 ja 0x6b 32: 41 89 c0 mov %eax,%r8d 35: 85 c0 test %eax,%eax 37: 75 2a jne 0x63 39: 64 fs 3a: 48 rex.W 3b: 8b .byte 0x8b 3c: 04 25 add $0x25,%al 3e: 10 00 adc %al,(%rax) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 39 ja 0x41 8: 41 89 c0 mov %eax,%r8d b: 85 c0 test %eax,%eax d: 75 2a jne 0x39 f: 64 fs 10: 48 rex.W 11: 8b .byte 0x8b 12: 04 25 add $0x25,%al 14: 10 00 adc %al,(%rax) [ 1258.520142][ C2] RSP: 002b:00007ffd37e87cf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1258.520364][ C2] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f9d21f0fa17 [ 1258.520582][ C2] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1258.520805][ C2] RBP: 0000000000000000 R08: 0000000000000000 R09: 0027746e6553205c [ 1258.521035][ C2] R10: 00007f9d21df4a10 R11: 0000000000000246 R12: 0000000000000000 [ 1258.521253][ C2] R13: 00007ffd37e87e30 R14: 00005647c6009f27 R15: 00005647fab4eba0 | [ 1258.521585][ C2] ================================================================== | [ 1258.521830][ C2] Disabling lock debugging due to kernel taint | [ 1258.522054][ C2] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI | [ 1258.522374][ C2] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 1258.522875][ C2] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 1258.523196][ C2] RIP: 0010:sock_def_write_space_wfree (./arch/x86/include/asm/bitops.h:206 ./arch/x86/include/asm/bitops.h:238 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 net/core/sock.c:3397) [ 1258.523383][ C2] Code: 00 4c 8b bb a0 01 00 00 be 08 00 00 00 4d 8d 77 08 4c 89 f7 e8 e0 0e 8b fe 4c 89 f2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 fe 00 00 00 49 8b 47 08 a8 04 0f 85 dc fe ff ff All code ======== 0: 00 4c 8b bb add %cl,-0x45(%rbx,%rcx,4) 4: a0 01 00 00 be 08 00 movabs 0x8be000001,%al b: 00 00 d: 4d 8d 77 08 lea 0x8(%r15),%r14 11: 4c 89 f7 mov %r14,%rdi 14: e8 e0 0e 8b fe call 0xfffffffffe8b0ef9 19: 4c 89 f2 mov %r14,%rdx 1c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 23: fc ff df 26: 48 c1 ea 03 shr $0x3,%rdx 2a:* 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 fe 00 00 00 jne 0x132 34: 49 8b 47 08 mov 0x8(%r15),%rax 38: a8 04 test $0x4,%al 3a: 0f 85 dc fe ff ff jne 0xffffffffffffff1c Code starting with the faulting instruction =========================================== 0: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 4: 0f 85 fe 00 00 00 jne 0x108 a: 49 8b 47 08 mov 0x8(%r15),%rax e: a8 04 test $0x4,%al 10: 0f 85 dc fe ff ff jne 0xfffffffffffffef2 [ 1258.523905][ C2] RSP: 0018:ffffc90000230c30 EFLAGS: 00010202 [ 1258.524099][ C2] RAX: dffffc0000000000 RBX: ffff888012617740 RCX: ffffffffb679564a [ 1258.524320][ C2] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffffbbcfda00 [ 1258.524536][ C2] RBP: ffff8880126177a0 R08: 0000000000000001 R09: fffffbfff779fb40 [ 1258.524753][ C2] R10: ffffffffbbcfda07 R11: 205d324320202020 R12: 0000000000000000 [ 1258.524967][ C2] R13: ffff8880126178c0 R14: 0000000000000008 R15: 0000000000000000 [ 1258.525188][ C2] FS: 00007f9d21df4740(0000) GS:ffff888036100000(0000) knlGS:0000000000000000 [ 1258.525444][ C2] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1258.525628][ C2] CR2: 00005647c6036054 CR3: 0000000005f08004 CR4: 0000000000770ef0 [ 1258.525842][ C2] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1258.526058][ C2] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1258.526275][ C2] PKRU: 55555554 [ 1258.526385][ C2] Call Trace: [ 1258.526496][ C2] [ 1258.526573][ C2] ? die_addr (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:460) [ 1258.526685][ C2] ? exc_general_protection (arch/x86/kernel/traps.c:702 arch/x86/kernel/traps.c:644) [ 1258.526834][ C2] ? asm_exc_general_protection (./arch/x86/include/asm/idtentry.h:617) [ 1258.526980][ C2] ? add_taint (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 kernel/panic.c:555) [ 1258.527092][ C2] ? sock_def_write_space_wfree (./arch/x86/include/asm/bitops.h:206 ./arch/x86/include/asm/bitops.h:238 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 net/core/sock.c:3397) [ 1258.527272][ C2] sock_wfree (./include/linux/rcupdate.h:810 net/core/sock.c:2471) [ 1258.527388][ C2] skb_release_head_state (net/core/skbuff.c:1162 (discriminator 3)) [ 1258.527533][ C2] consume_skb (net/core/skbuff.c:1174 net/core/skbuff.c:1189 net/core/skbuff.c:1405 net/core/skbuff.c:1399) [ 1258.527642][ C2] dummy_xmit (drivers/net/dummy.c:66) [ 1258.527751][ C2] ? trace_net_dev_start_xmit (./include/trace/events/net.h:14 (discriminator 52)) [ 1258.527896][ C2] dev_hard_start_xmit (./include/linux/netdevice.h:4875 ./include/linux/netdevice.h:4889 net/core/dev.c:3563 net/core/dev.c:3579) [ 1258.528041][ C2] sch_direct_xmit (net/sched/sch_generic.c:343) [ 1258.528188][ C2] ? __pfx_sch_direct_xmit (net/sched/sch_generic.c:318) [ 1258.528333][ C2] __qdisc_run (net/sched/sch_generic.c:416) [ 1258.528483][ C2] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5719) [ 1258.528628][ C2] ? __pfx___qdisc_run (net/sched/sch_generic.c:412) [ 1258.528772][ C2] ? do_raw_spin_lock (./arch/x86/include/asm/atomic.h:115 ./include/linux/atomic/atomic-arch-fallback.h:2170 ./include/linux/atomic/atomic-instrumented.h:1302 ./include/asm-generic/qspinlock.h:111 kernel/locking/spinlock_debug.c:116) [ 1258.528917][ C2] ? __pfx_do_raw_spin_lock (kernel/locking/spinlock_debug.c:114) [ 1258.529062][ C2] ? lock_acquire (kernel/locking/lockdep.c:5727) [ 1258.529205][ C2] ? net_tx_action (./include/linux/spinlock.h:352 net/core/dev.c:5250) [ 1258.529350][ C2] net_tx_action (./include/net/sch_generic.h:217 ./include/net/pkt_sched.h:128 ./include/net/pkt_sched.h:124 net/core/dev.c:5266) [ 1258.529494][ C2] __do_softirq (kernel/softirq.c:554) [ 1258.529640][ C2] irq_exit_rcu (kernel/softirq.c:428 kernel/softirq.c:633 kernel/softirq.c:645) [ 1258.529755][ C2] sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1043 arch/x86/kernel/apic/apic.c:1043) [ 1258.529901][ C2] [ 1258.529976][ C2] [ 1258.530050][ C2] asm_sysvec_apic_timer_interrupt (./arch/x86/include/asm/idtentry.h:702) [ 1258.530230][ C2] RIP: 0010:stack_depot_save_flags (./include/linux/jhash.h:122 lib/stackdepot.c:514 lib/stackdepot.c:614) [ 1258.530422][ C2] Code: 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 44 89 f2 48 8d 04 12 89 c6 8d 3c 85 7b 71 f5 75 83 f8 03 0f 86 1c 03 00 00 <41> 89 fc 89 f8 48 89 e9 44 8b 01 44 03 61 08 83 ee 03 48 83 c1 0c All code ======== 0: 89 e8 mov %ebp,%eax 2: 5b pop %rbx 3: 5d pop %rbp 4: 41 5c pop %r12 6: 41 5d pop %r13 8: 41 5e pop %r14 a: 41 5f pop %r15 c: c3 ret d: cc int3 e: cc int3 f: cc int3 10: cc int3 11: 44 89 f2 mov %r14d,%edx 14: 48 8d 04 12 lea (%rdx,%rdx,1),%rax 18: 89 c6 mov %eax,%esi 1a: 8d 3c 85 7b 71 f5 75 lea 0x75f5717b(,%rax,4),%edi 21: 83 f8 03 cmp $0x3,%eax 24: 0f 86 1c 03 00 00 jbe 0x346 2a:* 41 89 fc mov %edi,%r12d <-- trapping instruction 2d: 89 f8 mov %edi,%eax 2f: 48 89 e9 mov %rbp,%rcx 32: 44 8b 01 mov (%rcx),%r8d 35: 44 03 61 08 add 0x8(%rcx),%r12d 39: 83 ee 03 sub $0x3,%esi 3c: 48 83 c1 0c add $0xc,%rcx Code starting with the faulting instruction =========================================== 0: 41 89 fc mov %edi,%r12d 3: 89 f8 mov %edi,%eax 5: 48 89 e9 mov %rbp,%rcx 8: 44 8b 01 mov (%rcx),%r8d b: 44 03 61 08 add 0x8(%rcx),%r12d f: 83 ee 03 sub $0x3,%esi 12: 48 83 c1 0c add $0xc,%rcx [ 1258.530941][ C2] RSP: 0018:ffffc90000bdf7b0 EFLAGS: 00000202 [ 1258.531123][ C2] RAX: 0000000000000016 RBX: 0000000000002800 RCX: 0000000000000001 [ 1258.531337][ C2] RDX: 000000000000000b RSI: 0000000000000016 RDI: 0000000075f571d3 [ 1258.531552][ C2] RBP: ffffc90000bdf810 R08: ffffffffb6bc8d4c R09: fffffbfff75b2bea [ 1258.531766][ C2] R10: ffffffffbad95f57 R11: ffffc90000bdf719 R12: 0000000000000000 [ 1258.531983][ C2] R13: 0000000000000000 R14: 000000000000000b R15: 0000000000000001 [ 1258.532291][ C2] ? is_bpf_text_address (./include/linux/rcupdate.h:339 ./include/linux/rcupdate.h:814 kernel/bpf/core.c:769) [ 1258.532438][ C2] set_track_prepare (mm/slub.c:889) [ 1258.532581][ C2] ? kasan_quarantine_reduce (./include/linux/srcu.h:285 mm/kasan/quarantine.c:287) [ 1258.532725][ C2] ? __kasan_slab_alloc (mm/kasan/common.c:322) [ 1258.532871][ C2] ? kmem_cache_alloc (./include/linux/kasan.h:201 mm/slub.c:3798 mm/slub.c:3845 mm/slub.c:3852) [ 1258.533110][ C2] ? anon_vma_fork (mm/rmap.c:94 mm/rmap.c:361) [ 1258.533260][ C2] ? dup_mmap (kernel/fork.c:714) [ 1258.533403][ C2] ? copy_mm (kernel/fork.c:1688 kernel/fork.c:1736) [ 1258.533510][ C2] ? copy_process (kernel/fork.c:2389) [ 1258.533652][ C2] ? kernel_clone (./include/linux/random.h:26 kernel/fork.c:2797) [ 1258.533796][ C2] ? __do_sys_clone (kernel/fork.c:2928) [ 1258.533939][ C2] ? do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 1258.534084][ C2] ? entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129) [ 1258.534266][ C2] ? mark_held_locks (kernel/locking/lockdep.c:4274) [ 1258.534410][ C2] free_to_partial_list (mm/slub.c:4026) [ 1258.534556][ C2] ? qlist_free_all (mm/kasan/quarantine.c:163 mm/kasan/quarantine.c:179) [ 1258.534701][ C2] qlist_free_all (mm/kasan/quarantine.c:174) [ 1258.534952][ C2] kasan_quarantine_reduce (./include/linux/srcu.h:285 mm/kasan/quarantine.c:287) [ 1258.535095][ C2] __kasan_slab_alloc (mm/kasan/common.c:322) [ 1258.535239][ C2] kmem_cache_alloc (./include/linux/kasan.h:201 mm/slub.c:3798 mm/slub.c:3845 mm/slub.c:3852) [ 1258.535383][ C2] anon_vma_fork (mm/rmap.c:94 mm/rmap.c:361) [ 1258.535527][ C2] ? __init_rwsem (./arch/x86/include/asm/atomic.h:28 ./include/linux/atomic/atomic-arch-fallback.h:503 ./include/linux/atomic/atomic-instrumented.h:68 ./include/linux/osq_lock.h:25 kernel/locking/rwsem.c:328) [ 1258.535673][ C2] dup_mmap (kernel/fork.c:714) [ 1258.535785][ C2] ? __pfx_dup_mmap (kernel/fork.c:630) [ 1258.535929][ C2] ? mm_init.isra.0 (./arch/x86/include/asm/atomic.h:97 ./include/linux/atomic/atomic-arch-fallback.h:749 ./include/linux/atomic/atomic-instrumented.h:253 ./include/linux/refcount.h:184 ./include/linux/refcount.h:241 ./include/linux/refcount.h:258 ./include/linux/user_namespace.h:162 kernel/fork.c:1307) [ 1258.536076][ C2] ? __raw_spin_lock_init (kernel/locking/spinlock_debug.c:27) [ 1258.536219][ C2] copy_mm (kernel/fork.c:1688 kernel/fork.c:1736) [ 1258.536327][ C2] copy_process (kernel/fork.c:2389) [ 1258.536472][ C2] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228) [ 1258.536621][ C2] ? __pfx_copy_process (kernel/fork.c:2138) [ 1258.536769][ C2] ? call_rcu_zapped (kernel/locking/lockdep.c:6200) [ 1258.536913][ C2] kernel_clone (./include/linux/random.h:26 kernel/fork.c:2797) [ 1258.537058][ C2] ? find_held_lock (kernel/locking/lockdep.c:5244) [ 1258.537202][ C2] ? __pfx_kernel_clone (kernel/fork.c:2756) [ 1258.537344][ C2] ? __lock_release (kernel/locking/lockdep.c:5430) [ 1258.537573][ C2] ? __might_fault (mm/memory.c:6216 mm/memory.c:6209) [ 1258.537717][ C2] ? __pfx___lock_release (kernel/locking/lockdep.c:5406) [ 1258.537860][ C2] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 52)) [ 1258.538003][ C2] ? lockdep_hardirqs_on_prepare.part.0 (kernel/locking/lockdep.c:4300 kernel/locking/lockdep.c:4359) [ 1258.538267][ C2] ? __might_fault (mm/memory.c:6216 mm/memory.c:6209) [ 1258.538414][ C2] ? lock_acquire (kernel/locking/lockdep.c:5727) [ 1258.538556][ C2] ? __might_fault (mm/memory.c:6216 mm/memory.c:6209) [ 1258.538699][ C2] __do_sys_clone (kernel/fork.c:2928) [ 1258.538940][ C2] ? __pfx___do_sys_clone (kernel/fork.c:2928) [ 1258.539086][ C2] ? lockdep_hardirqs_on_prepare.part.0 (kernel/locking/lockdep.c:4300 kernel/locking/lockdep.c:4359) [ 1258.539266][ C2] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 1258.539411][ C2] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129) [ 1258.539588][ C2] RIP: 0033:0x7f9d21f0fa17 [ 1258.539738][ C2] Code: 00 00 00 f3 0f 1e fa 64 48 8b 04 25 10 00 00 00 45 31 c0 31 d2 31 f6 bf 11 00 20 01 4c 8d 90 d0 02 00 00 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 39 41 89 c0 85 c0 75 2a 64 48 8b 04 25 10 00 All code ======== 0: 00 00 add %al,(%rax) 2: 00 f3 add %dh,%bl 4: 0f 1e fa nop %edx 7: 64 48 8b 04 25 10 00 mov %fs:0x10,%rax e: 00 00 10: 45 31 c0 xor %r8d,%r8d 13: 31 d2 xor %edx,%edx 15: 31 f6 xor %esi,%esi 17: bf 11 00 20 01 mov $0x1200011,%edi 1c: 4c 8d 90 d0 02 00 00 lea 0x2d0(%rax),%r10 23: b8 38 00 00 00 mov $0x38,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 39 ja 0x6b 32: 41 89 c0 mov %eax,%r8d 35: 85 c0 test %eax,%eax 37: 75 2a jne 0x63 39: 64 fs 3a: 48 rex.W 3b: 8b .byte 0x8b 3c: 04 25 add $0x25,%al 3e: 10 00 adc %al,(%rax) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 39 ja 0x41 8: 41 89 c0 mov %eax,%r8d b: 85 c0 test %eax,%eax d: 75 2a jne 0x39 f: 64 fs 10: 48 rex.W 11: 8b .byte 0x8b 12: 04 25 add $0x25,%al 14: 10 00 adc %al,(%rax) [ 1258.540244][ C2] RSP: 002b:00007ffd37e87cf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1258.540460][ C2] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f9d21f0fa17 [ 1258.540671][ C2] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1258.540987][ C2] RBP: 0000000000000000 R08: 0000000000000000 R09: 0027746e6553205c [ 1258.541199][ C2] R10: 00007f9d21df4a10 R11: 0000000000000246 R12: 0000000000000000 Finger prints: dump_stack_lvl:kasan_report:kasan_check_range:sock_def_write_space_wfree sock_def_write_space_wfree:sock_wfree:skb_release_head_state:consume_skb