======================================
| [ 358.133799][ C0] ==================================================================
| [ 358.134053][ C0] BUG: KASAN: null-ptr-deref in sock_def_write_space_wfree (./arch/x86/include/asm/bitops.h:206 ./arch/x86/include/asm/bitops.h:238 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 net/core/sock.c:3397)
| [ 358.134281][ C0] Read of size 8 at addr 0000000000000008 by task fq_band_pktlimi/2649
| [ 358.134498][ C0]
[ 358.134843][ C0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 358.135167][ C0] Call Trace:
[ 358.135288][ C0]
[ 358.135366][ C0] dump_stack_lvl (lib/dump_stack.c:117)
[ 358.135522][ C0] kasan_report (mm/kasan/report.c:603)
[ 358.135637][ C0] ? sock_def_write_space_wfree (./arch/x86/include/asm/bitops.h:206 ./arch/x86/include/asm/bitops.h:238 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 net/core/sock.c:3397)
[ 358.135821][ C0] kasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189)
[ 358.135966][ C0] sock_def_write_space_wfree (./arch/x86/include/asm/bitops.h:206 ./arch/x86/include/asm/bitops.h:238 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 net/core/sock.c:3397)
[ 358.136109][ C0] sock_wfree (./include/linux/rcupdate.h:810 net/core/sock.c:2471)
[ 358.136223][ C0] skb_release_head_state (net/core/skbuff.c:1162 (discriminator 3))
[ 358.136370][ C0] consume_skb (net/core/skbuff.c:1174 net/core/skbuff.c:1189 net/core/skbuff.c:1405 net/core/skbuff.c:1399)
[ 358.136479][ C0] dummy_xmit (drivers/net/dummy.c:66)
[ 358.136593][ C0] ? trace_net_dev_start_xmit (./include/trace/events/net.h:14 (discriminator 52))
[ 358.136738][ C0] dev_hard_start_xmit (./include/linux/netdevice.h:4875 ./include/linux/netdevice.h:4889 net/core/dev.c:3563 net/core/dev.c:3579)
[ 358.136885][ C0] sch_direct_xmit (net/sched/sch_generic.c:343)
[ 358.137030][ C0] ? __pfx_sch_direct_xmit (net/sched/sch_generic.c:318)
[ 358.137180][ C0] __qdisc_run (net/sched/sch_generic.c:416)
[ 358.137324][ C0] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5719)
[ 358.137476][ C0] ? __pfx___qdisc_run (net/sched/sch_generic.c:412)
[ 358.137618][ C0] ? do_raw_spin_lock (./arch/x86/include/asm/atomic.h:115 ./include/linux/atomic/atomic-arch-fallback.h:2170 ./include/linux/atomic/atomic-instrumented.h:1302 ./include/asm-generic/qspinlock.h:111 kernel/locking/spinlock_debug.c:116)
[ 358.137765][ C0] ? __pfx_do_raw_spin_lock (kernel/locking/spinlock_debug.c:114)
[ 358.137914][ C0] ? lock_acquire (kernel/locking/lockdep.c:5727)
[ 358.138057][ C0] ? net_tx_action (./include/linux/spinlock.h:352 net/core/dev.c:5250)
[ 358.138200][ C0] net_tx_action (./include/net/sch_generic.h:217 ./include/net/pkt_sched.h:128 ./include/net/pkt_sched.h:124 net/core/dev.c:5266)
[ 358.138345][ C0] __do_softirq (kernel/softirq.c:554)
[ 358.138491][ C0] irq_exit_rcu (kernel/softirq.c:428 kernel/softirq.c:633 kernel/softirq.c:645)
[ 358.138600][ C0] sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1043 arch/x86/kernel/apic/apic.c:1043)
[ 358.138745][ C0]
[ 358.138819][ C0]
[ 358.138895][ C0] asm_sysvec_apic_timer_interrupt (./arch/x86/include/asm/idtentry.h:702)
[ 358.139073][ C0] RIP: 0010:_raw_spin_unlock_irqrestore (./include/linux/spinlock_api_smp.h:152 kernel/locking/spinlock.c:194)
[ 358.139260][ C0] Code: 10 e8 b1 00 79 fd 48 89 ef e8 e9 70 79 fd 81 e3 00 02 00 00 75 1d 9c 58 f6 c4 02 75 29 48 85 db 74 01 fb 65 ff 0d 15 5c 0d 77 <74> 0e 5b 5d c3 cc cc cc cc e8 0f d1 9c fd eb dc 0f 1f 44 00 00 5b
All code
========
0: 10 e8 adc %ch,%al
2: b1 00 mov $0x0,%cl
4: 79 fd jns 0x3
6: 48 89 ef mov %rbp,%rdi
9: e8 e9 70 79 fd call 0xfffffffffd7970f7
e: 81 e3 00 02 00 00 and $0x200,%ebx
14: 75 1d jne 0x33
16: 9c pushf
17: 58 pop %rax
18: f6 c4 02 test $0x2,%ah
1b: 75 29 jne 0x46
1d: 48 85 db test %rbx,%rbx
20: 74 01 je 0x23
22: fb sti
23: 65 ff 0d 15 5c 0d 77 decl %gs:0x770d5c15(%rip) # 0x770d5c3f
2a:* 74 0e je 0x3a <-- trapping instruction
2c: 5b pop %rbx
2d: 5d pop %rbp
2e: c3 ret
2f: cc int3
30: cc int3
31: cc int3
32: cc int3
33: e8 0f d1 9c fd call 0xfffffffffd9cd147
38: eb dc jmp 0x16
3a: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
3f: 5b pop %rbx
Code starting with the faulting instruction
===========================================
0: 74 0e je 0x10
2: 5b pop %rbx
3: 5d pop %rbp
4: c3 ret
5: cc int3
6: cc int3
7: cc int3
8: cc int3
9: e8 0f d1 9c fd call 0xfffffffffd9cd11d
e: eb dc jmp 0xffffffffffffffec
10: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
15: 5b pop %rbx
[ 358.139764][ C0] RSP: 0018:ffffc90000ddf860 EFLAGS: 00000282
[ 358.139954][ C0] RAX: 0000000000000006 RBX: 0000000000000200 RCX: 1ffffffff1847c8b
[ 358.140184][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff88f66dc1
[ 358.140404][ C0] RBP: ffff8880010bf940 R08: 0000000000000001 R09: fffffbfff18432af
[ 358.140624][ C0] R10: ffffffff8c21957f R11: 0000000000000008 R12: ffff8880010bf940
[ 358.140841][ C0] R13: ffffea0000129880 R14: ffff88800196aac0 R15: ffff888004a62238
[ 358.141066][ C0] ? _raw_spin_unlock_irqrestore (./include/linux/spinlock_api_smp.h:151 kernel/locking/spinlock.c:194)
[ 358.141248][ C0] get_partial_node.part.0 (mm/slub.c:2623)
[ 358.141396][ C0] ___slab_alloc (mm/slub.c:2583 mm/slub.c:2701 mm/slub.c:3505)
[ 358.141543][ C0] ? kmem_cache_alloc (./include/linux/sched/mm.h:315 mm/slub.c:3746 mm/slub.c:3827 mm/slub.c:3852)
[ 358.141688][ C0] ? vm_area_dup (kernel/fork.c:482)
[ 358.141834][ C0] ? __pfx___lock_release (kernel/locking/lockdep.c:5406)
[ 358.141984][ C0] ? vm_area_dup (kernel/fork.c:482)
[ 358.142126][ C0] ? kmem_cache_alloc (mm/slub.c:3610 mm/slub.c:3663 mm/slub.c:3835 mm/slub.c:3852)
[ 358.142272][ C0] kmem_cache_alloc (mm/slub.c:3610 mm/slub.c:3663 mm/slub.c:3835 mm/slub.c:3852)
[ 358.142423][ C0] vm_area_dup (kernel/fork.c:482)
[ 358.142532][ C0] dup_mmap (kernel/fork.c:697)
[ 358.142640][ C0] ? __pfx_dup_mmap (kernel/fork.c:630)
[ 358.142786][ C0] ? mm_init.isra.0 (./arch/x86/include/asm/atomic.h:97 ./include/linux/atomic/atomic-arch-fallback.h:749 ./include/linux/atomic/atomic-instrumented.h:253 ./include/linux/refcount.h:184 ./include/linux/refcount.h:241 ./include/linux/refcount.h:258 ./include/linux/user_namespace.h:162 kernel/fork.c:1307)
[ 358.142933][ C0] ? __raw_spin_lock_init (kernel/locking/spinlock_debug.c:27)
[ 358.143079][ C0] copy_mm (kernel/fork.c:1688 kernel/fork.c:1736)
[ 358.143188][ C0] copy_process (kernel/fork.c:2389)
[ 358.143331][ C0] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228)
[ 358.143483][ C0] ? __pfx_copy_process (kernel/fork.c:2138)
[ 358.143629][ C0] ? call_rcu_zapped (kernel/locking/lockdep.c:6200)
[ 358.143774][ C0] kernel_clone (./include/linux/random.h:26 kernel/fork.c:2797)
[ 358.143916][ C0] ? find_held_lock (kernel/locking/lockdep.c:5244)
[ 358.144060][ C0] ? __pfx_kernel_clone (kernel/fork.c:2756)
[ 358.144205][ C0] ? __lock_release (kernel/locking/lockdep.c:5430)
[ 358.144350][ C0] ? __might_fault (mm/memory.c:6216 mm/memory.c:6209)
[ 358.144495][ C0] ? __pfx___lock_release (kernel/locking/lockdep.c:5406)
[ 358.144661][ C0] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 52))
[ 358.144805][ C0] ? lockdep_hardirqs_on_prepare.part.0 (kernel/locking/lockdep.c:4300 kernel/locking/lockdep.c:4359)
[ 358.144986][ C0] ? __might_fault (mm/memory.c:6216 mm/memory.c:6209)
[ 358.145134][ C0] ? lock_acquire (kernel/locking/lockdep.c:5727)
[ 358.145280][ C0] ? __might_fault (mm/memory.c:6216 mm/memory.c:6209)
[ 358.145425][ C0] __do_sys_clone (kernel/fork.c:2928)
[ 358.145569][ C0] ? __pfx___do_sys_clone (kernel/fork.c:2928)
[ 358.145716][ C0] ? lockdep_hardirqs_on_prepare.part.0 (kernel/locking/lockdep.c:4300 kernel/locking/lockdep.c:4359)
[ 358.145898][ C0] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
[ 358.146043][ C0] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129)
[ 358.146223][ C0] RIP: 0033:0x7ff09f8dda17
[ 358.146370][ C0] Code: 00 00 00 f3 0f 1e fa 64 48 8b 04 25 10 00 00 00 45 31 c0 31 d2 31 f6 bf 11 00 20 01 4c 8d 90 d0 02 00 00 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 39 41 89 c0 85 c0 75 2a 64 48 8b 04 25 10 00
All code
========
0: 00 00 add %al,(%rax)
2: 00 f3 add %dh,%bl
4: 0f 1e fa nop %edx
7: 64 48 8b 04 25 10 00 mov %fs:0x10,%rax
e: 00 00
10: 45 31 c0 xor %r8d,%r8d
13: 31 d2 xor %edx,%edx
15: 31 f6 xor %esi,%esi
17: bf 11 00 20 01 mov $0x1200011,%edi
1c: 4c 8d 90 d0 02 00 00 lea 0x2d0(%rax),%r10
23: b8 38 00 00 00 mov $0x38,%eax
28: 0f 05 syscall
2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction
30: 77 39 ja 0x6b
32: 41 89 c0 mov %eax,%r8d
35: 85 c0 test %eax,%eax
37: 75 2a jne 0x63
39: 64 fs
3a: 48 rex.W
3b: 8b .byte 0x8b
3c: 04 25 add $0x25,%al
3e: 10 00 adc %al,(%rax)
Code starting with the faulting instruction
===========================================
0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax
6: 77 39 ja 0x41
8: 41 89 c0 mov %eax,%r8d
b: 85 c0 test %eax,%eax
d: 75 2a jne 0x39
f: 64 fs
10: 48 rex.W
11: 8b .byte 0x8b
12: 04 25 add $0x25,%al
14: 10 00 adc %al,(%rax)
[ 358.146873][ C0] RSP: 002b:00007ffd4eaed1d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 358.147093][ C0] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007ff09f8dda17
[ 358.147313][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
[ 358.147528][ C0] RBP: 0000000000000000 R08: 0000000000000000 R09: 0027746e6553205c
[ 358.147741][ C0] R10: 00007ff09f7c2a10 R11: 0000000000000246 R12: 0000000000000000
[ 358.147956][ C0] R13: 00007ffd4eaed310 R14: 000056044ed90f27 R15: 000056047f41bba0
| [ 358.148284][ C0] ==================================================================
| [ 358.148510][ C0] Disabling lock debugging due to kernel taint
| [ 358.148709][ C0] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI
| [ 358.149019][ C0] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
[ 358.149472][ C0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 358.149793][ C0] RIP: 0010:sock_def_write_space_wfree (./arch/x86/include/asm/bitops.h:206 ./arch/x86/include/asm/bitops.h:238 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 net/core/sock.c:3397)
[ 358.149974][ C0] Code: 00 4c 8b bb a0 01 00 00 be 08 00 00 00 4d 8d 77 08 4c 89 f7 e8 e0 0e 8b fe 4c 89 f2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 fe 00 00 00 49 8b 47 08 a8 04 0f 85 dc fe ff ff
All code
========
0: 00 4c 8b bb add %cl,-0x45(%rbx,%rcx,4)
4: a0 01 00 00 be 08 00 movabs 0x8be000001,%al
b: 00 00
d: 4d 8d 77 08 lea 0x8(%r15),%r14
11: 4c 89 f7 mov %r14,%rdi
14: e8 e0 0e 8b fe call 0xfffffffffe8b0ef9
19: 4c 89 f2 mov %r14,%rdx
1c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
23: fc ff df
26: 48 c1 ea 03 shr $0x3,%rdx
2a:* 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction
2e: 0f 85 fe 00 00 00 jne 0x132
34: 49 8b 47 08 mov 0x8(%r15),%rax
38: a8 04 test $0x4,%al
3a: 0f 85 dc fe ff ff jne 0xffffffffffffff1c
Code starting with the faulting instruction
===========================================
0: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1)
4: 0f 85 fe 00 00 00 jne 0x108
a: 49 8b 47 08 mov 0x8(%r15),%rax
e: a8 04 test $0x4,%al
10: 0f 85 dc fe ff ff jne 0xfffffffffffffef2
[ 358.150475][ C0] RSP: 0018:ffffc90000007c30 EFLAGS: 00010202
[ 358.150660][ C0] RAX: dffffc0000000000 RBX: ffff8880067b08c0 RCX: ffffffff8659564a
[ 358.150880][ C0] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff8bafda00
[ 358.151091][ C0] RBP: ffff8880067b0920 R08: 0000000000000001 R09: fffffbfff175fb40
[ 358.151306][ C0] R10: ffffffff8bafda07 R11: 205d304320202020 R12: 0000000000000000
[ 358.151517][ C0] R13: ffff8880067b0a40 R14: 0000000000000008 R15: 0000000000000000
[ 358.151731][ C0] FS: 00007ff09f7c2740(0000) GS:ffff888036000000(0000) knlGS:0000000000000000
[ 358.151986][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 358.152168][ C0] CR2: 000056044edbd054 CR3: 0000000004378006 CR4: 0000000000770ef0
[ 358.152469][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 358.152675][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 358.152890][ C0] PKRU: 55555554
[ 358.153088][ C0] Call Trace:
[ 358.153199][ C0]
[ 358.153273][ C0] ? die_addr (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:460)
[ 358.153382][ C0] ? exc_general_protection (arch/x86/kernel/traps.c:702 arch/x86/kernel/traps.c:644)
[ 358.153526][ C0] ? asm_exc_general_protection (./arch/x86/include/asm/idtentry.h:617)
[ 358.153759][ C0] ? add_taint (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 kernel/panic.c:555)
[ 358.153866][ C0] ? sock_def_write_space_wfree (./arch/x86/include/asm/bitops.h:206 ./arch/x86/include/asm/bitops.h:238 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 net/core/sock.c:3397)
[ 358.154049][ C0] sock_wfree (./include/linux/rcupdate.h:810 net/core/sock.c:2471)
[ 358.154162][ C0] skb_release_head_state (net/core/skbuff.c:1162 (discriminator 3))
[ 358.154307][ C0] consume_skb (net/core/skbuff.c:1174 net/core/skbuff.c:1189 net/core/skbuff.c:1405 net/core/skbuff.c:1399)
[ 358.154500][ C0] dummy_xmit (drivers/net/dummy.c:66)
[ 358.154651][ C0] ? trace_net_dev_start_xmit (./include/trace/events/net.h:14 (discriminator 52))
[ 358.154812][ C0] dev_hard_start_xmit (./include/linux/netdevice.h:4875 ./include/linux/netdevice.h:4889 net/core/dev.c:3563 net/core/dev.c:3579)
[ 358.154958][ C0] sch_direct_xmit (net/sched/sch_generic.c:343)
[ 358.155101][ C0] ? __pfx_sch_direct_xmit (net/sched/sch_generic.c:318)
[ 358.155357][ C0] __qdisc_run (net/sched/sch_generic.c:416)
[ 358.155497][ C0] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5719)
[ 358.155640][ C0] ? __pfx___qdisc_run (net/sched/sch_generic.c:412)
[ 358.155783][ C0] ? do_raw_spin_lock (./arch/x86/include/asm/atomic.h:115 ./include/linux/atomic/atomic-arch-fallback.h:2170 ./include/linux/atomic/atomic-instrumented.h:1302 ./include/asm-generic/qspinlock.h:111 kernel/locking/spinlock_debug.c:116)
[ 358.155927][ C0] ? __pfx_do_raw_spin_lock (kernel/locking/spinlock_debug.c:114)
[ 358.156068][ C0] ? lock_acquire (kernel/locking/lockdep.c:5727)
[ 358.156208][ C0] ? net_tx_action (./include/linux/spinlock.h:352 net/core/dev.c:5250)
[ 358.156355][ C0] net_tx_action (./include/net/sch_generic.h:217 ./include/net/pkt_sched.h:128 ./include/net/pkt_sched.h:124 net/core/dev.c:5266)
[ 358.156583][ C0] __do_softirq (kernel/softirq.c:554)
[ 358.156725][ C0] irq_exit_rcu (kernel/softirq.c:428 kernel/softirq.c:633 kernel/softirq.c:645)
[ 358.156833][ C0] sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1043 arch/x86/kernel/apic/apic.c:1043)
[ 358.156974][ C0]
[ 358.157047][ C0]
[ 358.157119][ C0] asm_sysvec_apic_timer_interrupt (./arch/x86/include/asm/idtentry.h:702)
[ 358.157393][ C0] RIP: 0010:_raw_spin_unlock_irqrestore (./include/linux/spinlock_api_smp.h:152 kernel/locking/spinlock.c:194)
[ 358.157585][ C0] Code: 10 e8 b1 00 79 fd 48 89 ef e8 e9 70 79 fd 81 e3 00 02 00 00 75 1d 9c 58 f6 c4 02 75 29 48 85 db 74 01 fb 65 ff 0d 15 5c 0d 77 <74> 0e 5b 5d c3 cc cc cc cc e8 0f d1 9c fd eb dc 0f 1f 44 00 00 5b
All code
========
0: 10 e8 adc %ch,%al
2: b1 00 mov $0x0,%cl
4: 79 fd jns 0x3
6: 48 89 ef mov %rbp,%rdi
9: e8 e9 70 79 fd call 0xfffffffffd7970f7
e: 81 e3 00 02 00 00 and $0x200,%ebx
14: 75 1d jne 0x33
16: 9c pushf
17: 58 pop %rax
18: f6 c4 02 test $0x2,%ah
1b: 75 29 jne 0x46
1d: 48 85 db test %rbx,%rbx
20: 74 01 je 0x23
22: fb sti
23: 65 ff 0d 15 5c 0d 77 decl %gs:0x770d5c15(%rip) # 0x770d5c3f
2a:* 74 0e je 0x3a <-- trapping instruction
2c: 5b pop %rbx
2d: 5d pop %rbp
2e: c3 ret
2f: cc int3
30: cc int3
31: cc int3
32: cc int3
33: e8 0f d1 9c fd call 0xfffffffffd9cd147
38: eb dc jmp 0x16
3a: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
3f: 5b pop %rbx
Code starting with the faulting instruction
===========================================
0: 74 0e je 0x10
2: 5b pop %rbx
3: 5d pop %rbp
4: c3 ret
5: cc int3
6: cc int3
7: cc int3
8: cc int3
9: e8 0f d1 9c fd call 0xfffffffffd9cd11d
e: eb dc jmp 0xffffffffffffffec
10: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
15: 5b pop %rbx
[ 358.158159][ C0] RSP: 0018:ffffc90000ddf860 EFLAGS: 00000282
[ 358.158336][ C0] RAX: 0000000000000006 RBX: 0000000000000200 RCX: 1ffffffff1847c8b
[ 358.158637][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff88f66dc1
[ 358.158857][ C0] RBP: ffff8880010bf940 R08: 0000000000000001 R09: fffffbfff18432af
[ 358.159069][ C0] R10: ffffffff8c21957f R11: 0000000000000008 R12: ffff8880010bf940
[ 358.159362][ C0] R13: ffffea0000129880 R14: ffff88800196aac0 R15: ffff888004a62238
[ 358.159670][ C0] ? _raw_spin_unlock_irqrestore (./include/linux/spinlock_api_smp.h:151 kernel/locking/spinlock.c:194)
[ 358.159843][ C0] get_partial_node.part.0 (mm/slub.c:2623)
[ 358.159990][ C0] ___slab_alloc (mm/slub.c:2583 mm/slub.c:2701 mm/slub.c:3505)
[ 358.160129][ C0] ? kmem_cache_alloc (./include/linux/sched/mm.h:315 mm/slub.c:3746 mm/slub.c:3827 mm/slub.c:3852)
[ 358.160359][ C0] ? vm_area_dup (kernel/fork.c:482)
[ 358.160501][ C0] ? __pfx___lock_release (kernel/locking/lockdep.c:5406)
[ 358.160644][ C0] ? vm_area_dup (kernel/fork.c:482)
[ 358.160787][ C0] ? kmem_cache_alloc (mm/slub.c:3610 mm/slub.c:3663 mm/slub.c:3835 mm/slub.c:3852)
[ 358.160931][ C0] kmem_cache_alloc (mm/slub.c:3610 mm/slub.c:3663 mm/slub.c:3835 mm/slub.c:3852)
[ 358.161165][ C0] vm_area_dup (kernel/fork.c:482)
[ 358.161271][ C0] dup_mmap (kernel/fork.c:697)
[ 358.161380][ C0] ? __pfx_dup_mmap (kernel/fork.c:630)
[ 358.161608][ C0] ? mm_init.isra.0 (./arch/x86/include/asm/atomic.h:97 ./include/linux/atomic/atomic-arch-fallback.h:749 ./include/linux/atomic/atomic-instrumented.h:253 ./include/linux/refcount.h:184 ./include/linux/refcount.h:241 ./include/linux/refcount.h:258 ./include/linux/user_namespace.h:162 kernel/fork.c:1307)
[ 358.161747][ C0] ? __raw_spin_lock_init (kernel/locking/spinlock_debug.c:27)
[ 358.161976][ C0] copy_mm (kernel/fork.c:1688 kernel/fork.c:1736)
[ 358.162082][ C0] copy_process (kernel/fork.c:2389)
[ 358.162230][ C0] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228)
[ 358.162372][ C0] ? __pfx_copy_process (kernel/fork.c:2138)
[ 358.162513][ C0] ? call_rcu_zapped (kernel/locking/lockdep.c:6200)
[ 358.162741][ C0] kernel_clone (./include/linux/random.h:26 kernel/fork.c:2797)
[ 358.162882][ C0] ? find_held_lock (kernel/locking/lockdep.c:5244)
[ 358.163023][ C0] ? __pfx_kernel_clone (kernel/fork.c:2756)
[ 358.163163][ C0] ? __lock_release (kernel/locking/lockdep.c:5430)
[ 358.163307][ C0] ? __might_fault (mm/memory.c:6216 mm/memory.c:6209)
[ 358.163537][ C0] ? __pfx___lock_release (kernel/locking/lockdep.c:5406)
[ 358.163762][ C0] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 52))
[ 358.163900][ C0] ? lockdep_hardirqs_on_prepare.part.0 (kernel/locking/lockdep.c:4300 kernel/locking/lockdep.c:4359)
[ 358.164077][ C0] ? __might_fault (mm/memory.c:6216 mm/memory.c:6209)
[ 358.164218][ C0] ? lock_acquire (kernel/locking/lockdep.c:5727)
[ 358.164438][ C0] ? __might_fault (mm/memory.c:6216 mm/memory.c:6209)
[ 358.164603][ C0] __do_sys_clone (kernel/fork.c:2928)
[ 358.164745][ C0] ? __pfx___do_sys_clone (kernel/fork.c:2928)
[ 358.164888][ C0] ? lockdep_hardirqs_on_prepare.part.0 (kernel/locking/lockdep.c:4300 kernel/locking/lockdep.c:4359)
[ 358.165151][ C0] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
[ 358.165294][ C0] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129)
[ 358.165465][ C0] RIP: 0033:0x7ff09f8dda17
[ 358.165608][ C0] Code: 00 00 00 f3 0f 1e fa 64 48 8b 04 25 10 00 00 00 45 31 c0 31 d2 31 f6 bf 11 00 20 01 4c 8d 90 d0 02 00 00 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 39 41 89 c0 85 c0 75 2a 64 48 8b 04 25 10 00
All code
========
0: 00 00 add %al,(%rax)
2: 00 f3 add %dh,%bl
4: 0f 1e fa nop %edx
7: 64 48 8b 04 25 10 00 mov %fs:0x10,%rax
e: 00 00
10: 45 31 c0 xor %r8d,%r8d
13: 31 d2 xor %edx,%edx
15: 31 f6 xor %esi,%esi
17: bf 11 00 20 01 mov $0x1200011,%edi
1c: 4c 8d 90 d0 02 00 00 lea 0x2d0(%rax),%r10
23: b8 38 00 00 00 mov $0x38,%eax
28: 0f 05 syscall
2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction
30: 77 39 ja 0x6b
32: 41 89 c0 mov %eax,%r8d
35: 85 c0 test %eax,%eax
37: 75 2a jne 0x63
39: 64 fs
3a: 48 rex.W
3b: 8b .byte 0x8b
3c: 04 25 add $0x25,%al
3e: 10 00 adc %al,(%rax)
Code starting with the faulting instruction
===========================================
0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax
6: 77 39 ja 0x41
8: 41 89 c0 mov %eax,%r8d
b: 85 c0 test %eax,%eax
d: 75 2a jne 0x39
f: 64 fs
10: 48 rex.W
11: 8b .byte 0x8b
12: 04 25 add $0x25,%al
14: 10 00 adc %al,(%rax)
[ 358.166185][ C0] RSP: 002b:00007ffd4eaed1d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 358.166488][ C0] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007ff09f8dda17
[ 358.166706][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
[ 358.166917][ C0] RBP: 0000000000000000 R08: 0000000000000000 R09: 0027746e6553205c
[ 358.167209][ C0] R10: 00007ff09f7c2a10 R11: 0000000000000246 R12: 0000000000000000
Finger prints:
dump_stack_lvl:kasan_report:kasan_check_range:sock_def_write_space_wfree
sock_def_write_space_wfree:sock_wfree:skb_release_head_state:consume_skb