====================================== | WAIT TIMEOUT stdout | | [ 892.389473][T10850] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI | [ 892.389842][T10850] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 892.390272][T10850] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [892.390599][T10850] RIP: 0010:__nh_valid_dump_req (./include/net/netlink.h:1680 net/ipv4/nexthop.c:3404) [ 892.390794][T10850] Code: ea 03 80 3c 02 00 0f 85 ab 02 00 00 48 8b 5e 70 48 85 db 74 73 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 33 All code ======== 0: ea (bad) 1: 03 80 3c 02 00 0f add 0xf00023c(%rax),%eax 7: 85 ab 02 00 00 48 test %ebp,0x48000002(%rbx) d: 8b 5e 70 mov 0x70(%rsi),%ebx 10: 48 85 db test %rbx,%rbx 13: 74 73 je 0x88 15: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1c: fc ff df 1f: 48 8d 7b 04 lea 0x4(%rbx),%rdi 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx 2a:* 0f b6 14 02 movzbl (%rdx,%rax,1),%edx <-- trapping instruction 2e: 48 89 f8 mov %rdi,%rax 31: 83 e0 07 and $0x7,%eax 34: 83 c0 03 add $0x3,%eax 37: 38 d0 cmp %dl,%al 39: 7c 08 jl 0x43 3b: 84 d2 test %dl,%dl 3d: 0f .byte 0xf 3e: 85 33 test %esi,(%rbx) Code starting with the faulting instruction =========================================== 0: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx 4: 48 89 f8 mov %rdi,%rax 7: 83 e0 07 and $0x7,%eax a: 83 c0 03 add $0x3,%eax d: 38 d0 cmp %dl,%al f: 7c 08 jl 0x19 11: 84 d2 test %dl,%dl 13: 0f .byte 0xf 14: 85 33 test %esi,(%rbx) [ 892.391302][T10850] RSP: 0018:ffffc9000097f448 EFLAGS: 00010247 [ 892.391488][T10850] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc9000097f770 [ 892.391711][T10850] RDX: 0000000000000000 RSI: ffffc9000097f500 RDI: 0000000000000005 [ 892.391929][T10850] RBP: ffffc9000097f680 R08: ffffc9000097f770 R09: 0000000000000004 [ 892.392145][T10850] R10: dffffc0000000000 R11: 0000000000000003 R12: ffff8880065baa80 [ 892.392366][T10850] R13: 0000000000000000 R14: ffffc9000097f500 R15: 0000000000000001 [ 892.392593][T10850] FS: 00007f09ed21fc40(0000) GS:ffff888036180000(0000) knlGS:0000000000000000 [ 892.392847][T10850] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 892.393028][T10850] CR2: 00000000004e0178 CR3: 00000000050a8002 CR4: 0000000000770ef0 [ 892.393245][T10850] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 892.393462][T10850] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 892.393688][T10850] PKRU: 55555554 [ 892.393798][T10850] Call Trace: [ 892.393905][T10850] [892.393977][T10850] ? die_addr (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:460) [892.394095][T10850] ? exc_general_protection (arch/x86/kernel/traps.c:701 arch/x86/kernel/traps.c:643) [892.394244][T10850] ? asm_exc_general_protection (./arch/x86/include/asm/idtentry.h:564) [892.394395][T10850] ? __nh_valid_dump_req (./include/net/netlink.h:1680 net/ipv4/nexthop.c:3404) [892.394548][T10850] nh_valid_dump_bucket_req (net/ipv4/nexthop.c:3552) [892.394710][T10850] ? __lock_release (kernel/locking/lockdep.c:5430) [892.394855][T10850] ? __pfx_nh_valid_dump_bucket_req (net/ipv4/nexthop.c:3552) [892.395046][T10850] ? lock_acquire (./include/trace/events/lock.h:24 kernel/locking/lockdep.c:5725) [892.395184][T10850] ? netlink_dump (net/netlink/af_netlink.c:2269) [892.395333][T10850] ? trace_contention_end (./include/trace/events/lock.h:122 (discriminator 44)) [892.395475][T10850] ? __mutex_lock (./arch/x86/include/asm/preempt.h:94 kernel/locking/mutex.c:618 kernel/locking/mutex.c:752) [892.395635][T10850] rtm_dump_nexthop_bucket (net/ipv4/nexthop.c:3676) [892.395776][T10850] ? __pfx___mutex_lock (kernel/locking/mutex.c:751) [892.395928][T10850] ? __alloc_skb (net/core/skbuff.c:684) [892.396083][T10850] ? __pfx_rtm_dump_nexthop_bucket (net/ipv4/nexthop.c:3669) [892.396265][T10850] ? __mutex_trylock_common (./arch/x86/include/asm/atomic64_64.h:109 ./include/linux/atomic/atomic-arch-fallback.h:4276 ./include/linux/atomic/atomic-long.h:1476 ./include/linux/atomic/atomic-instrumented.h:4424 kernel/locking/mutex.c:129) [892.396408][T10850] netlink_dump (net/netlink/af_netlink.c:2269) [892.396554][T10850] ? trace_contention_end (./include/trace/events/lock.h:122 (discriminator 44)) [892.396706][T10850] ? __pfx_netlink_dump (net/netlink/af_netlink.c:2197) [892.396844][T10850] ? __mutex_lock (./arch/x86/include/asm/preempt.h:94 kernel/locking/mutex.c:618 kernel/locking/mutex.c:752) [892.396998][T10850] ? __pfx___netlink_lookup (net/netlink/af_netlink.c:512) [892.397138][T10850] ? netlink_lookup (./include/linux/rcupdate.h:308 ./include/linux/rcupdate.h:783 net/netlink/af_netlink.c:539) [892.397293][T10850] __netlink_dump_start (./include/linux/instrumented.h:96 ./include/linux/atomic/atomic-instrumented.h:400 ./include/linux/refcount.h:261 ./include/linux/refcount.h:304 ./include/linux/refcount.h:322 ./include/net/sock.h:1940 net/netlink/af_netlink.c:2388) [892.397435][T10850] rtnetlink_rcv_msg (net/core/rtnetlink.c:6555) [892.397578][T10850] ? __pfx_rtm_dump_nexthop_bucket (net/ipv4/nexthop.c:3669) [892.397752][T10850] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6489) [892.397903][T10850] ? __pfx_rtm_dump_nexthop_bucket (net/ipv4/nexthop.c:3669) [892.398077][T10850] ? __lock_acquire (kernel/locking/lockdep.c:5137) [892.398222][T10850] netlink_rcv_skb (net/netlink/af_netlink.c:2559) [892.398363][T10850] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6489) [892.398506][T10850] ? __pfx_netlink_rcv_skb (net/netlink/af_netlink.c:2536) [892.398658][T10850] ? lock_acquire.part.0 (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5756) [892.398798][T10850] ? __pfx___netlink_lookup (net/netlink/af_netlink.c:512) [892.398947][T10850] ? lock_acquire (./include/trace/events/lock.h:24 kernel/locking/lockdep.c:5725) [892.399088][T10850] ? netlink_deliver_tap (./include/linux/rcupdate.h:308 ./include/linux/rcupdate.h:783 ./include/net/netns/generic.h:48 net/netlink/af_netlink.c:333) [892.399228][T10850] ? netlink_deliver_tap (./include/linux/rcupdate.h:308 ./include/linux/rcupdate.h:783 ./include/net/netns/generic.h:48 net/netlink/af_netlink.c:333) [892.399365][T10850] ? netlink_deliver_tap (./include/linux/rcupdate.h:308 ./include/linux/rcupdate.h:783 net/netlink/af_netlink.c:340) [892.399505][T10850] netlink_unicast (net/netlink/af_netlink.c:1335 net/netlink/af_netlink.c:1361) [892.399644][T10850] ? __pfx_netlink_unicast (net/netlink/af_netlink.c:1346) [892.399787][T10850] ? __lock_release (kernel/locking/lockdep.c:5430) [892.399933][T10850] ? rcu_read_unlock (./include/linux/rcupdate.h:308 (discriminator 9) ./include/linux/rcupdate.h:783 (discriminator 9)) [892.400079][T10850] ? __pfx___lock_release (kernel/locking/lockdep.c:5406) [892.400224][T10850] netlink_sendmsg (net/netlink/af_netlink.c:1905) [892.400370][T10850] ? __pfx_netlink_sendmsg (net/netlink/af_netlink.c:1824) [892.400509][T10850] ? __fget_light (./include/linux/atomic/atomic-arch-fallback.h:479 ./include/linux/atomic/atomic-instrumented.h:50 fs/file.c:1145) [892.400653][T10850] __sys_sendto (net/socket.c:730 net/socket.c:745 net/socket.c:2191) [892.400795][T10850] ? __pfx___sys_sendto (net/socket.c:2161) [892.400939][T10850] ? __lock_release (kernel/locking/lockdep.c:5430) [892.401080][T10850] ? do_user_addr_fault (arch/x86/mm/fault.c:1436) [892.401225][T10850] ? __pfx___lock_release (kernel/locking/lockdep.c:5406) [892.401368][T10850] ? __up_read (./arch/x86/include/asm/atomic64_64.h:79 ./include/linux/atomic/atomic-arch-fallback.h:2735 ./include/linux/atomic/atomic-long.h:184 ./include/linux/atomic/atomic-instrumented.h:3289 kernel/locking/rwsem.c:1347) [892.401507][T10850] ? __pfx_find_vma (mm/mmap.c:1883) [892.401648][T10850] ? __pfx___up_read (kernel/locking/rwsem.c:1339) [892.401790][T10850] ? do_user_addr_fault (arch/x86/mm/fault.c:1436) [892.401938][T10850] __x64_sys_sendto (net/socket.c:2199) [892.402079][T10850] ? lockdep_hardirqs_on_prepare.part.0 (kernel/locking/lockdep.c:4300 kernel/locking/lockdep.c:4359) [892.402256][T10850] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [892.402398][T10850] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129) [ 892.402575][T10850] RIP: 0033:0x7f09ed428700 [ 892.402721][T10850] Code: ff ff 64 89 02 eb bd 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 1d 45 31 c9 45 31 c0 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 68 c3 0f 1f 80 00 00 00 00 41 54 48 83 ec 20 All code ======== 0: ff (bad) 1: ff 64 89 02 jmp *0x2(%rcx,%rcx,4) 5: eb bd jmp 0xffffffffffffffc4 7: 0f 1f 00 nopl (%rax) a: f3 0f 1e fa endbr64 e: 41 89 ca mov %ecx,%r10d 11: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 18: 00 19: 85 c0 test %eax,%eax 1b: 75 1d jne 0x3a 1d: 45 31 c9 xor %r9d,%r9d 20: 45 31 c0 xor %r8d,%r8d 23: b8 2c 00 00 00 mov $0x2c,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 68 ja 0x9a 32: c3 ret 33: 0f 1f 80 00 00 00 00 nopl 0x0(%rax) 3a: 41 54 push %r12 3c: 48 83 ec 20 sub $0x20,%rsp Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 68 ja 0x70 8: c3 ret 9: 0f 1f 80 00 00 00 00 nopl 0x0(%rax) 10: 41 54 push %r12 12: 48 83 ec 20 sub $0x20,%rsp [ 892.403216][T10850] RSP: 002b:00007fff3c84a388 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 892.403428][T10850] RAX: ffffffffffffffda RBX: 0000000000495540 RCX: 00007f09ed428700 [ 892.403645][T10850] RDX: 0000000000000098 RSI: 00007fff3c84a390 RDI: 0000000000000005 [ 892.403854][T10850] RBP: 00007fff3c84a390 R08: 0000000000000000 R09: 0000000000000000 [ 892.404073][T10850] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff Finger prints: __nh_valid_dump_req:nh_valid_dump_bucket_req:rtm_dump_nexthop_bucket:netlink_dump