kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 623 Comm: syz.0.56 Not tainted 5.4.290-syzkaller-00017-g6b07fcd94a6a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 RIP: 0010:netif_reset_xps_queues_gt net/core/dev.c:2199 [inline] RIP: 0010:rollback_registered_many+0xee4/0x1330 net/core/dev.c:8677 Code: fe 48 3b 1b 0f 85 83 00 00 00 e8 67 6d e2 fd 48 8b 5c 24 10 48 89 df e8 4a 62 0b 00 49 8d be 18 03 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 07 01 00 00 41 0f b7 96 18 03 00 00 48 RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010a07 RAX: 1ffffffff0703c17 RBX: 0000000000000102 RCX: ffff8881e3a4ee40 RDX: 0000000000000102 RSI: ffffffff8381dda6 RDI: ffffffff8381e0be RBP: ffff8881f6e09ec8 R08: ffffffff8154e50e R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffff9888 R13: dffffc0000000000 R14: ffffffff8381dda6 R15: ffff8881e67971c0 FS: 00007f72c49dd6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f72c49bbf98 CR3: 00000001e64c4000 CR4: 00000000003406b0 DR0: 0000400000000300 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830 __do_softirq+0x23b/0x6b7 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x195/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:539 [inline] smp_apic_timer_interrupt+0x11a/0x490 arch/x86/kernel/apic/apic.c:1161 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834 RIP: 0010:deref_stack_regs arch/x86/kernel/unwind_orc.c:366 [inline] RIP: 0010:unwind_next_frame+0x1290/0x1ea0 arch/x86/kernel/unwind_orc.c:539 Code: b4 24 20 01 00 00 4c 8b ac 24 00 01 00 00 48 8b 44 24 30 42 80 3c 38 00 48 8b 5c 24 20 74 08 48 89 df e8 e3 66 64 00 4c 89 2b <4c> 89 f3 48 c1 eb 03 42 80 3c 3b 00 74 08 4c 89 f7 e8 ca 66 64 00 RSP: 0018:ffff8881e4f9f1a0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 1ffff1103c9f3e9d RBX: ffff8881e4f9f4e8 RCX: ffffffff86771754 RDX: ffffffff86b4c59c RSI: ffff8881e4f9f2a0 RDI: ffff8881e4f9ffd8 RBP: ffff8881e4f9f490 R08: 0000000000000004 R09: ffff8881e4f9f4f0 R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffffffff0d698b3 R13: 00007f72c6373169 R14: ffff8881e4f9f2c0 R15: dffffc0000000000 arch_stack_walk+0x111/0x140 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x118/0x1c0 kernel/stacktrace.c:123 save_stack mm/kasan/common.c:70 [inline] set_track mm/kasan/common.c:78 [inline] kasan_set_free_info mm/kasan/common.c:345 [inline] __kasan_slab_free+0x1b5/0x270 mm/kasan/common.c:487 slab_free_hook mm/slub.c:1455 [inline] slab_free_freelist_hook mm/slub.c:1494 [inline] slab_free mm/slub.c:3080 [inline] kfree+0x123/0x370 mm/slub.c:4071 context_add_hash+0x1c4/0x270 security/selinux/ss/services.c:1488 context_struct_to_sid security/selinux/ss/services.c:1501 [inline] security_compute_sid+0x11a7/0x1d60 security/selinux/ss/services.c:1865 security_transition_sid+0x78/0x90 security/selinux/ss/services.c:1890 socket_sockcreate_sid security/selinux/hooks.c:4585 [inline] selinux_socket_create+0x204/0x330 security/selinux/hooks.c:4619 security_socket_create+0x76/0xb0 security/security.c:2014 __sock_create+0xcd/0x7a0 net/socket.c:1382 sock_create net/socket.c:1478 [inline] __sys_socketpair+0x308/0x6e0 net/socket.c:1582 __do_sys_socketpair net/socket.c:1631 [inline] __se_sys_socketpair net/socket.c:1628 [inline] __x64_sys_socketpair+0x97/0xb0 net/socket.c:1628 do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x5c/0xc1 RIP: 0033:0x7f72c6373169 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f72c49dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 RAX: ffffffffffffffda RBX: 00007f72c658bfa0 RCX: 00007f72c6373169 RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 RBP: 00007f72c63f42a0 R08: 0000000000000000 R09: 0000000000000000 R10: 00004000000004c0 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f72c658bfa0 R15: 00007ffc9debd258 Modules linked in: ---[ end trace 0c997c2064bb54b6 ]--- RIP: 0010:netif_reset_xps_queues_gt net/core/dev.c:2199 [inline] RIP: 0010:rollback_registered_many+0xee4/0x1330 net/core/dev.c:8677 Code: fe 48 3b 1b 0f 85 83 00 00 00 e8 67 6d e2 fd 48 8b 5c 24 10 48 89 df e8 4a 62 0b 00 49 8d be 18 03 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 07 01 00 00 41 0f b7 96 18 03 00 00 48 RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010a07 RAX: 1ffffffff0703c17 RBX: 0000000000000102 RCX: ffff8881e3a4ee40 RDX: 0000000000000102 RSI: ffffffff8381dda6 RDI: ffffffff8381e0be RBP: ffff8881f6e09ec8 R08: ffffffff8154e50e R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffff9888 R13: dffffc0000000000 R14: ffffffff8381dda6 R15: ffff8881e67971c0 FS: 00007f72c49dd6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f72c49bbf98 CR3: 00000001e64c4000 CR4: 00000000003406b0 DR0: 0000400000000300 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 ---------------- Code disassembly (best guess): 0: fe 48 3b decb 0x3b(%rax) 3: 1b 0f sbb (%rdi),%ecx 5: 85 83 00 00 00 e8 test %eax,-0x18000000(%rbx) b: 67 6d insl (%dx),%es:(%edi) d: e2 fd loop 0xc f: 48 8b 5c 24 10 mov 0x10(%rsp),%rbx 14: 48 89 df mov %rbx,%rdi 17: e8 4a 62 0b 00 call 0xb6266 1c: 49 8d be 18 03 00 00 lea 0x318(%r14),%rdi 23: 48 89 f8 mov %rdi,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 0f b6 04 20 movzbl (%rax,%r12,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 0f 85 07 01 00 00 jne 0x13e 37: 41 0f b7 96 18 03 00 movzwl 0x318(%r14),%edx 3e: 00 3f: 48 rex.W