ODEBUG: object ffff8801db207ce8 is NOT on stack ffff8801a0128000, but annotated kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 9637 Comm: syz-executor3 Not tainted 4.9.117-g8b21e85 #19 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8801cd233000 task.stack: ffff8801c9630000 RIP: 0010:[] [] perf_trace_lock_acquire+0xcd/0x530 include/trace/events/lock.h:12 RSP: 0018:ffff8801c9637738 EFLAGS: 00010006 RAX: dffffc0000000000 RBX: ffffffff846c9760 RCX: 0000000000000000 RDX: 0000000000000017 RSI: 00000000000000a0 RDI: ffffffff846c97e0 RBP: ffff8801c9637848 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff8122dde0 R11: 0000000000000000 R12: ffff8801cdba5508 R13: ffff8801c9637820 R14: 00000000000000a0 R15: 0000000000000000 FS: 00007fa140486700(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2d526000 CR3: 00000001bcda0000 CR4: 00000000001606f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffffffff8153c399 ffff8801cd627b80 ffff8801da001280 0000000000000282 ffff880100000000 00000000000000b8 ffff8801db31ee60 1ffff100392c6ef0 ffff8801c9637788 0000000041b58ab3 ffffffff843b324f ffffffff8122dde0 Call Trace: [] trace_lock_acquire include/trace/events/lock.h:12 [inline] [] lock_acquire+0x299/0x3e0 kernel/locking/lockdep.c:3755 [] __raw_spin_lock include/linux/spinlock_api_smp.h:144 [inline] [] _raw_spin_lock+0x36/0x50 kernel/locking/spinlock.c:151 [] spin_lock include/linux/spinlock.h:302 [inline] [] l2tp_xmit_skb+0x38b/0xf60 net/l2tp/l2tp_core.c:1233 [] pppol2tp_sendmsg+0x4e0/0x790 net/l2tp/l2tp_ppp.c:339 [] sock_sendmsg_nosec net/socket.c:635 [inline] [] sock_sendmsg+0xcc/0x110 net/socket.c:645 [] ___sys_sendmsg+0x47a/0x840 net/socket.c:1969 [] __sys_sendmmsg+0x161/0x3d0 net/socket.c:2059 [] SYSC_sendmmsg net/socket.c:2090 [inline] [] SyS_sendmmsg+0x35/0x60 net/socket.c:2085 [] do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: 10 00 0f 85 76 03 00 00 49 8d 46 18 4c 8b bb 80 00 00 00 48 89 c2 48 89 85 18 ff ff ff 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 75 03 00 00 49 8b 7e 18 48 85 ff 0f 84 03 03 RIP [] perf_trace_lock_acquire+0xcd/0x530 include/trace/events/lock.h:12 RSP ---[ end trace 208922038ac0bd48 ]---