kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 14283 Comm: kworker/u4:13 Not tainted 5.0.0-rc1-next-20190108 #7 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: kkcmd kcm_tx_work RIP: 0010:__read_once_size include/linux/compiler.h:197 [inline] RIP: 0010:mm_match_cgroup include/linux/memcontrol.h:474 [inline] RIP: 0010:try_charge+0x12a8/0x1d00 mm/memcontrol.c:2332 Code: c0 e8 dc bf fe ff 4c 89 f2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 c6 04 02 00 49 8d bc 24 40 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 20 0a 00 00 4c 89 f2 4d 8b a4 24 40 05 00 00 48 RSP: 0018:ffff8880a04570b0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffff88809ab844c0 RCX: 1ffff1101408ae04 RDX: 00000000000000a8 RSI: 0000000000000000 RDI: 0000000000000540 RBP: ffff8880a04572b8 R08: 1ffff11015ce5b8f R09: ffffed1015ce5b90 R10: ffffed1015ce5b8f R11: ffff8880ae72dc7b R12: 0000000000000000 R13: ffff8880a0457290 R14: ffff8880a0457250 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000004efe78 CR3: 000000007002a000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: mem_cgroup_charge_skmem+0x12f/0x280 mm/memcontrol.c:6296 __sk_mem_raise_allocated+0x60d/0x17e0 net/core/sock.c:2349 __sk_mem_schedule+0x6d/0xe0 net/core/sock.c:2434 sk_wmem_schedule include/net/sock.h:1404 [inline] do_tcp_sendpages+0x653/0x1d30 net/ipv4/tcp.c:995 tcp_sendpage_locked net/ipv4/tcp.c:1080 [inline] tcp_sendpage_locked+0x84/0xd0 net/ipv4/tcp.c:1072 tcp_sendpage+0x3f/0x60 net/ipv4/tcp.c:1090 inet_sendpage+0x1df/0x730 net/ipv4/af_inet.c:815 kernel_sendpage+0x95/0xf0 net/socket.c:3360 kcm_write_msgs+0x409/0x1c40 net/kcm/kcmsock.c:646 kcm_tx_work+0x2c/0x120 net/kcm/kcmsock.c:731 process_one_work+0xd0c/0x1ce0 kernel/workqueue.c:2153 worker_thread+0x143/0x14a0 kernel/workqueue.c:2296 kthread+0x357/0x430 kernel/kthread.c:247 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 Modules linked in: ---[ end trace 93d4f958458c3264 ]--- RIP: 0010:__read_once_size include/linux/compiler.h:197 [inline] RIP: 0010:mm_match_cgroup include/linux/memcontrol.h:474 [inline] RIP: 0010:try_charge+0x12a8/0x1d00 mm/memcontrol.c:2332 Code: c0 e8 dc bf fe ff 4c 89 f2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 c6 04 02 00 49 8d bc 24 40 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 20 0a 00 00 4c 89 f2 4d 8b a4 24 40 05 00 00 48 RSP: 0018:ffff8880a04570b0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffff88809ab844c0 RCX: 1ffff1101408ae04 RDX: 00000000000000a8 RSI: 0000000000000000 RDI: 0000000000000540 RBP: ffff8880a04572b8 R08: 1ffff11015ce5b8f R09: ffffed1015ce5b90 R10: ffffed1015ce5b8f R11: ffff8880ae72dc7b R12: 0000000000000000 R13: ffff8880a0457290 R14: ffff8880a0457250 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f5cdf9a0000 CR3: 0000000092a8c000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600