Not allocated shadow for addr ffff88019a0f4000 (page ffffea00099c5b80) Attempted to access 286 bytes ------------[ cut here ]------------ kernel BUG at mm/kmsan/kmsan.c:1344! invalid opcode: 0000 [#1] SMP PTI Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 4483 Comm: sshd Not tainted 4.17.0-rc5+ #103 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:kmsan_get_shadow_address+0x1ce/0x1f0 mm/kmsan/kmsan.c:1343 RSP: 0018:ffff8801ce10e6f0 EFLAGS: 00010082 RAX: 000000000000001d RBX: 0000000000000660 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 RBP: ffff8801ce10e708 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000000 R12: ffff88019a0f4000 R13: 000000000000011e R14: 0000000000000001 R15: 000000000000011e FS: 00007f2cef8927c0(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600400 CR3: 00000001987e4000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kmsan_internal_memset_shadow mm/kmsan/kmsan.c:172 [inline] kmsan_internal_unpoison_shadow+0x5c/0xe0 mm/kmsan/kmsan.c:209 kmsan_unpoison_shadow+0x66/0xb0 mm/kmsan/kmsan.c:223 virtqueue_get_buf_ctx+0x73f/0xa20 drivers/virtio/virtio_ring.c:759 virtqueue_get_buf+0x72/0x90 drivers/virtio/virtio_ring.c:766 free_old_xmit_skbs drivers/net/virtio_net.c:1234 [inline] start_xmit+0x293/0x29b0 drivers/net/virtio_net.c:1399 __netdev_start_xmit include/linux/netdevice.h:4087 [inline] netdev_start_xmit include/linux/netdevice.h:4096 [inline] xmit_one net/core/dev.c:3053 [inline] dev_hard_start_xmit+0x5f1/0xc70 net/core/dev.c:3069 sch_direct_xmit+0x578/0x8f0 net/sched/sch_generic.c:327 qdisc_restart net/sched/sch_generic.c:399 [inline] __qdisc_run+0x1785/0x3730 net/sched/sch_generic.c:410 __dev_xmit_skb net/core/dev.c:3244 [inline] __dev_queue_xmit+0x1d50/0x3510 net/core/dev.c:3552 dev_queue_xmit+0x4b/0x60 net/core/dev.c:3617 neigh_hh_output include/net/neighbour.h:472 [inline] neigh_output include/net/neighbour.h:480 [inline] ip_finish_output2+0x12bf/0x1490 net/ipv4/ip_output.c:229 ip_finish_output+0xcaf/0xff0 net/ipv4/ip_output.c:317 NF_HOOK_COND include/linux/netfilter.h:277 [inline] ip_output+0x505/0x5d0 net/ipv4/ip_output.c:405 dst_output include/net/dst.h:444 [inline] ip_local_out net/ipv4/ip_output.c:124 [inline] ip_queue_xmit+0x1a1d/0x1d10 net/ipv4/ip_output.c:504 tcp_transmit_skb+0x3d6d/0x53b0 net/ipv4/tcp_output.c:1176 tcp_write_xmit+0x2d71/0xb1f0 net/ipv4/tcp_output.c:2373 __tcp_push_pending_frames+0x124/0x400 net/ipv4/tcp_output.c:2546 tcp_push+0x803/0x8f0 net/ipv4/tcp.c:735 tcp_sendmsg_locked+0x4eb1/0x6610 net/ipv4/tcp.c:1410 tcp_sendmsg+0xb2/0x100 net/ipv4/tcp.c:1447 inet_sendmsg+0x3f7/0x750 net/ipv4/af_inet.c:798 sock_sendmsg_nosec net/socket.c:629 [inline] sock_sendmsg net/socket.c:639 [inline] sock_write_iter+0x3b7/0x470 net/socket.c:908 call_write_iter include/linux/fs.h:1784 [inline] new_sync_write fs/read_write.c:474 [inline] __vfs_write+0x7fb/0x9f0 fs/read_write.c:487 vfs_write+0x467/0x8c0 fs/read_write.c:549 ksys_write fs/read_write.c:598 [inline] __do_sys_write fs/read_write.c:610 [inline] __se_sys_write fs/read_write.c:607 [inline] __x64_sys_write+0x1bf/0x3e0 fs/read_write.c:607 do_syscall_64+0x152/0x230 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f2cedc2d370 RSP: 002b:00007ffe9a9a8ff8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000038 RCX: 00007f2cedc2d370 RDX: 0000000000000038 RSI: 000055e3f4bc1210 RDI: 0000000000000003 RBP: 000055e3f4bc1210 R08: 0000000000000001 R09: 0101010101010101 R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffe9a9a905c R13: 000055e3f3308fb4 R14: 0000000000000028 R15: 000055e3f330aca0 Code: 75 29 48 c7 c7 83 00 a0 8a 31 c0 e8 7d 14 83 ff 80 3c 25 f8 73 53 8b 00 75 11 48 c7 c7 b3 00 a0 8a 31 c0 4c 89 fe e8 62 14 83 ff <0f> 0b eb fe 48 3d ff ff ff 1f 0f 87 a2 fe ff ff 48 8b 1c 25 10 RIP: kmsan_get_shadow_address+0x1ce/0x1f0 mm/kmsan/kmsan.c:1343 RSP: ffff8801ce10e6f0 ---[ end trace 04eac13f8c29b528 ]---