PANIC: double fault, error_code: 0x0 WARNING: kernel stack frame pointer at 00000000d0cd753b in syz-executor0:14865 has bad value 00000000ead6c0a3 unwind stack type:0 next_sp: (null) mask:0x2 graph_idx:0 PANIC: double fault, error_code: 0x0 CPU: 0 PID: 14865 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:kallsyms_lookup+0x10/0x2c0 kernel/kallsyms.c:282 Code: 41 0f 95 c7 e9 63 ff ff ff e8 6c 5a d5 ff 66 90 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 49 89 d6 41 55 4d 89 c5 <41> 54 49 89 f4 53 48 89 fb 48 83 ec 10 48 89 4d d0 e8 3a 33 0a 00 RSP: 0018:ffff88019517e000 EFLAGS: 00010006 RAX: ffff8801c7096680 RBX: ffff88019517e1a0 RCX: ffff88019517e058 RDX: ffff88019517e098 RSI: ffff88019517e0d8 RDI: ffff88019517ea4f RBP: ffff88019517e018 R08: ffff88019517e1a0 R09: fffffbfff1541574 R10: fffffbfff1541574 R11: ffffffff8aa0aba3 R12: ffff88019517ea50 R13: ffff88019517e1a0 R14: ffff88019517e098 R15: 0000000000000001 FS: 00007f875b831700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88019517dff8 CR3: 0000000195f3b000 CR4: 00000000001406f0 DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: __sprint_symbol+0xc6/0x290 kernel/kallsyms.c:361 sprint_backtrace+0x27/0x30 kernel/kallsyms.c:429 symbol_string+0x1e7/0x210 lib/vsprintf.c:694 pointer+0x762/0x950 lib/vsprintf.c:1854 vsnprintf+0x63a/0x1b60 lib/vsprintf.c:2271 vscnprintf+0x2d/0x80 lib/vsprintf.c:2370 vprintk_emit+0x1ab/0xdf0 kernel/printk/printk.c:1853 vprintk_deferred+0x28/0x60 kernel/printk/printk.c:2885 printk_deferred+0xa7/0xdd kernel/printk/printk.c:2901 unwind_dump.cold.10+0x2b1/0x2c4 arch/x86/kernel/unwind_frame.c:66 unwind_next_frame.part.7+0x30f/0x9e0 arch/x86/kernel/unwind_frame.c:370 unwind_next_frame+0x3e/0x50 arch/x86/kernel/unwind_frame.c:287 __save_stack_trace+0x7d/0xf0 arch/x86/kernel/stacktrace.c:44 save_stack_trace+0x1a/0x20 arch/x86/kernel/stacktrace.c:60 save_trace+0xe0/0x290 kernel/locking/lockdep.c:404 mark_lock+0x3aa/0x19f0 kernel/locking/lockdep.c:3140 __lock_acquire+0x7fc/0x5020 kernel/locking/lockdep.c:3396 lock_acquire+0x1e4/0x540 kernel/locking/lockdep.c:3924 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x96/0xc0 kernel/locking/spinlock.c:152 kasan_start_report mm/kasan/report.c:170 [inline] kasan_report_error mm/kasan/report.c:346 [inline] kasan_report+0x8e/0x110 mm/kasan/report.c:412 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:433 do_general_protection+0x2ac/0x2f0 arch/x86/kernel/traps.c:539 general_protection+0x1e/0x30 arch/x86/entry/entry_64.S:1159 RIP: 0010:__read_once_size include/linux/compiler.h:188 [inline] RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:31 [inline] RIP: 0010:atomic_read include/asm-generic/atomic-instrumented.h:22 [inline] RIP: 0010:rcu_dynticks_curr_cpu_in_eqs kernel/rcu/tree.c:349 [inline] RIP: 0010:rcu_is_watching+0x93/0x150 kernel/rcu/tree.c:1035 Code: 75 9b 7e 48 c7 c3 a0 36 02 00 65 48 03 1d ed 08 9b 7e 4c 8d 6b 10 be 04 00 00 00 4c 89 ef e8 44 5c 53 00 4c 89 e8 48 c1 e8 03 <42> 0f b6 14 38 4c 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 RSP: 0018:ffff88019517f210 EFLAGS: 00010802 RAX: 1ffff1003b5e46d6 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 1ffff1003918c890 RSI: 00000000ffffffff RDI: 0000000000000082 RBP: ffff88019517f2a0 R08: ffffed003b5c46d7 R09: ffffed003b5c46d6 R10: ffffed003b5c46d6 R11: ffff8801dae236b3 R12: ffff88019517f200 R13: ffff8801daf236b0 R14: 1ffff10032a2fe43 R15: ffff8801daf236a0 bpf_tcp_close+0xd25/0x1050 kernel/bpf/sockmap.c:319 bpf_tcp_close+0xd25/0x1050 kernel/bpf/sockmap.c:319 bpf_tcp_close+0xd25/0x1050 kernel/bpf/sockmap.c:319 bpf_tcp_close+0xd25/0x1050 kernel/bpf/sockmap.c:319 bpf_tcp_close+0xd25/0x1050 kernel/bpf/sockmap.c:319 bpf_tcp_close+0xd25/0x1050 kernel/bpf/sockmap.c:319 bpf_tcp_close+0xd25/0x1050 kernel/bpf/sockmap.c:319