kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tainted 4.9.84-ga9d0273 #44 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8801d9bab000 task.stack: ffff8801d9bc0000 RIP: 0010:[] [] tcp_sacktag_skip net/ipv4/tcp_input.c:1613 [inline] RIP: 0010:[] [] tcp_sacktag_write_queue+0x13a9/0x2c60 net/ipv4/tcp_input.c:1815 RSP: 0018:ffff8801d9bc7000 EFLAGS: 00010207 RAX: ffff8801d9bab000 RBX: ffff8801d9bc7358 RCX: ffffffff83245efd RDX: 0000000000000005 RSI: ffff8801d9bc735c RDI: 000000000000002c RBP: ffff8801d9bc7168 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000001 R14: dffffc0000000000 R15: 0000000000000253 FS: 0000000000000000(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4ee1c25610 CR3: 00000001c05a2000 CR4: 0000000000160670 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: 0000000000000246 ffff8801d9bab000 ffffffff844de160 ffff8801d8951968 0000000000000003 1ffff1003b378e18 ffff8801d9bc7378 ffff8801d9bc70e0 ffff8801d8951df0 ffff8801d8951e90 ffffed003b12a32d ffff8801d9bc735c Call Trace: [] tcp_ack+0x2023/0x5390 net/ipv4/tcp_input.c:3677 [] tcp_rcv_established+0x53b/0x2070 net/ipv4/tcp_input.c:5551 [] tcp_v4_do_rcv+0x2d5/0x940 net/ipv4/tcp_ipv4.c:1414 [] tcp_v4_rcv+0x20d4/0x29e0 net/ipv4/tcp_ipv4.c:1730 [] ip_local_deliver_finish+0x285/0xa80 net/ipv4/ip_input.c:216 [] NF_HOOK_THRESH include/linux/netfilter.h:232 [inline] [] NF_HOOK include/linux/netfilter.h:255 [inline] [] ip_local_deliver+0x30a/0x4d0 net/ipv4/ip_input.c:257 [] dst_input include/net/dst.h:513 [inline] [] ip_rcv_finish+0x71b/0x1900 net/ipv4/ip_input.c:396 [] NF_HOOK_THRESH include/linux/netfilter.h:232 [inline] [] NF_HOOK include/linux/netfilter.h:255 [inline] [] ip_rcv+0xbc2/0x1620 net/ipv4/ip_input.c:487 [] __netif_receive_skb_core+0xa33/0x29e0 net/core/dev.c:4252 [] __netif_receive_skb+0x5b/0x1c0 net/core/dev.c:4290 [] process_backlog+0x1d4/0x690 net/core/dev.c:4911 [] napi_poll net/core/dev.c:5212 [inline] [] net_rx_action+0x396/0xe00 net/core/dev.c:5277 [] __do_softirq+0x206/0x951 kernel/softirq.c:284 [] run_ksoftirqd+0x2e/0x60 kernel/softirq.c:676 [] smpboot_thread_fn+0x5c1/0x8f0 kernel/smpboot.c:163 [] kthread+0x26d/0x300 kernel/kthread.c:211 [] ret_from_fork+0x5c/0x70 arch/x86/entry/entry_64.S:361 Code: 4b e8 3c 55 12 fe 48 8b 85 50 ff ff ff 4c 39 a0 e8 03 00 00 0f 84 85 00 00 00 e8 23 55 12 fe 49 8d 7c 24 2c 48 89 fa 48 c1 ea 03 <42> 0f b6 0c 32 48 89 fa 83 e2 07 83 c2 03 38 ca 7c 08 84 c9 0f RIP [] tcp_sacktag_skip net/ipv4/tcp_input.c:1613 [inline] RIP [] tcp_sacktag_write_queue+0x13a9/0x2c60 net/ipv4/tcp_input.c:1815 RSP ---[ end trace e03f2c093b8e55e2 ]---