Enabling of bearer rejected, already enabled Enabling of bearer rejected, already enabled Enabling of bearer rejected, already enabled Enabling of bearer rejected, already enabled ================================================================== BUG: KASAN: slab-out-of-bounds in __read_once_size include/linux/compiler.h:188 [inline] BUG: KASAN: slab-out-of-bounds in atomic_read arch/x86/include/asm/atomic.h:27 [inline] BUG: KASAN: slab-out-of-bounds in queued_spin_trylock include/asm-generic/qspinlock.h:71 [inline] BUG: KASAN: slab-out-of-bounds in do_raw_spin_trylock+0xbb/0xd0 kernel/locking/spinlock_debug.c:119 Read of size 4 at addr ffff880079c4b1b4 by task ksoftirqd/0/8 CPU: 0 PID: 8 Comm: ksoftirqd/0 Not tainted 4.16.0-rc6+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x151/0x1c4 lib/dump_stack.c:53 print_address_description.cold.7+0x9/0x1c9 mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report.cold.8+0x242/0x2fe mm/kasan/report.c:412 __asan_report_load4_noabort+0x14/0x20 mm/kasan/report.c:432 __read_once_size include/linux/compiler.h:188 [inline] atomic_read arch/x86/include/asm/atomic.h:27 [inline] queued_spin_trylock include/asm-generic/qspinlock.h:71 [inline] do_raw_spin_trylock+0xbb/0xd0 kernel/locking/spinlock_debug.c:119 __raw_spin_trylock include/linux/spinlock_api_smp.h:89 [inline] _raw_spin_trylock+0x1c/0x80 kernel/locking/spinlock.c:128 spin_trylock include/linux/spinlock.h:320 [inline] icmp_xmit_lock net/ipv4/icmp.c:219 [inline] icmp_send+0x554/0x1430 net/ipv4/icmp.c:668 Enabling of bearer rejected, already enabled __udp4_lib_rcv+0x23b8/0x3170 net/ipv4/udp.c:2122 Enabling of bearer rejected, already enabled udp_rcv+0x21/0x30 net/ipv4/udp.c:2281 Enabling of bearer rejected, already enabled ip_local_deliver_finish+0x27f/0xc50 net/ipv4/ip_input.c:215 Enabling of bearer rejected, already enabled NF_HOOK include/linux/netfilter.h:288 [inline] ip_local_deliver+0x1dd/0x520 net/ipv4/ip_input.c:256 dst_input include/net/dst.h:450 [inline] ip_rcv_finish+0x944/0x1dc0 net/ipv4/ip_input.c:396 NF_HOOK include/linux/netfilter.h:288 [inline] ip_rcv+0xa0a/0x128b net/ipv4/ip_input.c:492 __netif_receive_skb_core+0x24f7/0x3340 net/core/dev.c:4597 __netif_receive_skb+0x2c/0x1e0 net/core/dev.c:4662 process_backlog+0x24e/0x7a0 net/core/dev.c:5342 napi_poll net/core/dev.c:5740 [inline] net_rx_action+0x518/0x1120 net/core/dev.c:5806 __do_softirq+0x24d/0x985 kernel/softirq.c:285 run_ksoftirqd+0x86/0xf0 kernel/softirq.c:666 smpboot_thread_fn+0x68c/0xa00 kernel/smpboot.c:164 kthread+0x34c/0x410 kernel/kthread.c:238 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:406 Allocated by task 9289: save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xc7/0xe0 mm/kasan/kasan.c:552 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:489 kmem_cache_alloc+0x12e/0x790 mm/slab.c:3541 sk_prot_alloc+0x69/0x2e0 net/core/sock.c:1468 sk_alloc+0x37/0xf80 net/core/sock.c:1528 inet_create+0x36a/0xe10 net/ipv4/af_inet.c:320 __sock_create+0x3d5/0x730 net/socket.c:1285 sock_create_kern+0x3b/0x50 net/socket.c:1331 inet_ctl_sock_create+0x9d/0x1f0 net/ipv4/af_inet.c:1566 icmp_sk_init+0x120/0x680 net/ipv4/icmp.c:1206 ops_init+0xb6/0x410 net/core/net_namespace.c:127 setup_net+0x2a1/0x700 net/core/net_namespace.c:312 copy_net_ns+0x1bc/0x310 net/core/net_namespace.c:435 create_new_namespaces+0x574/0x780 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xc3/0x1f0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2407 [inline] SyS_unshare+0x3dc/0x970 kernel/fork.c:2357 do_syscall_64+0x1f9/0x7c0 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff880079c4ac40 which belongs to the cache RAW of size 1304 The buggy address is located 92 bytes to the right of 1304-byte region [ffff880079c4ac40, ffff880079c4b158) The buggy address belongs to the page: page:ffffea0001e71280 count:1 mapcount:0 mapping:ffff880079c4a0c0 index:0x0 compound_mapcount: 0 flags: 0x5fffc0000008100(slab|head) raw: 05fffc0000008100 ffff880079c4a0c0 0000000000000000 0000000100000005 raw: ffffea0001d02920 ffff88007cff9848 ffff88007cf5cac0 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff880079c4b080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff880079c4b100: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc >ffff880079c4b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff880079c4b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff880079c4b280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================