_stack_chk_fail

Just search for Kernel stack memory corruption detected and we end in _stack_chk_fail at stack_protector.c

void __noreturn _stack_chk_fail()
{
  panic("\"Kernel stack memory corruption detected\"");
}

___stack_chk_fail = 0xFFFFFFF00821F40C

_stack_chk_fail is called after ___stack_chk_guard is compared with the canary. So, the calls/xrefs to ___stack_chk_fail should look like this:

  if ( qword_FFFFFFF009275908 != v26 )          <----- __stack_chk_guard = qword_FFFFFFF009275908
    j_stack_check_fail();
  • ___stack_chk_guard = 0xFFFFFFF009275908