kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 1058 Comm: kworker/u4:5 Not tainted 5.4.210-syzkaller-00019-g035e4939365c #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022
Workqueue: tipc_rcv tipc_topsrv_accept
RIP: 0010:kernel_accept+0x1be/0x3d0 net/socket.c:3618
Code: 8b 18 48 83 c3 20 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 08 48 89 df e8 00 f1 39 fe 48 8b 1b 48 83 c3 08 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 44 89 ed 74 08 48 89 df e8 e0 f0 39 fe 48 8b 3b e8
RSP: 0018:ffff8881e83b7c88 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff8881eafd3f00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff83531965 R09: fffffbfff0c0d2a5
R10: fffffbfff0c0d2a5 R11: 1ffffffff0c0d2a4 R12: ffff8881b238f4a0
R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff1103d076f9e
FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000001b29ef000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
tipc_topsrv_accept+0x8e/0x260 net/tipc/topsrv.c:460
process_one_work+0x6ca/0xc40 kernel/workqueue.c:2287
worker_thread+0xae0/0x1440 kernel/workqueue.c:2433
kthread+0x2d8/0x360 kernel/kthread.c:288
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352
Modules linked in:
---[ end trace eca438256f3cbbfc ]---
RIP: 0010:kernel_accept+0x1be/0x3d0 net/socket.c:3618
Code: 8b 18 48 83 c3 20 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 08 48 89 df e8 00 f1 39 fe 48 8b 1b 48 83 c3 08 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 44 89 ed 74 08 48 89 df e8 e0 f0 39 fe 48 8b 3b e8
RSP: 0018:ffff8881e83b7c88 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff8881eafd3f00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff83531965 R09: fffffbfff0c0d2a5
R10: fffffbfff0c0d2a5 R11: 1ffffffff0c0d2a4 R12: ffff8881b238f4a0
R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff1103d076f9e
FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000001ed74e000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 8b 18 mov (%rax),%ebx
2: 48 83 c3 20 add $0x20,%rbx
6: 48 89 d8 mov %rbx,%rax
9: 48 c1 e8 03 shr $0x3,%rax
d: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1)
12: 74 08 je 0x1c
14: 48 89 df mov %rbx,%rdi
17: e8 00 f1 39 fe callq 0xfe39f11c
1c: 48 8b 1b mov (%rbx),%rbx
1f: 48 83 c3 08 add $0x8,%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) <-- trapping instruction
2f: 44 89 ed mov %r13d,%ebp
32: 74 08 je 0x3c
34: 48 89 df mov %rbx,%rdi
37: e8 e0 f0 39 fe callq 0xfe39f11c
3c: 48 8b 3b mov (%rbx),%rdi
3f: e8 .byte 0xe8