tipc: Node number set to 10005162
general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 0 PID: 4248 Comm: kworker/0:11 Not tainted 5.15.159-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Workqueue: events tipc_net_finalize_work
RIP: 0010:tipc_mon_reinit_self+0xae/0x300 net/tipc/monitor.c:719
Code: 8b 2c 24 48 81 c3 08 10 00 00 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 2c 16 fd f7 48 8b 1b 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 a5 01 00 00 89 2b 4c 89 f7 e8 fb 72 5a
RSP: 0018:ffffc90002e27b48 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90002e27a03
RDX: 0000000000000003 RSI: ffffffff8a8b3c20 RDI: ffffffff8ad8f680
RBP: 000000000098aaaa R08: dffffc0000000000 R09: fffffbfff1bc8cee
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8880232b0010
R13: dffffc0000000000 R14: ffff88807c7d5010 R15: ffff8880651bb500
FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fdf665cf140 CR3: 0000000015fc2000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
tipc_net_finalize+0x200/0x330 net/tipc/net.c:140
process_one_work+0x8a1/0x10c0 kernel/workqueue.c:2310
worker_thread+0xaca/0x1280 kernel/workqueue.c:2457
kthread+0x3f6/0x4f0 kernel/kthread.c:334
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:300
</TASK>
Modules linked in:
---[ end trace 46c66a332ed60b05 ]---
RIP: 0010:tipc_mon_reinit_self+0xae/0x300 net/tipc/monitor.c:719
Code: 8b 2c 24 48 81 c3 08 10 00 00 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 2c 16 fd f7 48 8b 1b 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 a5 01 00 00 89 2b 4c 89 f7 e8 fb 72 5a
RSP: 0018:ffffc90002e27b48 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90002e27a03
RDX: 0000000000000003 RSI: ffffffff8a8b3c20 RDI: ffffffff8ad8f680
RBP: 000000000098aaaa R08: dffffc0000000000 R09: fffffbfff1bc8cee
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8880232b0010
R13: dffffc0000000000 R14: ffff88807c7d5010 R15: ffff8880651bb500
FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fdf665cf140 CR3: 0000000015fc2000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 8b 2c 24 mov (%rsp),%ebp
3: 48 81 c3 08 10 00 00 add $0x1008,%rbx
a: 48 89 d8 mov %rbx,%rax
d: 48 c1 e8 03 shr $0x3,%rax
11: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1)
16: 74 08 je 0x20
18: 48 89 df mov %rbx,%rdi
1b: e8 2c 16 fd f7 call 0xf7fd164c
20: 48 8b 1b mov (%rbx),%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 0f b6 04 28 movzbl (%rax,%r13,1),%eax <-- trapping instruction
2f: 84 c0 test %al,%al
31: 0f 85 a5 01 00 00 jne 0x1dc
37: 89 2b mov %ebp,(%rbx)
39: 4c 89 f7 mov %r14,%rdi
3c: e8 .byte 0xe8
3d: fb sti
3e: 72 5a jb 0x9a