BUG: unable to handle page fault for address: ffffffff00000030
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD e387067 P4D e387067 PUD 0
Oops: Oops: 0000 [#1] SMP KASAN NOPTI
CPU: 1 UID: 0 PID: 13309 Comm: modprobe Not tainted 6.16.0-rc4-syzkaller-00308-ga79a588fc176 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:dst_destroy+0xaf/0x3f0 net/core/dst.c:112
Code: 00 0f 85 2f 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b 08 48 8d 7d 30 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 f5 02 00 00 <48> 8b 6d 30 48 85 ed 74 0d e8 f3 35 56 f8 48 89 df e8 9d a9 9b 16
RSP: 0018:ffffc90000a08de0 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff88805827d000 RCX: ffffffff8965edd0
RDX: 1fffffffe0000006 RSI: ffffffff8965ea3d RDI: ffffffff00000030
RBP: ffffffff00000000 R08: daff8c34a4220347 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
R13: ffff88805827d008 R14: ffffc90000a08e90 R15: 0000000000000003
FS: 0000000000000000(0000) GS:ffff888124815000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff00000030 CR3: 00000000664a5000 CR4: 00000000003526f0
Call Trace:
<IRQ>
rcu_do_batch kernel/rcu/tree.c:2576 [inline]
rcu_core+0x79c/0x14e0 kernel/rcu/tree.c:2832
handle_softirqs+0x219/0x8e0 kernel/softirq.c:579
__do_softirq kernel/softirq.c:613 [inline]
invoke_softirq kernel/softirq.c:453 [inline]
__irq_exit_rcu+0x109/0x170 kernel/softirq.c:680
irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline]
sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1050
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:its_return_thunk+0x0/0x10 arch/x86/lib/retpoline.S:412
Code: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc <c3> cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 e9 db cc a0 f5 cc
RSP: 0018:ffffc9000cb1eec8 EFLAGS: 00000292
RAX: 0000000000000001 RBX: 0000000000000001 RCX: 00000000d3addaf6
RDX: ffffffff816ac79d RSI: ffffffff8c158760 RDI: ffffffff8c1587a0
RBP: ffffc9000cb1efa0 R08: 328b0d0cf36cb5da R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffffffff81a78020
R13: ffffc9000cb1ef58 R14: 0000000000000000 R15: ffff88802adca440
rcu_is_watching_curr_cpu include/linux/context_tracking.h:128 [inline]
rcu_is_watching+0x12/0xc0 kernel/rcu/tree.c:745
rcu_read_lock include/linux/rcupdate.h:842 [inline]
class_rcu_constructor include/linux/rcupdate.h:1155 [inline]
unwind_next_frame+0xa3b/0x20a0 arch/x86/kernel/unwind_orc.c:479
arch_stack_walk+0x94/0x100 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122
kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
unpoison_slab_object mm/kasan/common.c:319 [inline]
__kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:345
kasan_slab_alloc include/linux/kasan.h:250 [inline]
slab_post_alloc_hook mm/slub.c:4148 [inline]
slab_alloc_node mm/slub.c:4197 [inline]
kmem_cache_alloc_noprof+0x1cb/0x3b0 mm/slub.c:4204
mt_alloc_one lib/maple_tree.c:176 [inline]
mas_alloc_nodes+0x18b/0x8b0 lib/maple_tree.c:1249
mas_node_count_gfp+0x105/0x130 lib/maple_tree.c:1331
mas_preallocate+0x7e0/0xde0 lib/maple_tree.c:5533
vma_iter_prealloc mm/vma.h:463 [inline]
__mmap_new_vma mm/vma.c:2461 [inline]
__mmap_region+0x1104/0x25e0 mm/vma.c:2622
mmap_region+0x1ab/0x3f0 mm/vma.c:2692
do_mmap+0xa3e/0x1210 mm/mmap.c:561
vm_mmap_pgoff+0x281/0x450 mm/util.c:579
vm_mmap+0x8e/0xc0 mm/util.c:615
elf_map fs/binfmt_elf.c:384 [inline]
elf_load+0x36d/0x780 fs/binfmt_elf.c:407
load_elf_binary+0x13c8/0x4f00 fs/binfmt_elf.c:1173
search_binary_handler fs/exec.c:1670 [inline]
exec_binprm fs/exec.c:1702 [inline]
bprm_execve fs/exec.c:1754 [inline]
bprm_execve+0x8c3/0x1650 fs/exec.c:1730
kernel_execve+0x2ef/0x3b0 fs/exec.c:1920
call_usermodehelper_exec_async+0x255/0x4c0 kernel/umh.c:109
ret_from_fork+0x5d4/0x6f0 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
</TASK>
Modules linked in:
CR2: ffffffff00000030
---[ end trace 0000000000000000 ]---
RIP: 0010:dst_destroy+0xaf/0x3f0 net/core/dst.c:112
Code: 00 0f 85 2f 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b 08 48 8d 7d 30 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 f5 02 00 00 <48> 8b 6d 30 48 85 ed 74 0d e8 f3 35 56 f8 48 89 df e8 9d a9 9b 16
RSP: 0018:ffffc90000a08de0 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff88805827d000 RCX: ffffffff8965edd0
RDX: 1fffffffe0000006 RSI: ffffffff8965ea3d RDI: ffffffff00000030
RBP: ffffffff00000000 R08: daff8c34a4220347 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
R13: ffff88805827d008 R14: ffffc90000a08e90 R15: 0000000000000003
FS: 0000000000000000(0000) GS:ffff888124815000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff00000030 CR3: 00000000664a5000 CR4: 00000000003526f0
----------------
Code disassembly (best guess), 1 bytes skipped:
0: 0f 85 2f 03 00 00 jne 0x335
6: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
d: fc ff df
10: 48 8b 6b 08 mov 0x8(%rbx),%rbp
14: 48 8d 7d 30 lea 0x30(%rbp),%rdi
18: 48 89 fa mov %rdi,%rdx
1b: 48 c1 ea 03 shr $0x3,%rdx
1f: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1)
23: 0f 85 f5 02 00 00 jne 0x31e
* 29: 48 8b 6d 30 mov 0x30(%rbp),%rbp <-- trapping instruction
2d: 48 85 ed test %rbp,%rbp
30: 74 0d je 0x3f
32: e8 f3 35 56 f8 call 0xf856362a
37: 48 89 df mov %rbx,%rdi
3a: e8 9d a9 9b 16 call 0x169ba9dc