Oops: general protection fault, probably for non-canonical address 0xe0051c01000020c6: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: maybe wild-memory-access in range [0x0029000800010630-0x0029000800010637]
CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.11.0-rc6-syzkaller-00183-gb831f83e40a2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:__rht_bucket_nested+0xd9/0x640 lib/rhashtable.c:1194
Code: c1 e8 03 48 bb 00 00 00 00 00 fc ff df 80 3c 18 00 74 08 4c 89 ef e8 36 6d 48 fd 48 c1 e5 03 49 03 6d 00 48 89 e8 48 c1 e8 03 <80> 3c 18 00 74 08 48 89 ef e8 19 6d 48 fd 4c 8b 6d 00 e8 00 3a 07
RSP: 0018:ffffc90000157378 EFLAGS: 00010207
RAX: 00052001000020c6 RBX: dffffc0000000000 RCX: ffff88801cedda00
RDX: 0000000000000100 RSI: 0000000000000011 RDI: 0000000000000020
RBP: 0029000800010637 R08: ffffffff84b26624 R09: ffffffff84b23186
R10: 0000000000000003 R11: ffff88801cedda00 R12: 0000000000000000
R13: ffff888052228080 R14: ffff888052228004 R15: ffff888052228000
FS: 0000000000000000(0000) GS:ffff8880b8800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe5e40635c0 CR3: 0000000065edc000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
<TASK>
rht_bucket_nested+0x3b/0x50 lib/rhashtable.c:1220
rht_bucket include/linux/rhashtable.h:289 [inline]
__rhashtable_lookup include/linux/rhashtable.h:605 [inline]
rhashtable_lookup include/linux/rhashtable.h:646 [inline]
rhashtable_lookup_fast+0x757/0x9b0 include/linux/rhashtable.h:672
ila_lookup_wildcards net/ipv6/ila/ila_xlat.c:132 [inline]
ila_xlat_addr net/ipv6/ila/ila_xlat.c:657 [inline]
ila_nf_input+0x1fe/0x3c0 net/ipv6/ila/ila_xlat.c:190
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
nf_hook include/linux/netfilter.h:269 [inline]
NF_HOOK+0x29e/0x450 include/linux/netfilter.h:312
__netif_receive_skb_one_core net/core/dev.c:5661 [inline]
__netif_receive_skb+0x1ea/0x650 net/core/dev.c:5775
process_backlog+0x662/0x15b0 net/core/dev.c:6108
__napi_poll+0xcb/0x490 net/core/dev.c:6772
napi_poll net/core/dev.c:6841 [inline]
net_rx_action+0x89b/0x1240 net/core/dev.c:6963
handle_softirqs+0x2c4/0x970 kernel/softirq.c:554
run_ksoftirqd+0xca/0x130 kernel/softirq.c:928
smpboot_thread_fn+0x544/0xa30 kernel/smpboot.c:164
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__rht_bucket_nested+0xd9/0x640 lib/rhashtable.c:1194
Code: c1 e8 03 48 bb 00 00 00 00 00 fc ff df 80 3c 18 00 74 08 4c 89 ef e8 36 6d 48 fd 48 c1 e5 03 49 03 6d 00 48 89 e8 48 c1 e8 03 <80> 3c 18 00 74 08 48 89 ef e8 19 6d 48 fd 4c 8b 6d 00 e8 00 3a 07
RSP: 0018:ffffc90000157378 EFLAGS: 00010207
RAX: 00052001000020c6 RBX: dffffc0000000000 RCX: ffff88801cedda00
RDX: 0000000000000100 RSI: 0000000000000011 RDI: 0000000000000020
RBP: 0029000800010637 R08: ffffffff84b26624 R09: ffffffff84b23186
R10: 0000000000000003 R11: ffff88801cedda00 R12: 0000000000000000
R13: ffff888052228080 R14: ffff888052228004 R15: ffff888052228000
FS: 0000000000000000(0000) GS:ffff8880b8800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe5e40635c0 CR3: 0000000065edc000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
----------------
Code disassembly (best guess):
0: c1 e8 03 shr $0x3,%eax
3: 48 bb 00 00 00 00 00 movabs $0xdffffc0000000000,%rbx
a: fc ff df
d: 80 3c 18 00 cmpb $0x0,(%rax,%rbx,1)
11: 74 08 je 0x1b
13: 4c 89 ef mov %r13,%rdi
16: e8 36 6d 48 fd call 0xfd486d51
1b: 48 c1 e5 03 shl $0x3,%rbp
1f: 49 03 6d 00 add 0x0(%r13),%rbp
23: 48 89 e8 mov %rbp,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 80 3c 18 00 cmpb $0x0,(%rax,%rbx,1) <-- trapping instruction
2e: 74 08 je 0x38
30: 48 89 ef mov %rbp,%rdi
33: e8 19 6d 48 fd call 0xfd486d51
38: 4c 8b 6d 00 mov 0x0(%rbp),%r13
3c: e8 .byte 0xe8
3d: 00 3a add %bh,(%rdx)
3f: 07 (bad)