Oops: general protection fault, probably for non-canonical address 0xec2c282c2c2c2c2f: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: maybe wild-memory-access in range [0x6161616161616178-0x616161616161617f]
CPU: 1 UID: 0 PID: 5880 Comm: kworker/1:5 Not tainted 6.12.0-next-20241128-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events ser_release
RIP: 0010:fib6_walk_continue+0x1de/0x8f0 net/ipv6/ip6_fib.c:2089
Code: 83 e6 04 31 ff e8 22 97 23 f7 83 e3 04 75 79 e8 78 93 23 f7 e9 51 02 00 00 e8 8e 04 58 01 49 8d 6c 24 18 48 89 eb 48 c1 eb 03 <42> 80 3c 3b 00 74 08 48 89 ef e8 f3 84 8e f7 48 83 7d 00 00 0f 84
RSP: 0018:ffffc900042b7298 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0c2c2c2c2c2c2c2f RCX: ffff8880618ebc00
RDX: 0000000000000005 RSI: ffffffff8fdbee00 RDI: 0000000000000000
RBP: 6161616161616179 R08: 0000000000000005 R09: ffffffff8a7be0db
R10: 0000000000000005 R11: ffff8880618ebc00 R12: 6161616161616161
R13: ffffc900042b7418 R14: ffffc900042b7410 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f455383c108 CR3: 0000000063cce000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
fib6_walk+0x168/0x2b0 net/ipv6/ip6_fib.c:2172
fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline]
__fib6_clean_all+0x31f/0x4b0 net/ipv6/ip6_fib.c:2268
rt6_sync_down_dev net/ipv6/route.c:4908 [inline]
rt6_disable_ip+0x170/0x800 net/ipv6/route.c:4913
addrconf_ifdown+0x15d/0x1bd0 net/ipv6/addrconf.c:3877
addrconf_notify+0x3cb/0x1020
notifier_call_chain+0x1a5/0x3f0 kernel/notifier.c:85
call_netdevice_notifiers_extack net/core/dev.c:2034 [inline]
call_netdevice_notifiers net/core/dev.c:2048 [inline]
unregister_netdevice_many_notify+0xedd/0x1da0 net/core/dev.c:11520
unregister_netdevice_many net/core/dev.c:11584 [inline]
unregister_netdevice_queue+0x303/0x370 net/core/dev.c:11456
unregister_netdevice include/linux/netdevice.h:3192 [inline]
ser_release+0x1b2/0x250 drivers/net/caif/caif_serial.c:310
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
worker_thread+0x870/0xd30 kernel/workqueue.c:3391
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:fib6_walk_continue+0x1de/0x8f0 net/ipv6/ip6_fib.c:2089
Code: 83 e6 04 31 ff e8 22 97 23 f7 83 e3 04 75 79 e8 78 93 23 f7 e9 51 02 00 00 e8 8e 04 58 01 49 8d 6c 24 18 48 89 eb 48 c1 eb 03 <42> 80 3c 3b 00 74 08 48 89 ef e8 f3 84 8e f7 48 83 7d 00 00 0f 84
RSP: 0018:ffffc900042b7298 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0c2c2c2c2c2c2c2f RCX: ffff8880618ebc00
RDX: 0000000000000005 RSI: ffffffff8fdbee00 RDI: 0000000000000000
RBP: 6161616161616179 R08: 0000000000000005 R09: ffffffff8a7be0db
R10: 0000000000000005 R11: ffff8880618ebc00 R12: 6161616161616161
R13: ffffc900042b7418 R14: ffffc900042b7410 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f455383c108 CR3: 0000000063cce000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 83 e6 04 and $0x4,%esi
3: 31 ff xor %edi,%edi
5: e8 22 97 23 f7 call 0xf723972c
a: 83 e3 04 and $0x4,%ebx
d: 75 79 jne 0x88
f: e8 78 93 23 f7 call 0xf723938c
14: e9 51 02 00 00 jmp 0x26a
19: e8 8e 04 58 01 call 0x15804ac
1e: 49 8d 6c 24 18 lea 0x18(%r12),%rbp
23: 48 89 eb mov %rbp,%rbx
26: 48 c1 eb 03 shr $0x3,%rbx
* 2a: 42 80 3c 3b 00 cmpb $0x0,(%rbx,%r15,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 48 89 ef mov %rbp,%rdi
34: e8 f3 84 8e f7 call 0xf78e852c
39: 48 83 7d 00 00 cmpq $0x0,0x0(%rbp)
3e: 0f .byte 0xf
3f: 84 .byte 0x84