tipc: Node number set to 10005162 general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 0 PID: 4248 Comm: kworker/0:11 Not tainted 5.15.159-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Workqueue: events tipc_net_finalize_work RIP: 0010:tipc_mon_reinit_self+0xae/0x300 net/tipc/monitor.c:719 Code: 8b 2c 24 48 81 c3 08 10 00 00 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 2c 16 fd f7 48 8b 1b 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 a5 01 00 00 89 2b 4c 89 f7 e8 fb 72 5a RSP: 0018:ffffc90002e27b48 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90002e27a03 RDX: 0000000000000003 RSI: ffffffff8a8b3c20 RDI: ffffffff8ad8f680 RBP: 000000000098aaaa R08: dffffc0000000000 R09: fffffbfff1bc8cee R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8880232b0010 R13: dffffc0000000000 R14: ffff88807c7d5010 R15: ffff8880651bb500 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fdf665cf140 CR3: 0000000015fc2000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: tipc_net_finalize+0x200/0x330 net/tipc/net.c:140 process_one_work+0x8a1/0x10c0 kernel/workqueue.c:2310 worker_thread+0xaca/0x1280 kernel/workqueue.c:2457 kthread+0x3f6/0x4f0 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:300 Modules linked in: ---[ end trace 46c66a332ed60b05 ]--- RIP: 0010:tipc_mon_reinit_self+0xae/0x300 net/tipc/monitor.c:719 Code: 8b 2c 24 48 81 c3 08 10 00 00 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 2c 16 fd f7 48 8b 1b 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 a5 01 00 00 89 2b 4c 89 f7 e8 fb 72 5a RSP: 0018:ffffc90002e27b48 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90002e27a03 RDX: 0000000000000003 RSI: ffffffff8a8b3c20 RDI: ffffffff8ad8f680 RBP: 000000000098aaaa R08: dffffc0000000000 R09: fffffbfff1bc8cee R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8880232b0010 R13: dffffc0000000000 R14: ffff88807c7d5010 R15: ffff8880651bb500 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fdf665cf140 CR3: 0000000015fc2000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 8b 2c 24 mov (%rsp),%ebp 3: 48 81 c3 08 10 00 00 add $0x1008,%rbx a: 48 89 d8 mov %rbx,%rax d: 48 c1 e8 03 shr $0x3,%rax 11: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) 16: 74 08 je 0x20 18: 48 89 df mov %rbx,%rdi 1b: e8 2c 16 fd f7 call 0xf7fd164c 20: 48 8b 1b mov (%rbx),%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 0f b6 04 28 movzbl (%rax,%r13,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 0f 85 a5 01 00 00 jne 0x1dc 37: 89 2b mov %ebp,(%rbx) 39: 4c 89 f7 mov %r14,%rdi 3c: e8 .byte 0xe8 3d: fb sti 3e: 72 5a jb 0x9a