Oops: general protection fault, probably for non-canonical address 0xfbd5a5d5a0000003: 0000 [#1] SMP KASAN PTI KASAN: maybe wild-memory-access in range [0xdead4ead00000018-0xdead4ead0000001f] CPU: 0 UID: 0 PID: 9453 Comm: syz.2.986 Not tainted 6.17.0-rc1-syzkaller-00016-g8742b2d8935f #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:smc_diag_msg_common_fill net/smc/smc_diag.c:44 [inline] RIP: 0010:__smc_diag_dump net/smc/smc_diag.c:89 [inline] RIP: 0010:smc_diag_dump_proto+0x4cd/0x1fb0 net/smc/smc_diag.c:217 Code: 80 3c 2f 00 74 08 48 89 df e8 6f 05 fb f6 4c 8b 23 4d 85 e4 0f 84 22 02 00 00 48 89 5c 24 30 49 83 c4 18 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 44 05 fb f6 4d 8b 2c 24 49 83 c5 RSP: 0018:ffffc9000ecb6f40 EFLAGS: 00010a06 RAX: 1bd5a9d5a0000003 RBX: ffff8880293a4738 RCX: ffff8880756b8000 RDX: 0000000000000000 RSI: 0000000080000001 RDI: 0000000000000000 RBP: ffffc9000ecb72b0 R08: ffff8880293a415f R09: 1ffff1100527482b R10: dffffc0000000000 R11: ffffed100527482c R12: dead4ead00000018 R13: dffffc0000000000 R14: ffff8880293a4100 R15: 1ffff110052748e7 FS: 0000000000000000(0000) GS:ffff888125c1c000(0063) knlGS:00000000f54d6b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 000000008000e000 CR3: 000000007449c000 CR4: 00000000003526f0 Call Trace: smc_diag_dump+0x59/0xa0 net/smc/smc_diag.c:236 netlink_dump+0x6e1/0xe90 net/netlink/af_netlink.c:2327 __netlink_dump_start+0x5cb/0x7e0 net/netlink/af_netlink.c:2442 netlink_dump_start include/linux/netlink.h:341 [inline] smc_diag_handler_dump+0x178/0x210 net/smc/smc_diag.c:251 sock_diag_rcv_msg+0x4c9/0x600 net/core/sock_diag.c:-1 netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2552 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline] netlink_unicast+0x82c/0x9e0 net/netlink/af_netlink.c:1346 netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1896 sock_sendmsg_nosec net/socket.c:714 [inline] __sock_sendmsg+0x21c/0x270 net/socket.c:729 ____sys_sendmsg+0x505/0x830 net/socket.c:2614 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2668 __sys_sendmsg+0x164/0x220 net/socket.c:2700 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0xb6/0x2b0 arch/x86/entry/syscall_32.c:306 do_fast_syscall_32+0x34/0x80 arch/x86/entry/syscall_32.c:331 entry_SYSENTER_compat_after_hwframe+0x84/0x8e RIP: 0023:0xf7fb6539 Code: 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 002b:00000000f54d655c EFLAGS: 00000206 ORIG_RAX: 0000000000000172 RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000080000540 RDX: 0000000000000600 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:smc_diag_msg_common_fill net/smc/smc_diag.c:44 [inline] RIP: 0010:__smc_diag_dump net/smc/smc_diag.c:89 [inline] RIP: 0010:smc_diag_dump_proto+0x4cd/0x1fb0 net/smc/smc_diag.c:217 Code: 80 3c 2f 00 74 08 48 89 df e8 6f 05 fb f6 4c 8b 23 4d 85 e4 0f 84 22 02 00 00 48 89 5c 24 30 49 83 c4 18 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 44 05 fb f6 4d 8b 2c 24 49 83 c5 RSP: 0018:ffffc9000ecb6f40 EFLAGS: 00010a06 RAX: 1bd5a9d5a0000003 RBX: ffff8880293a4738 RCX: ffff8880756b8000 RDX: 0000000000000000 RSI: 0000000080000001 RDI: 0000000000000000 RBP: ffffc9000ecb72b0 R08: ffff8880293a415f R09: 1ffff1100527482b R10: dffffc0000000000 R11: ffffed100527482c R12: dead4ead00000018 R13: dffffc0000000000 R14: ffff8880293a4100 R15: 1ffff110052748e7 FS: 0000000000000000(0000) GS:ffff888125c1c000(0063) knlGS:00000000f54d6b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 000000008000e000 CR3: 000000007449c000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 80 3c 2f 00 cmpb $0x0,(%rdi,%rbp,1) 4: 74 08 je 0xe 6: 48 89 df mov %rbx,%rdi 9: e8 6f 05 fb f6 call 0xf6fb057d e: 4c 8b 23 mov (%rbx),%r12 11: 4d 85 e4 test %r12,%r12 14: 0f 84 22 02 00 00 je 0x23c 1a: 48 89 5c 24 30 mov %rbx,0x30(%rsp) 1f: 49 83 c4 18 add $0x18,%r12 23: 4c 89 e0 mov %r12,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 4c 89 e7 mov %r12,%rdi 34: e8 44 05 fb f6 call 0xf6fb057d 39: 4d 8b 2c 24 mov (%r12),%r13 3d: 49 rex.WB 3e: 83 .byte 0x83 3f: c5 .byte 0xc5