general protection fault, probably for non-canonical address 0xdffffc0000000019: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x00000000000000c8-0x00000000000000cf] CPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 6.1.0-rc6-next-20221122-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Workqueue: ipv6_addrconf addrconf_dad_work RIP: 0010:xfrm_policy_lookup_bytype.cold+0x1c/0x54 net/xfrm/xfrm_policy.c:2139 Code: 40 a4 26 8e e8 cb 96 37 fa e9 49 fc 7b fe e8 d1 1a 7e f7 49 8d bf cc 00 00 00 b8 ff ff 37 00 48 89 fa 48 c1 e0 2a 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 1c 41 RSP: 0018:ffffc90000a1f1e0 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000019 RSI: ffffffff8a02a3af RDI: 00000000000000cc RBP: 0000000000000000 R08: 0000000000000007 R09: fffffffffffff000 R10: 0000000000000000 R11: 1ffffffff21609e9 R12: 0000000000000000 R13: ffff88802a398000 R14: ffffed10054732ff R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005560ee6cbd28 CR3: 0000000071503000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: xfrm_policy_lookup net/xfrm/xfrm_policy.c:2151 [inline] xfrm_bundle_lookup net/xfrm/xfrm_policy.c:2958 [inline] xfrm_lookup_with_ifid+0x39b/0x20f0 net/xfrm/xfrm_policy.c:3099 xfrmi_xmit2 net/xfrm/xfrm_interface.c:404 [inline] xfrmi_xmit+0x3c7/0x1b90 net/xfrm/xfrm_interface.c:521 __netdev_start_xmit include/linux/netdevice.h:4859 [inline] netdev_start_xmit include/linux/netdevice.h:4873 [inline] xmit_one net/core/dev.c:3583 [inline] dev_hard_start_xmit+0x1c2/0x990 net/core/dev.c:3599 __dev_queue_xmit+0x2cdf/0x3ba0 net/core/dev.c:4249 dev_queue_xmit include/linux/netdevice.h:3029 [inline] neigh_connected_output+0x3c4/0x520 net/core/neighbour.c:1600 neigh_output include/net/neighbour.h:546 [inline] ip6_finish_output2+0x56c/0x1530 net/ipv6/ip6_output.c:134 __ip6_finish_output net/ipv6/ip6_output.c:195 [inline] ip6_finish_output+0x694/0x1170 net/ipv6/ip6_output.c:206 NF_HOOK_COND include/linux/netfilter.h:291 [inline] ip6_output+0x1f1/0x540 net/ipv6/ip6_output.c:227 dst_output include/net/dst.h:444 [inline] NF_HOOK include/linux/netfilter.h:302 [inline] ndisc_send_skb+0xa63/0x1740 net/ipv6/ndisc.c:508 ndisc_send_rs+0x132/0x6f0 net/ipv6/ndisc.c:718 addrconf_dad_completed+0x37a/0xda0 net/ipv6/addrconf.c:4248 addrconf_dad_begin net/ipv6/addrconf.c:4014 [inline] addrconf_dad_work+0x820/0x12d0 net/ipv6/addrconf.c:4116 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289 worker_thread+0x669/0x1090 kernel/workqueue.c:2436 kthread+0x2e8/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:xfrm_policy_lookup_bytype.cold+0x1c/0x54 net/xfrm/xfrm_policy.c:2139 Code: 40 a4 26 8e e8 cb 96 37 fa e9 49 fc 7b fe e8 d1 1a 7e f7 49 8d bf cc 00 00 00 b8 ff ff 37 00 48 89 fa 48 c1 e0 2a 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 1c 41 RSP: 0018:ffffc90000a1f1e0 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000019 RSI: ffffffff8a02a3af RDI: 00000000000000cc RBP: 0000000000000000 R08: 0000000000000007 R09: fffffffffffff000 R10: 0000000000000000 R11: 1ffffffff21609e9 R12: 0000000000000000 R13: ffff88802a398000 R14: ffffed10054732ff R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005560ee6cbd28 CR3: 0000000071503000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 4 bytes skipped: 0: e8 cb 96 37 fa callq 0xfa3796d0 5: e9 49 fc 7b fe jmpq 0xfe7bfc53 a: e8 d1 1a 7e f7 callq 0xf77e1ae0 f: 49 8d bf cc 00 00 00 lea 0xcc(%r15),%rdi 16: b8 ff ff 37 00 mov $0x37ffff,%eax 1b: 48 89 fa mov %rdi,%rdx 1e: 48 c1 e0 2a shl $0x2a,%rax 22: 48 c1 ea 03 shr $0x3,%rdx * 26: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx <-- trapping instruction 2a: 48 89 f8 mov %rdi,%rax 2d: 83 e0 07 and $0x7,%eax 30: 83 c0 03 add $0x3,%eax 33: 38 d0 cmp %dl,%al 35: 7c 04 jl 0x3b 37: 84 d2 test %dl,%dl 39: 75 1c jne 0x57 3b: 41 rex.B