BUG: unable to handle page fault for address: ffff888240000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 7801067 P4D 7801067 PUD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 26432 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00015-gf4bf8b65e48f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:do_csum arch/x86/lib/csum-partial_64.c:72 [inline] RIP: 0010:csum_partial+0x194/0x470 arch/x86/lib/csum-partial_64.c:136 Code: 89 44 24 28 45 31 ff 48 8b 6c 24 08 66 2e 0f 1f 84 00 00 00 00 00 4c 03 6d 00 4c 13 6d 08 4c 13 6d 10 4c 13 6d 18 4c 13 6d 20 <4c> 13 6d 28 4c 13 6d 30 4c 13 6d 38 4d 11 fd 45 85 f6 74 0e 48 83 RSP: 0018:ffff8881f07cf3a8 EFLAGS: 00010206 RAX: ffffffff84456d41 RBX: 000000001ffffffd RCX: 0000000000040000 RDX: ffffc9000540c000 RSI: 000000000003ffff RDI: 0000000000040000 RBP: ffff88823fffffd8 R08: ffffffff84456ce1 R09: 0000000000000000 R10: ffffed103b60375b R11: 0000000000000000 R12: 00000000ffffffec R13: 38b9190395f5efd8 R14: 00000000026c06e1 R15: 0000000000000000 FS: 00007f7c67adc700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff888240000000 CR3: 0000000194bbc000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lco_csum include/linux/skbuff.h:4546 [inline] gre_checksum include/net/gre.h:114 [inline] gre_build_header+0x477/0x780 include/net/gre.h:149 __gre_xmit net/ipv4/ip_gre.c:440 [inline] ipgre_xmit+0x6ab/0x9e0 net/ipv4/ip_gre.c:626 __netdev_start_xmit include/linux/netdevice.h:4506 [inline] netdev_start_xmit include/linux/netdevice.h:4520 [inline] xmit_one+0xfa/0x470 net/core/dev.c:3203 dev_hard_start_xmit net/core/dev.c:3219 [inline] __dev_queue_xmit+0x14ec/0x2e50 net/core/dev.c:3779 packet_snd net/packet/af_packet.c:2988 [inline] packet_sendmsg+0x4d4d/0x6780 net/packet/af_packet.c:3013 sock_sendmsg_nosec net/socket.c:638 [inline] sock_sendmsg net/socket.c:658 [inline] ____sys_sendmsg+0x583/0x8c0 net/socket.c:2298 ___sys_sendmsg net/socket.c:2352 [inline] __sys_sendmsg+0x2c4/0x3b0 net/socket.c:2398 do_syscall_64+0xcb/0x1e0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x4665f9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f7c67adc188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 RDX: 0000000000000000 RSI: 0000000020003d40 RDI: 0000000000000003 RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 R13: 00007ffd3ce5c05f R14: 00007f7c67adc300 R15: 0000000000022000 Modules linked in: CR2: ffff888240000000 ---[ end trace ccb640206173f604 ]--- RIP: 0010:do_csum arch/x86/lib/csum-partial_64.c:72 [inline] RIP: 0010:csum_partial+0x194/0x470 arch/x86/lib/csum-partial_64.c:136 Code: 89 44 24 28 45 31 ff 48 8b 6c 24 08 66 2e 0f 1f 84 00 00 00 00 00 4c 03 6d 00 4c 13 6d 08 4c 13 6d 10 4c 13 6d 18 4c 13 6d 20 <4c> 13 6d 28 4c 13 6d 30 4c 13 6d 38 4d 11 fd 45 85 f6 74 0e 48 83 RSP: 0018:ffff8881f07cf3a8 EFLAGS: 00010206 RAX: ffffffff84456d41 RBX: 000000001ffffffd RCX: 0000000000040000 RDX: ffffc9000540c000 RSI: 000000000003ffff RDI: 0000000000040000 RBP: ffff88823fffffd8 R08: ffffffff84456ce1 R09: 0000000000000000 R10: ffffed103b60375b R11: 0000000000000000 R12: 00000000ffffffec R13: 38b9190395f5efd8 R14: 00000000026c06e1 R15: 0000000000000000 FS: 00007f7c67adc700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff888240000000 CR3: 0000000194bbc000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 89 44 24 28 mov %eax,0x28(%rsp) 4: 45 31 ff xor %r15d,%r15d 7: 48 8b 6c 24 08 mov 0x8(%rsp),%rbp c: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) 13: 00 00 00 16: 4c 03 6d 00 add 0x0(%rbp),%r13 1a: 4c 13 6d 08 adc 0x8(%rbp),%r13 1e: 4c 13 6d 10 adc 0x10(%rbp),%r13 22: 4c 13 6d 18 adc 0x18(%rbp),%r13 26: 4c 13 6d 20 adc 0x20(%rbp),%r13 * 2a: 4c 13 6d 28 adc 0x28(%rbp),%r13 <-- trapping instruction 2e: 4c 13 6d 30 adc 0x30(%rbp),%r13 32: 4c 13 6d 38 adc 0x38(%rbp),%r13 36: 4d 11 fd adc %r15,%r13 39: 45 85 f6 test %r14d,%r14d 3c: 74 0e je 0x4c 3e: 48 rex.W 3f: 83 .byte 0x83