Oops: general protection fault, probably for non-canonical address 0xdffffc0000000014: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x00000000000000a0-0x00000000000000a7] CPU: 1 UID: 0 PID: 35 Comm: kworker/u8:2 Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: ipv6_addrconf addrconf_dad_work RIP: 0010:rt6_get_pcpu_route net/ipv6/route.c:1408 [inline] RIP: 0010:ip6_pol_route+0x4d1/0x15d0 net/ipv6/route.c:2264 Code: 94 f7 48 8b 03 65 4c 8b 30 31 ff 4c 89 f6 e8 46 ca 2a f7 4d 85 f6 0f 84 da 00 00 00 49 8d 9e 98 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 12 0f 00 00 44 8b 3b 31 ff 44 89 fe e8 RSP: 0018:ffffc90000a183a0 EFLAGS: 00010217 RAX: 0000000000000014 RBX: 00000000000000a6 RCX: ffff88801da9bc00 RDX: 0000000000000100 RSI: 000000000000000e RDI: 0000000000000000 RBP: ffffc90000a184f0 R08: ffffffff8a6a127a R09: ffff8880591d1280 R10: dffffc0000000000 R11: fffffbfff2039fde R12: ffffc90000a18470 R13: 1ffff9200014308e R14: 000000000000000e R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555dd59af950 CR3: 000000002d12c000 CR4: 0000000000350ef0 Call Trace: pol_lookup_func include/net/ip6_fib.h:616 [inline] fib6_rule_lookup+0x58c/0x790 net/ipv6/fib6_rules.c:117 ip6_route_input_lookup net/ipv6/route.c:2300 [inline] ip6_route_input+0x859/0xd90 net/ipv6/route.c:2596 ip6_rcv_finish+0x144/0x180 net/ipv6/ip6_input.c:77 NF_HOOK+0x3a6/0x450 include/linux/netfilter.h:314 __netif_receive_skb_one_core net/core/dev.c:5666 [inline] __netif_receive_skb+0x1ea/0x650 net/core/dev.c:5779 process_backlog+0x662/0x15b0 net/core/dev.c:6111 __napi_poll+0xcd/0x490 net/core/dev.c:6775 napi_poll net/core/dev.c:6844 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:6966 handle_softirqs+0x2c7/0x980 kernel/softirq.c:554 do_softirq+0x11b/0x1e0 kernel/softirq.c:455 __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] __dev_queue_xmit+0x171d/0x3ed0 net/core/dev.c:4455 neigh_output include/net/neighbour.h:542 [inline] ip6_finish_output2+0x1003/0x1730 net/ipv6/ip6_output.c:141 ip6_finish_output+0x41e/0x810 net/ipv6/ip6_output.c:226 NF_HOOK include/linux/netfilter.h:314 [inline] ndisc_send_skb+0xab2/0x1380 net/ipv6/ndisc.c:511 ndisc_send_ns+0xcc/0x160 net/ipv6/ndisc.c:669 addrconf_dad_work+0xb45/0x16f0 net/ipv6/addrconf.c:4284 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa65/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:rt6_get_pcpu_route net/ipv6/route.c:1408 [inline] RIP: 0010:ip6_pol_route+0x4d1/0x15d0 net/ipv6/route.c:2264 Code: 94 f7 48 8b 03 65 4c 8b 30 31 ff 4c 89 f6 e8 46 ca 2a f7 4d 85 f6 0f 84 da 00 00 00 49 8d 9e 98 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 12 0f 00 00 44 8b 3b 31 ff 44 89 fe e8 RSP: 0018:ffffc90000a183a0 EFLAGS: 00010217 RAX: 0000000000000014 RBX: 00000000000000a6 RCX: ffff88801da9bc00 RDX: 0000000000000100 RSI: 000000000000000e RDI: 0000000000000000 RBP: ffffc90000a184f0 R08: ffffffff8a6a127a R09: ffff8880591d1280 R10: dffffc0000000000 R11: fffffbfff2039fde R12: ffffc90000a18470 R13: 1ffff9200014308e R14: 000000000000000e R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555dd59af950 CR3: 000000002d12c000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: 94 xchg %eax,%esp 1: f7 48 8b 03 65 4c 8b testl $0x8b4c6503,-0x75(%rax) 8: 30 31 xor %dh,(%rcx) a: ff 4c 89 f6 decl -0xa(%rcx,%rcx,4) e: e8 46 ca 2a f7 call 0xf72aca59 13: 4d 85 f6 test %r14,%r14 16: 0f 84 da 00 00 00 je 0xf6 1c: 49 8d 9e 98 00 00 00 lea 0x98(%r14),%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 0f b6 04 38 movzbl (%rax,%r15,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 0f 85 12 0f 00 00 jne 0xf49 37: 44 8b 3b mov (%rbx),%r15d 3a: 31 ff xor %edi,%edi 3c: 44 89 fe mov %r15d,%esi 3f: e8 .byte 0xe8