Oops: general protection fault, probably for non-canonical address 0xdffffc0000000014: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x00000000000000a0-0x00000000000000a7]
CPU: 1 UID: 0 PID: 35 Comm: kworker/u8:2 Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: ipv6_addrconf addrconf_dad_work
RIP: 0010:rt6_get_pcpu_route net/ipv6/route.c:1408 [inline]
RIP: 0010:ip6_pol_route+0x4d1/0x15d0 net/ipv6/route.c:2264
Code: 94 f7 48 8b 03 65 4c 8b 30 31 ff 4c 89 f6 e8 46 ca 2a f7 4d 85 f6 0f 84 da 00 00 00 49 8d 9e 98 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 12 0f 00 00 44 8b 3b 31 ff 44 89 fe e8
RSP: 0018:ffffc90000a183a0 EFLAGS: 00010217
RAX: 0000000000000014 RBX: 00000000000000a6 RCX: ffff88801da9bc00
RDX: 0000000000000100 RSI: 000000000000000e RDI: 0000000000000000
RBP: ffffc90000a184f0 R08: ffffffff8a6a127a R09: ffff8880591d1280
R10: dffffc0000000000 R11: fffffbfff2039fde R12: ffffc90000a18470
R13: 1ffff9200014308e R14: 000000000000000e R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555dd59af950 CR3: 000000002d12c000 CR4: 0000000000350ef0
Call Trace:
pol_lookup_func include/net/ip6_fib.h:616 [inline]
fib6_rule_lookup+0x58c/0x790 net/ipv6/fib6_rules.c:117
ip6_route_input_lookup net/ipv6/route.c:2300 [inline]
ip6_route_input+0x859/0xd90 net/ipv6/route.c:2596
ip6_rcv_finish+0x144/0x180 net/ipv6/ip6_input.c:77
NF_HOOK+0x3a6/0x450 include/linux/netfilter.h:314
__netif_receive_skb_one_core net/core/dev.c:5666 [inline]
__netif_receive_skb+0x1ea/0x650 net/core/dev.c:5779
process_backlog+0x662/0x15b0 net/core/dev.c:6111
__napi_poll+0xcd/0x490 net/core/dev.c:6775
napi_poll net/core/dev.c:6844 [inline]
net_rx_action+0x89b/0x1240 net/core/dev.c:6966
handle_softirqs+0x2c7/0x980 kernel/softirq.c:554
do_softirq+0x11b/0x1e0 kernel/softirq.c:455
__local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382
local_bh_enable include/linux/bottom_half.h:33 [inline]
rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline]
__dev_queue_xmit+0x171d/0x3ed0 net/core/dev.c:4455
neigh_output include/net/neighbour.h:542 [inline]
ip6_finish_output2+0x1003/0x1730 net/ipv6/ip6_output.c:141
ip6_finish_output+0x41e/0x810 net/ipv6/ip6_output.c:226
NF_HOOK include/linux/netfilter.h:314 [inline]
ndisc_send_skb+0xab2/0x1380 net/ipv6/ndisc.c:511
ndisc_send_ns+0xcc/0x160 net/ipv6/ndisc.c:669
addrconf_dad_work+0xb45/0x16f0 net/ipv6/addrconf.c:4284
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0xa65/0x1850 kernel/workqueue.c:3310
worker_thread+0x870/0xd30 kernel/workqueue.c:3391
kthread+0x2f2/0x390 kernel/kthread.c:389
ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:rt6_get_pcpu_route net/ipv6/route.c:1408 [inline]
RIP: 0010:ip6_pol_route+0x4d1/0x15d0 net/ipv6/route.c:2264
Code: 94 f7 48 8b 03 65 4c 8b 30 31 ff 4c 89 f6 e8 46 ca 2a f7 4d 85 f6 0f 84 da 00 00 00 49 8d 9e 98 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 12 0f 00 00 44 8b 3b 31 ff 44 89 fe e8
RSP: 0018:ffffc90000a183a0 EFLAGS: 00010217
RAX: 0000000000000014 RBX: 00000000000000a6 RCX: ffff88801da9bc00
RDX: 0000000000000100 RSI: 000000000000000e RDI: 0000000000000000
RBP: ffffc90000a184f0 R08: ffffffff8a6a127a R09: ffff8880591d1280
R10: dffffc0000000000 R11: fffffbfff2039fde R12: ffffc90000a18470
R13: 1ffff9200014308e R14: 000000000000000e R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555dd59af950 CR3: 000000002d12c000 CR4: 0000000000350ef0
----------------
Code disassembly (best guess):
0: 94 xchg %eax,%esp
1: f7 48 8b 03 65 4c 8b testl $0x8b4c6503,-0x75(%rax)
8: 30 31 xor %dh,(%rcx)
a: ff 4c 89 f6 decl -0xa(%rcx,%rcx,4)
e: e8 46 ca 2a f7 call 0xf72aca59
13: 4d 85 f6 test %r14,%r14
16: 0f 84 da 00 00 00 je 0xf6
1c: 49 8d 9e 98 00 00 00 lea 0x98(%r14),%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 0f b6 04 38 movzbl (%rax,%r15,1),%eax <-- trapping instruction
2f: 84 c0 test %al,%al
31: 0f 85 12 0f 00 00 jne 0xf49
37: 44 8b 3b mov (%rbx),%r15d
3a: 31 ff xor %edi,%edi
3c: 44 89 fe mov %r15d,%esi
3f: e8 .byte 0xe8