kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 1058 Comm: kworker/u4:5 Not tainted 5.4.210-syzkaller-00019-g035e4939365c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 Workqueue: tipc_rcv tipc_topsrv_accept RIP: 0010:kernel_accept+0x1be/0x3d0 net/socket.c:3618 Code: 8b 18 48 83 c3 20 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 08 48 89 df e8 00 f1 39 fe 48 8b 1b 48 83 c3 08 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 44 89 ed 74 08 48 89 df e8 e0 f0 39 fe 48 8b 3b e8 RSP: 0018:ffff8881e83b7c88 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff8881eafd3f00 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff83531965 R09: fffffbfff0c0d2a5 R10: fffffbfff0c0d2a5 R11: 1ffffffff0c0d2a4 R12: ffff8881b238f4a0 R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff1103d076f9e FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 00000001b29ef000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: tipc_topsrv_accept+0x8e/0x260 net/tipc/topsrv.c:460 process_one_work+0x6ca/0xc40 kernel/workqueue.c:2287 worker_thread+0xae0/0x1440 kernel/workqueue.c:2433 kthread+0x2d8/0x360 kernel/kthread.c:288 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352 Modules linked in: ---[ end trace eca438256f3cbbfc ]--- RIP: 0010:kernel_accept+0x1be/0x3d0 net/socket.c:3618 Code: 8b 18 48 83 c3 20 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 08 48 89 df e8 00 f1 39 fe 48 8b 1b 48 83 c3 08 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 44 89 ed 74 08 48 89 df e8 e0 f0 39 fe 48 8b 3b e8 RSP: 0018:ffff8881e83b7c88 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff8881eafd3f00 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff83531965 R09: fffffbfff0c0d2a5 R10: fffffbfff0c0d2a5 R11: 1ffffffff0c0d2a4 R12: ffff8881b238f4a0 R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff1103d076f9e FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 00000001ed74e000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 8b 18 mov (%rax),%ebx 2: 48 83 c3 20 add $0x20,%rbx 6: 48 89 d8 mov %rbx,%rax 9: 48 c1 e8 03 shr $0x3,%rax d: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) 12: 74 08 je 0x1c 14: 48 89 df mov %rbx,%rdi 17: e8 00 f1 39 fe callq 0xfe39f11c 1c: 48 8b 1b mov (%rbx),%rbx 1f: 48 83 c3 08 add $0x8,%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) <-- trapping instruction 2f: 44 89 ed mov %r13d,%ebp 32: 74 08 je 0x3c 34: 48 89 df mov %rbx,%rdi 37: e8 e0 f0 39 fe callq 0xfe39f11c 3c: 48 8b 3b mov (%rbx),%rdi 3f: e8 .byte 0xe8