Oops: general protection fault, probably for non-canonical address 0xec2c282c2c2c2c2f: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: maybe wild-memory-access in range [0x6161616161616178-0x616161616161617f] CPU: 1 UID: 0 PID: 5880 Comm: kworker/1:5 Not tainted 6.12.0-next-20241128-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: events ser_release RIP: 0010:fib6_walk_continue+0x1de/0x8f0 net/ipv6/ip6_fib.c:2089 Code: 83 e6 04 31 ff e8 22 97 23 f7 83 e3 04 75 79 e8 78 93 23 f7 e9 51 02 00 00 e8 8e 04 58 01 49 8d 6c 24 18 48 89 eb 48 c1 eb 03 <42> 80 3c 3b 00 74 08 48 89 ef e8 f3 84 8e f7 48 83 7d 00 00 0f 84 RSP: 0018:ffffc900042b7298 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 0c2c2c2c2c2c2c2f RCX: ffff8880618ebc00 RDX: 0000000000000005 RSI: ffffffff8fdbee00 RDI: 0000000000000000 RBP: 6161616161616179 R08: 0000000000000005 R09: ffffffff8a7be0db R10: 0000000000000005 R11: ffff8880618ebc00 R12: 6161616161616161 R13: ffffc900042b7418 R14: ffffc900042b7410 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f455383c108 CR3: 0000000063cce000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: fib6_walk+0x168/0x2b0 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x31f/0x4b0 net/ipv6/ip6_fib.c:2268 rt6_sync_down_dev net/ipv6/route.c:4908 [inline] rt6_disable_ip+0x170/0x800 net/ipv6/route.c:4913 addrconf_ifdown+0x15d/0x1bd0 net/ipv6/addrconf.c:3877 addrconf_notify+0x3cb/0x1020 notifier_call_chain+0x1a5/0x3f0 kernel/notifier.c:85 call_netdevice_notifiers_extack net/core/dev.c:2034 [inline] call_netdevice_notifiers net/core/dev.c:2048 [inline] unregister_netdevice_many_notify+0xedd/0x1da0 net/core/dev.c:11520 unregister_netdevice_many net/core/dev.c:11584 [inline] unregister_netdevice_queue+0x303/0x370 net/core/dev.c:11456 unregister_netdevice include/linux/netdevice.h:3192 [inline] ser_release+0x1b2/0x250 drivers/net/caif/caif_serial.c:310 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:fib6_walk_continue+0x1de/0x8f0 net/ipv6/ip6_fib.c:2089 Code: 83 e6 04 31 ff e8 22 97 23 f7 83 e3 04 75 79 e8 78 93 23 f7 e9 51 02 00 00 e8 8e 04 58 01 49 8d 6c 24 18 48 89 eb 48 c1 eb 03 <42> 80 3c 3b 00 74 08 48 89 ef e8 f3 84 8e f7 48 83 7d 00 00 0f 84 RSP: 0018:ffffc900042b7298 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 0c2c2c2c2c2c2c2f RCX: ffff8880618ebc00 RDX: 0000000000000005 RSI: ffffffff8fdbee00 RDI: 0000000000000000 RBP: 6161616161616179 R08: 0000000000000005 R09: ffffffff8a7be0db R10: 0000000000000005 R11: ffff8880618ebc00 R12: 6161616161616161 R13: ffffc900042b7418 R14: ffffc900042b7410 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f455383c108 CR3: 0000000063cce000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 83 e6 04 and $0x4,%esi 3: 31 ff xor %edi,%edi 5: e8 22 97 23 f7 call 0xf723972c a: 83 e3 04 and $0x4,%ebx d: 75 79 jne 0x88 f: e8 78 93 23 f7 call 0xf723938c 14: e9 51 02 00 00 jmp 0x26a 19: e8 8e 04 58 01 call 0x15804ac 1e: 49 8d 6c 24 18 lea 0x18(%r12),%rbp 23: 48 89 eb mov %rbp,%rbx 26: 48 c1 eb 03 shr $0x3,%rbx * 2a: 42 80 3c 3b 00 cmpb $0x0,(%rbx,%r15,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 ef mov %rbp,%rdi 34: e8 f3 84 8e f7 call 0xf78e852c 39: 48 83 7d 00 00 cmpq $0x0,0x0(%rbp) 3e: 0f .byte 0xf 3f: 84 .byte 0x84