general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 0 PID: 12 Comm: ksoftirqd/0 Not tainted 5.10.117-syzkaller-986967-g0974b8411a58-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:dst_dev_put+0x26/0x1c0 net/core/dst.c:156 Code: 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 ff 49 bc 00 00 00 00 00 fc ff df e8 61 2d a6 fd 4d 89 fd 49 c1 ed 03 <43> 80 7c 25 00 00 74 08 4c 89 ff e8 7a 00 e0 fd 4d 8b 37 49 8d 7f RSP: 0018:ffffc900000c7958 EFLAGS: 00010202 RAX: ffffffff83c684ff RBX: 000000000000000b RCX: ffff88810023cf00 RDX: 0000000080000100 RSI: 0000000000000000 RDI: 000000000000000b RBP: ffffc900000c7980 R08: ffffffff840df72d R09: ffffc900000c76f4 R10: 000000000000000b R11: ffffffff84c00596 R12: dffffc0000000000 R13: 0000000000000001 R14: 0000607e08a4c078 R15: 000000000000000b FS: 0000000000000000(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8869632058 CR3: 0000000005e0f000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rt_fibinfo_free_cpus+0xee/0x1c0 net/ipv4/fib_semantics.c:203 fib_nh_common_release+0x8d/0x240 net/ipv4/fib_semantics.c:216 fib_nh_release net/ipv4/fib_semantics.c:228 [inline] free_fib_info_rcu+0x98/0x190 net/ipv4/fib_semantics.c:240 rcu_do_batch+0x59e/0xc40 kernel/rcu/tree.c:2485 rcu_core+0x59b/0xe30 kernel/rcu/tree.c:2726 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2739 __do_softirq+0x27e/0x596 kernel/softirq.c:305 run_ksoftirqd+0x23/0x30 kernel/softirq.c:667 smpboot_thread_fn+0x551/0x930 kernel/smpboot.c:164 kthread+0x349/0x3d0 kernel/kthread.c:313 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 Modules linked in: ---[ end trace 336c347c2c8fdb01 ]--- RIP: 0010:dst_dev_put+0x26/0x1c0 net/core/dst.c:156 Code: 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 ff 49 bc 00 00 00 00 00 fc ff df e8 61 2d a6 fd 4d 89 fd 49 c1 ed 03 <43> 80 7c 25 00 00 74 08 4c 89 ff e8 7a 00 e0 fd 4d 8b 37 49 8d 7f RSP: 0018:ffffc900000c7958 EFLAGS: 00010202 RAX: ffffffff83c684ff RBX: 000000000000000b RCX: ffff88810023cf00 RDX: 0000000080000100 RSI: 0000000000000000 RDI: 000000000000000b RBP: ffffc900000c7980 R08: ffffffff840df72d R09: ffffc900000c76f4 R10: 000000000000000b R11: ffffffff84c00596 R12: dffffc0000000000 R13: 0000000000000001 R14: 0000607e08a4c078 R15: 000000000000000b FS: 0000000000000000(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8869632058 CR3: 0000000005e0f000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 00 00 add %al,(%rax) 4: 55 push %rbp 5: 48 89 e5 mov %rsp,%rbp 8: 41 57 push %r15 a: 41 56 push %r14 c: 41 55 push %r13 e: 41 54 push %r12 10: 53 push %rbx 11: 49 89 ff mov %rdi,%r15 14: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12 1b: fc ff df 1e: e8 61 2d a6 fd callq 0xfda62d84 23: 4d 89 fd mov %r15,%r13 26: 49 c1 ed 03 shr $0x3,%r13 * 2a: 43 80 7c 25 00 00 cmpb $0x0,0x0(%r13,%r12,1) <-- trapping instruction 30: 74 08 je 0x3a 32: 4c 89 ff mov %r15,%rdi 35: e8 7a 00 e0 fd callq 0xfde000b4 3a: 4d 8b 37 mov (%r15),%r14 3d: 49 rex.WB 3e: 8d .byte 0x8d 3f: 7f .byte 0x7f