general protection fault, probably for non-canonical address 0xdffffc00e0000051: 0000 [#1] PREEMPT SMP KASAN KASAN: probably user-memory-access in range [0x0000000700000288-0x000000070000028f] CPU: 1 PID: 2491 Comm: syz-executor.2 Not tainted 5.10.119-syzkaller-00334-gebc9fb07d294 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 RIP: 0010:inet_ctl_sock_destroy include/net/inet_common.h:63 [inline] RIP: 0010:tcp_sk_exit+0x188/0x280 net/ipv4/tcp_ipv4.c:2830 Code: 80 3c 28 00 74 08 4c 89 e7 e8 24 ca a2 fd 49 8b 1c 24 48 85 db 74 3b e8 16 ce 68 fd 48 81 c3 88 02 00 00 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 f9 c9 a2 fd 48 8b 3b e8 e1 78 b5 RSP: 0018:ffffc9000627f818 EFLAGS: 00010203 RAX: 00000000e0000051 RBX: 000000070000028f RCX: ffff888154b5bb40 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 RBP: ffffc9000627f850 R08: ffffffff8403e703 R09: 0000000000000003 R10: fffff52000c4fef5 R11: 1ffff92000c4fef4 R12: ffffe8ffffc44930 R13: dffffc0000000000 R14: ffff88810fb116c8 R15: 0000000000000000 FS: 00007f67d7619700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8113b4cc18 CR3: 00000001057ba000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ops_exit_list net/core/net_namespace.c:187 [inline] setup_net+0x609/0xa70 net/core/net_namespace.c:367 copy_net_ns+0x317/0x520 net/core/net_namespace.c:485 create_new_namespaces+0x425/0x710 kernel/nsproxy.c:110 copy_namespaces+0x1d1/0x220 kernel/nsproxy.c:179 copy_process+0x1383/0x33a0 kernel/fork.c:2154 kernel_clone+0x22d/0x900 kernel/fork.c:2523 __do_sys_clone3 kernel/fork.c:2800 [inline] __se_sys_clone3 kernel/fork.c:2784 [inline] __x64_sys_clone3+0x375/0x3a0 kernel/fork.c:2784 do_syscall_64+0x34/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f67d8506199 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f67d7619038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 RAX: ffffffffffffffda RBX: 00007f67d86191d0 RCX: 00007f67d8506199 RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f67d7619050 RBP: 00007f67d856013b R08: 0000000000000000 R09: 0000000000000058 R10: 00007f67d7619050 R11: 0000000000000246 R12: 0000000000000058 R13: 00007fffcb84d88f R14: 00007f67d7619300 R15: 0000000000022000 Modules linked in: ---[ end trace 6c80ed8e80339cc1 ]--- RIP: 0010:inet_ctl_sock_destroy include/net/inet_common.h:63 [inline] RIP: 0010:tcp_sk_exit+0x188/0x280 net/ipv4/tcp_ipv4.c:2830 Code: 80 3c 28 00 74 08 4c 89 e7 e8 24 ca a2 fd 49 8b 1c 24 48 85 db 74 3b e8 16 ce 68 fd 48 81 c3 88 02 00 00 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 f9 c9 a2 fd 48 8b 3b e8 e1 78 b5 RSP: 0018:ffffc9000627f818 EFLAGS: 00010203 RAX: 00000000e0000051 RBX: 000000070000028f RCX: ffff888154b5bb40 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 RBP: ffffc9000627f850 R08: ffffffff8403e703 R09: 0000000000000003 R10: fffff52000c4fef5 R11: 1ffff92000c4fef4 R12: ffffe8ffffc44930 R13: dffffc0000000000 R14: ffff88810fb116c8 R15: 0000000000000000 FS: 00007f67d7619700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8113b4cc18 CR3: 00000001057ba000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1) 4: 74 08 je 0xe 6: 4c 89 e7 mov %r12,%rdi 9: e8 24 ca a2 fd callq 0xfda2ca32 e: 49 8b 1c 24 mov (%r12),%rbx 12: 48 85 db test %rbx,%rbx 15: 74 3b je 0x52 17: e8 16 ce 68 fd callq 0xfd68ce32 1c: 48 81 c3 88 02 00 00 add $0x288,%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 df mov %rbx,%rdi 34: e8 f9 c9 a2 fd callq 0xfda2ca32 39: 48 8b 3b mov (%rbx),%rdi 3c: e8 .byte 0xe8 3d: e1 78 loope 0xb7 3f: b5 .byte 0xb5