general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
CPU: 0 PID: 17718 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:tls_sk_proto_close+0xd8/0xaf0 net/tls/tls_main.c:306
Code: 02 00 0f 85 16 09 00 00 48 8b 85 f8 02 00 00 4d 8d 6c 24 14 4c 89 ea 48 c1 ea 03 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df <0f> b6 04 02 4c 89 ea 83 e2 07 38 d0 7f 08 84 c0 0f 85 4f 07 00 00
RSP: 0018:ffffc900043afa40 EFLAGS: 00010203
RAX: dffffc0000000000 RBX: dffffc0000000000 RCX: ffffc9000c622000
RDX: 0000000000000002 RSI: ffffffff87d48413 RDI: ffff888072e01af8
RBP: ffff888072e01800 R08: 0000000000000001 R09: 00000000fffffff0
R10: ffffffff87d486a1 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000014 R14: ffff888068e59108 R15: 0000000000000001
FS:  00007efcc0913700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f18cf1a6f64 CR3: 000000002cb2b000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 tls_sk_proto_close+0x356/0xaf0 net/tls/tls_main.c:329
 inet_release+0x12e/0x280 net/ipv4/af_inet.c:428
 __sock_release+0xcd/0x280 net/socket.c:649
 sock_close+0x18/0x20 net/socket.c:1314
 __fput+0x286/0x9f0 fs/file_table.c:280
 task_work_run+0xdd/0x1a0 kernel/task_work.c:164
 get_signal+0x1bef/0x2220 kernel/signal.c:2624
 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
 handle_signal_work kernel/entry/common.c:148 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
 exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
 syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7efcc19dfae9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007efcc0913188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
RAX: 0000000000000422 RBX: 00007efcc1af30f0 RCX: 00007efcc19dfae9
RDX: 0000000000000422 RSI: 0000000020000540 RDI: 0000000000000004
RBP: 00007efcc1a39ff7 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffd735351af R14: 00007efcc0913300 R15: 0000000000022000
 </TASK>
Modules linked in:
---[ end trace 1792c0d149d5a06e ]---
RIP: 0010:tls_sk_proto_close+0xd8/0xaf0 net/tls/tls_main.c:306
Code: 02 00 0f 85 16 09 00 00 48 8b 85 f8 02 00 00 4d 8d 6c 24 14 4c 89 ea 48 c1 ea 03 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df <0f> b6 04 02 4c 89 ea 83 e2 07 38 d0 7f 08 84 c0 0f 85 4f 07 00 00
RSP: 0018:ffffc900043afa40 EFLAGS: 00010203
RAX: dffffc0000000000 RBX: dffffc0000000000 RCX: ffffc9000c622000
RDX: 0000000000000002 RSI: ffffffff87d48413 RDI: ffff888072e01af8
RBP: ffff888072e01800 R08: 0000000000000001 R09: 00000000fffffff0
R10: ffffffff87d486a1 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000014 R14: ffff888068e59108 R15: 0000000000000001
FS:  00007efcc0913700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2d239000 CR3: 000000002cb2b000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	02 00                	add    (%rax),%al
   2:	0f 85 16 09 00 00    	jne    0x91e
   8:	48 8b 85 f8 02 00 00 	mov    0x2f8(%rbp),%rax
   f:	4d 8d 6c 24 14       	lea    0x14(%r12),%r13
  14:	4c 89 ea             	mov    %r13,%rdx
  17:	48 c1 ea 03          	shr    $0x3,%rdx
  1b:	48 89 44 24 18       	mov    %rax,0x18(%rsp)
  20:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  27:	fc ff df
* 2a:	0f b6 04 02          	movzbl (%rdx,%rax,1),%eax <-- trapping instruction
  2e:	4c 89 ea             	mov    %r13,%rdx
  31:	83 e2 07             	and    $0x7,%edx
  34:	38 d0                	cmp    %dl,%al
  36:	7f 08                	jg     0x40
  38:	84 c0                	test   %al,%al
  3a:	0f 85 4f 07 00 00    	jne    0x78f