general protection fault, probably for non-canonical address 0xdffffc001fffffff: 0000 [#1] PREEMPT SMP KASAN KASAN: probably user-memory-access in range [0x00000000fffffff8-0x00000000ffffffff] CPU: 0 PID: 13 Comm: ksoftirqd/0 Not tainted 5.17.0-rc2-syzkaller-00169-gfe68195daf34 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:dst_dev_put+0x22/0x320 net/core/dst.c:154 Code: 00 00 00 00 00 0f 1f 00 41 57 41 56 49 89 fe 41 55 41 54 55 e8 8f 28 48 fa 4c 89 f2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 02 00 00 49 8d 7e 3a 4d 8b 26 48 b8 00 00 00 RSP: 0018:ffffc90000d27c48 EFLAGS: 00010207 RAX: dffffc0000000000 RBX: 0000000000000002 RCX: 0000000000000100 RDX: 000000001fffffff RSI: ffffffff87305001 RDI: 00000000ffffffff RBP: 0000000000000000 R08: 0000000000000000 R09: ffff888072f405b3 R10: ffffffff87c49ab0 R11: 0000000000000000 R12: dffffc0000000000 R13: 0000607f4602c6c0 R14: 00000000ffffffff R15: 00000000ffffffff FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f51c3cfc1b8 CR3: 000000007e972000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: rt_fibinfo_free_cpus.part.0+0xf5/0x180 net/ipv4/fib_semantics.c:204 rt_fibinfo_free_cpus net/ipv4/fib_semantics.c:196 [inline] fib_nh_common_release+0x11d/0x340 net/ipv4/fib_semantics.c:215 fib_nh_release net/ipv4/fib_semantics.c:227 [inline] free_fib_info_rcu+0x19d/0x4d0 net/ipv4/fib_semantics.c:239 rcu_do_batch kernel/rcu/tree.c:2527 [inline] rcu_core+0x7b8/0x1540 kernel/rcu/tree.c:2778 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558 run_ksoftirqd kernel/softirq.c:921 [inline] run_ksoftirqd+0x2d/0x60 kernel/softirq.c:913 smpboot_thread_fn+0x645/0x9c0 kernel/smpboot.c:164 kthread+0x2e9/0x3a0 kernel/kthread.c:377 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:dst_dev_put+0x22/0x320 net/core/dst.c:154 Code: 00 00 00 00 00 0f 1f 00 41 57 41 56 49 89 fe 41 55 41 54 55 e8 8f 28 48 fa 4c 89 f2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 02 00 00 49 8d 7e 3a 4d 8b 26 48 b8 00 00 00 RSP: 0018:ffffc90000d27c48 EFLAGS: 00010207 RAX: dffffc0000000000 RBX: 0000000000000002 RCX: 0000000000000100 RDX: 000000001fffffff RSI: ffffffff87305001 RDI: 00000000ffffffff RBP: 0000000000000000 R08: 0000000000000000 R09: ffff888072f405b3 R10: ffffffff87c49ab0 R11: 0000000000000000 R12: dffffc0000000000 R13: 0000607f4602c6c0 R14: 00000000ffffffff R15: 00000000ffffffff FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f51c3cfc1b8 CR3: 000000007e972000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 00 00 add %al,(%rax) 2: 00 00 add %al,(%rax) 4: 0f 1f 00 nopl (%rax) 7: 41 57 push %r15 9: 41 56 push %r14 b: 49 89 fe mov %rdi,%r14 e: 41 55 push %r13 10: 41 54 push %r12 12: 55 push %rbp 13: e8 8f 28 48 fa callq 0xfa4828a7 18: 4c 89 f2 mov %r14,%rdx 1b: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 22: fc ff df 25: 48 c1 ea 03 shr $0x3,%rdx * 29: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2d: 0f 85 dc 02 00 00 jne 0x30f 33: 49 8d 7e 3a lea 0x3a(%r14),%rdi 37: 4d 8b 26 mov (%r14),%r12 3a: 48 rex.W 3b: b8 .byte 0xb8 3c: 00 00 add %al,(%rax)