general protection fault, probably for non-canonical address 0xdffffc0000000026: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000130-0x0000000000000137] CPU: 0 PID: 5954 Comm: syz.0.17 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 RIP: 0010:__lock_acquire+0xeb/0x7c80 kernel/locking/lockdep.c:5005 Code: 85 dc 66 00 00 83 3d 2f c0 e3 0c 00 48 89 9c 24 f0 00 00 00 0f 84 11 10 00 00 83 3d fe d5 58 0b 00 74 36 48 89 f8 48 c1 e8 03 <42> 80 3c 00 00 74 1f 48 8b bc 24 88 00 00 00 e8 b1 e9 75 00 48 8b RSP: 0018:ffffc900045bf4c0 EFLAGS: 00010002 RAX: 0000000000000026 RBX: 1ffff920008b7ebc RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000130 RBP: ffffc900045bf708 R08: dffffc0000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1c950ae R12: 0000000000000001 R13: 0000000000000000 R14: ffff88802b850000 R15: 0000000000000000 FS: 000055555dc4d500(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00002000000002c0 CR3: 0000000076ade000 CR4: 00000000003506f0 Call Trace: lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754 lock_sock_nested+0x48/0x100 net/core/sock.c:3532 lock_sock include/net/sock.h:1767 [inline] rose_kill_by_device net/rose/af_rose.c:210 [inline] rose_device_event+0x36a/0x670 net/rose/af_rose.c:244 notifier_call_chain+0x197/0x390 kernel/notifier.c:93 call_netdevice_notifiers_extack net/core/dev.c:2064 [inline] call_netdevice_notifiers net/core/dev.c:2078 [inline] __dev_notify_flags+0x18e/0x2e0 net/core/dev.c:-1 dev_change_flags+0xe8/0x1a0 net/core/dev.c:8762 dev_ifsioc+0x6a7/0xe20 net/core/dev_ioctl.c:529 dev_ioctl+0x7e2/0x1170 net/core/dev_ioctl.c:786 sock_do_ioctl+0x226/0x2f0 net/socket.c:1236 sock_ioctl+0x623/0x7a0 net/socket.c:1341 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:871 [inline] __se_sys_ioctl+0xfd/0x170 fs/ioctl.c:857 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f5bb458eec9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffcab3f9938 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f5bb47e5fa0 RCX: 00007f5bb458eec9 RDX: 0000200000000300 RSI: 0000000000008914 RDI: 0000000000000004 RBP: 00007f5bb4611f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5bb47e5fa0 R14: 00007f5bb47e5fa0 R15: 0000000000000003 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__lock_acquire+0xeb/0x7c80 kernel/locking/lockdep.c:5005 Code: 85 dc 66 00 00 83 3d 2f c0 e3 0c 00 48 89 9c 24 f0 00 00 00 0f 84 11 10 00 00 83 3d fe d5 58 0b 00 74 36 48 89 f8 48 c1 e8 03 <42> 80 3c 00 00 74 1f 48 8b bc 24 88 00 00 00 e8 b1 e9 75 00 48 8b RSP: 0018:ffffc900045bf4c0 EFLAGS: 00010002 RAX: 0000000000000026 RBX: 1ffff920008b7ebc RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000130 RBP: ffffc900045bf708 R08: dffffc0000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1c950ae R12: 0000000000000001 R13: 0000000000000000 R14: ffff88802b850000 R15: 0000000000000000 FS: 000055555dc4d500(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00002000000002c0 CR3: 0000000076ade000 CR4: 00000000003506f0 ---------------- Code disassembly (best guess): 0: 85 dc test %ebx,%esp 2: 66 00 00 data16 add %al,(%rax) 5: 83 3d 2f c0 e3 0c 00 cmpl $0x0,0xce3c02f(%rip) # 0xce3c03b c: 48 89 9c 24 f0 00 00 mov %rbx,0xf0(%rsp) 13: 00 14: 0f 84 11 10 00 00 je 0x102b 1a: 83 3d fe d5 58 0b 00 cmpl $0x0,0xb58d5fe(%rip) # 0xb58d61f 21: 74 36 je 0x59 23: 48 89 f8 mov %rdi,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 00 00 cmpb $0x0,(%rax,%r8,1) <-- trapping instruction 2f: 74 1f je 0x50 31: 48 8b bc 24 88 00 00 mov 0x88(%rsp),%rdi 38: 00 39: e8 b1 e9 75 00 call 0x75e9ef 3e: 48 rex.W 3f: 8b .byte 0x8b