general protection fault, probably for non-canonical address 0xdffffc001fffffff: 0000 [#1] PREEMPT SMP KASAN KASAN: probably user-memory-access in range [0x00000000fffffff8-0x00000000ffffffff] CPU: 1 PID: 18 Comm: ksoftirqd/1 Tainted: G W 5.10.119-syzkaller-00165-g62f4403dcb3c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:dst_dev_put+0x26/0x1c0 net/core/dst.c:156 Code: 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 ff 49 bc 00 00 00 00 00 fc ff df e8 51 bd cf fd 4d 89 fd 49 c1 ed 03 <43> 80 7c 25 00 00 74 08 4c 89 ff e8 9a 53 07 fe 4d 8b 37 49 8d 7f RSP: 0018:ffffc90000137b20 EFLAGS: 00010207 RAX: ffffffff83994e4f RBX: 00000000fffffffe RCX: ffff88810028eac0 RDX: 0000000080000100 RSI: 0000000000000000 RDI: 00000000fffffffe RBP: ffffc90000137b48 R08: ffffffff83de386d R09: ffffc900001378c4 R10: 000000000000000b R11: ffffffff8480067b R12: dffffc0000000000 R13: 000000001fffffff R14: 0000607e08c3fb78 R15: 00000000fffffffe FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b31f3594b0 CR3: 000000010940b000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rt_fibinfo_free_cpus+0xee/0x1c0 net/ipv4/fib_semantics.c:203 fib_nh_common_release+0x8d/0x240 net/ipv4/fib_semantics.c:216 fib_nh_release net/ipv4/fib_semantics.c:228 [inline] free_fib_info_rcu+0x98/0x190 net/ipv4/fib_semantics.c:240 rcu_do_batch+0x4ad/0xb00 kernel/rcu/tree.c:2485 rcu_core+0x64a/0xdf0 kernel/rcu/tree.c:2726 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2739 __do_softirq+0x253/0x67b kernel/softirq.c:298 run_ksoftirqd+0x23/0x30 kernel/softirq.c:653 smpboot_thread_fn+0x4c8/0x8b0 kernel/smpboot.c:164 kthread+0x365/0x400 kernel/kthread.c:313 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 Modules linked in: ---[ end trace 2aceb02816d4a928 ]--- RIP: 0010:dst_dev_put+0x26/0x1c0 net/core/dst.c:156 Code: 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 ff 49 bc 00 00 00 00 00 fc ff df e8 51 bd cf fd 4d 89 fd 49 c1 ed 03 <43> 80 7c 25 00 00 74 08 4c 89 ff e8 9a 53 07 fe 4d 8b 37 49 8d 7f RSP: 0018:ffffc90000137b20 EFLAGS: 00010207 RAX: ffffffff83994e4f RBX: 00000000fffffffe RCX: ffff88810028eac0 RDX: 0000000080000100 RSI: 0000000000000000 RDI: 00000000fffffffe RBP: ffffc90000137b48 R08: ffffffff83de386d R09: ffffc900001378c4 R10: 000000000000000b R11: ffffffff8480067b R12: dffffc0000000000 R13: 000000001fffffff R14: 0000607e08c3fb78 R15: 00000000fffffffe FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b31f3594b0 CR3: 000000010940b000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 00 00 add %al,(%rax) 4: 55 push %rbp 5: 48 89 e5 mov %rsp,%rbp 8: 41 57 push %r15 a: 41 56 push %r14 c: 41 55 push %r13 e: 41 54 push %r12 10: 53 push %rbx 11: 49 89 ff mov %rdi,%r15 14: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12 1b: fc ff df 1e: e8 51 bd cf fd callq 0xfdcfbd74 23: 4d 89 fd mov %r15,%r13 26: 49 c1 ed 03 shr $0x3,%r13 * 2a: 43 80 7c 25 00 00 cmpb $0x0,0x0(%r13,%r12,1) <-- trapping instruction 30: 74 08 je 0x3a 32: 4c 89 ff mov %r15,%rdi 35: e8 9a 53 07 fe callq 0xfe0753d4 3a: 4d 8b 37 mov (%r15),%r14 3d: 49 rex.WB 3e: 8d .byte 0x8d 3f: 7f .byte 0x7f