general protection fault, probably for non-canonical address 0xdffffc000000000f: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000078-0x000000000000007f] CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tainted 5.10.118-syzkaller-00001-g08d8dbfab803 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:rt6_get_pcpu_route net/ipv6/route.c:1394 [inline] RIP: 0010:ip6_pol_route+0x5e2/0x13b0 net/ipv6/route.c:2256 Code: e8 33 bd a7 fd 48 8b 03 65 4c 8b 28 31 ff 4c 89 ee e8 22 37 70 fd 4d 85 ed 0f 84 c6 00 00 00 49 8d 5d 78 48 89 d8 48 c1 e8 03 <42> 8a 04 30 84 c0 0f 85 75 0b 00 00 44 8b 33 31 ff 44 89 f6 e8 45 RSP: 0018:ffffc90000127868 EFLAGS: 00010206 RAX: 000000000000000f RBX: 000000000000007b RCX: 0000000080000300 RDX: ffff888100289e80 RSI: 0000000000000003 RDI: 0000000000000000 RBP: ffffc90000127930 R08: ffffffff83f8ddae R09: ffff88810ce9db40 R10: fffff52000024f1b R11: 1ffff92000024f17 R12: 1ffff92000024f16 R13: 0000000000000003 R14: dffffc0000000000 R15: 1ffff92000024f17 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd2a2ca6718 CR3: 000000010cbc8000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ip6_pol_route_input+0x54/0x80 net/ipv6/route.c:2280 pol_lookup_func include/net/ip6_fib.h:584 [inline] fib6_rule_lookup+0xcf/0x5e0 net/ipv6/fib6_rules.c:115 ip6_route_input_lookup net/ipv6/route.c:2292 [inline] ip6_route_input+0x689/0x9e0 net/ipv6/route.c:2461 ip6_rcv_finish_core net/ipv6/ip6_input.c:63 [inline] ip6_rcv_finish net/ipv6/ip6_input.c:74 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ipv6_rcv+0x1ef/0x4a0 net/ipv6/ip6_input.c:297 __netif_receive_skb_one_core net/core/dev.c:5356 [inline] __netif_receive_skb+0x127/0x410 net/core/dev.c:5470 process_backlog+0x372/0x6b0 net/core/dev.c:6376 napi_poll+0x1a3/0x6a0 net/core/dev.c:6827 net_rx_action+0x2ff/0x930 net/core/dev.c:6897 __do_softirq+0x253/0x67b kernel/softirq.c:298 run_ksoftirqd+0x23/0x30 kernel/softirq.c:653 smpboot_thread_fn+0x4c8/0x8b0 kernel/smpboot.c:164 kthread+0x365/0x400 kernel/kthread.c:313 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 Modules linked in: ---[ end trace 897625ee2abfc660 ]--- RIP: 0010:rt6_get_pcpu_route net/ipv6/route.c:1394 [inline] RIP: 0010:ip6_pol_route+0x5e2/0x13b0 net/ipv6/route.c:2256 Code: e8 33 bd a7 fd 48 8b 03 65 4c 8b 28 31 ff 4c 89 ee e8 22 37 70 fd 4d 85 ed 0f 84 c6 00 00 00 49 8d 5d 78 48 89 d8 48 c1 e8 03 <42> 8a 04 30 84 c0 0f 85 75 0b 00 00 44 8b 33 31 ff 44 89 f6 e8 45 RSP: 0018:ffffc90000127868 EFLAGS: 00010206 RAX: 000000000000000f RBX: 000000000000007b RCX: 0000000080000300 RDX: ffff888100289e80 RSI: 0000000000000003 RDI: 0000000000000000 RBP: ffffc90000127930 R08: ffffffff83f8ddae R09: ffff88810ce9db40 R10: fffff52000024f1b R11: 1ffff92000024f17 R12: 1ffff92000024f16 R13: 0000000000000003 R14: dffffc0000000000 R15: 1ffff92000024f17 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd2a2ca6718 CR3: 000000010cbc8000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: e8 33 bd a7 fd callq 0xfda7bd38 5: 48 8b 03 mov (%rbx),%rax 8: 65 4c 8b 28 mov %gs:(%rax),%r13 c: 31 ff xor %edi,%edi e: 4c 89 ee mov %r13,%rsi 11: e8 22 37 70 fd callq 0xfd703738 16: 4d 85 ed test %r13,%r13 19: 0f 84 c6 00 00 00 je 0xe5 1f: 49 8d 5d 78 lea 0x78(%r13),%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 8a 04 30 mov (%rax,%r14,1),%al <-- trapping instruction 2e: 84 c0 test %al,%al 30: 0f 85 75 0b 00 00 jne 0xbab 36: 44 8b 33 mov (%rbx),%r14d 39: 31 ff xor %edi,%edi 3b: 44 89 f6 mov %r14d,%esi 3e: e8 .byte 0xe8 3f: 45 rex.RB