general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 29880 Comm: syz-executor.1 Not tainted 6.7.0-rc2-syzkaller-00557-g6afb936f73cf #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 RIP: 0010:__hlist_del include/linux/list.h:988 [inline] RIP: 0010:hlist_del include/linux/list.h:1002 [inline] RIP: 0010:page_pool_unlist+0xd1/0x170 net/core/page_pool_user.c:342 Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 90 00 00 00 4c 8b a3 f0 06 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 75 68 48 85 ed 49 89 2c 24 74 24 e8 1b c7 07 f9 48 8d RSP: 0018:ffffc9001c4677b0 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff8880789c7000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff8880789c76f0 RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff1d57fd4 R10: ffffffff8eabfea3 R11: ffffffff8aa0008b R12: 0000000000000000 R13: ffff8880789c7000 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f44e9b81d58 CR3: 00000000456ab000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __page_pool_destroy net/core/page_pool.c:851 [inline] page_pool_release+0x507/0x6b0 net/core/page_pool.c:891 page_pool_destroy+0x1ac/0x4c0 net/core/page_pool.c:956 veth_napi_del_range+0x4f1/0x640 drivers/net/veth.c:1121 veth_napi_del drivers/net/veth.c:1128 [inline] veth_disable_xdp+0x2ae/0x430 drivers/net/veth.c:1238 veth_xdp_set drivers/net/veth.c:1669 [inline] veth_xdp+0x7f8/0x8e0 drivers/net/veth.c:1693 dev_xdp_install+0x217/0x2d0 net/core/dev.c:9200 dev_xdp_detach_link net/core/dev.c:9388 [inline] bpf_xdp_link_release+0x24f/0x540 net/core/dev.c:9403 bpf_link_free+0xe4/0x1b0 kernel/bpf/syscall.c:2852 bpf_link_put_direct kernel/bpf/syscall.c:2883 [inline] bpf_link_release+0x63/0x80 kernel/bpf/syscall.c:2890 __fput+0x270/0xbb0 fs/file_table.c:394 task_work_run+0x14d/0x240 kernel/task_work.c:180 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0xa92/0x2ae0 kernel/exit.c:871 do_group_exit+0xd4/0x2a0 kernel/exit.c:1021 get_signal+0x23be/0x2790 kernel/signal.c:2904 arch_do_signal_or_restart+0x90/0x7f0 arch/x86/kernel/signal.c:309 exit_to_user_mode_loop kernel/entry/common.c:168 [inline] exit_to_user_mode_prepare+0x121/0x240 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] syscall_exit_to_user_mode+0x1e/0x60 kernel/entry/common.c:296 do_syscall_64+0x4d/0x110 arch/x86/entry/common.c:88 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7f7eaac7cae9 Code: Unable to access opcode bytes at 0x7f7eaac7cabf. RSP: 002b:00007f7eaba880c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: 0000000000000003 RBX: 00007f7eaad9bf80 RCX: 00007f7eaac7cae9 RDX: 0000000000000040 RSI: 0000000020000240 RDI: 000000000000001c RBP: 00007f7eaacc847a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f7eaad9bf80 R15: 00007ffdfdb8b2c8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__hlist_del include/linux/list.h:988 [inline] RIP: 0010:hlist_del include/linux/list.h:1002 [inline] RIP: 0010:page_pool_unlist+0xd1/0x170 net/core/page_pool_user.c:342 Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 90 00 00 00 4c 8b a3 f0 06 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 75 68 48 85 ed 49 89 2c 24 74 24 e8 1b c7 07 f9 48 8d RSP: 0018:ffffc9001c4677b0 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff8880789c7000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff8880789c76f0 RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff1d57fd4 R10: ffffffff8eabfea3 R11: ffffffff8aa0008b R12: 0000000000000000 R13: ffff8880789c7000 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc86b978038 CR3: 00000000456ab000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: df 48 89 fisttps -0x77(%rax) 3: fa cli 4: 48 c1 ea 03 shr $0x3,%rdx 8: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) c: 0f 85 90 00 00 00 jne 0xa2 12: 4c 8b a3 f0 06 00 00 mov 0x6f0(%rbx),%r12 19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 20: fc ff df 23: 4c 89 e2 mov %r12,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 75 68 jne 0x98 30: 48 85 ed test %rbp,%rbp 33: 49 89 2c 24 mov %rbp,(%r12) 37: 74 24 je 0x5d 39: e8 1b c7 07 f9 call 0xf907c759 3e: 48 rex.W 3f: 8d .byte 0x8d