general protection fault, probably for non-canonical address 0xdffffc0010000051: 0000 [#1] PREEMPT SMP KASAN KASAN: probably user-memory-access in range [0x0000000080000288-0x000000008000028f] CPU: 0 PID: 9 Comm: kworker/u4:1 Not tainted 5.10.109-syzkaller-00693-g414e6c8e941c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: netns cleanup_net RIP: 0010:inet_ctl_sock_destroy include/net/inet_common.h:63 [inline] RIP: 0010:tcp_sk_exit+0x188/0x280 net/ipv4/tcp_ipv4.c:2830 Code: 80 3c 28 00 74 08 4c 89 e7 e8 b4 c4 a2 fd 49 8b 1c 24 48 85 db 74 3b e8 c6 fe 68 fd 48 81 c3 88 02 00 00 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 89 c4 a2 fd 48 8b 3b e8 e1 84 b5 RSP: 0018:ffffc90000097bf8 EFLAGS: 00010202 RAX: 0000000010000051 RBX: 000000008000028b RCX: ffff8881002393c0 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 RBP: ffffc90000097c30 R08: ffffffff8403b5e3 R09: 0000000000000003 R10: fffff52000012f71 R11: 1ffff92000012f70 R12: ffffe8ffffc3d160 R13: dffffc0000000000 R14: ffff88810ea2e3c8 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555555a1ab38 CR3: 0000000143484000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ops_exit_list net/core/net_namespace.c:187 [inline] cleanup_net+0x6e4/0xd70 net/core/net_namespace.c:608 process_one_work+0x726/0xc10 kernel/workqueue.c:2296 worker_thread+0xb27/0x1550 kernel/workqueue.c:2442 kthread+0x349/0x3d0 kernel/kthread.c:313 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 Modules linked in: ---[ end trace a9fb546da2d2c77f ]--- RIP: 0010:inet_ctl_sock_destroy include/net/inet_common.h:63 [inline] RIP: 0010:tcp_sk_exit+0x188/0x280 net/ipv4/tcp_ipv4.c:2830 Code: 80 3c 28 00 74 08 4c 89 e7 e8 b4 c4 a2 fd 49 8b 1c 24 48 85 db 74 3b e8 c6 fe 68 fd 48 81 c3 88 02 00 00 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 89 c4 a2 fd 48 8b 3b e8 e1 84 b5 RSP: 0018:ffffc90000097bf8 EFLAGS: 00010202 RAX: 0000000010000051 RBX: 000000008000028b RCX: ffff8881002393c0 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 RBP: ffffc90000097c30 R08: ffffffff8403b5e3 R09: 0000000000000003 R10: fffff52000012f71 R11: 1ffff92000012f70 R12: ffffe8ffffc3d160 R13: dffffc0000000000 R14: ffff88810ea2e3c8 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f660b4b25a8 CR3: 000000010c53c000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1) 4: 74 08 je 0xe 6: 4c 89 e7 mov %r12,%rdi 9: e8 b4 c4 a2 fd callq 0xfda2c4c2 e: 49 8b 1c 24 mov (%r12),%rbx 12: 48 85 db test %rbx,%rbx 15: 74 3b je 0x52 17: e8 c6 fe 68 fd callq 0xfd68fee2 1c: 48 81 c3 88 02 00 00 add $0x288,%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 df mov %rbx,%rdi 34: e8 89 c4 a2 fd callq 0xfda2c4c2 39: 48 8b 3b mov (%rbx),%rdi 3c: e8 .byte 0xe8 3d: e1 84 loope 0xffffffc3 3f: b5 .byte 0xb5