general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 0 PID: 491 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:dst_dev_put+0x26/0x1c0 net/core/dst.c:154
Code: 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 ff 49 bc 00 00 00 00 00 fc ff df e8 41 cd 99 fd 4d 89 fd 49 c1 ed 03 <43> 80 7c 25 00 00 74 08 4c 89 ff e8 aa 8b d8 fd 4d 8b 37 49 8d 7f
RSP: 0018:ffffc90000007b38 EFLAGS: 00010246
RAX: ffffffff83d6aaaf RBX: 0000000000000003 RCX: ffff88810cd14300
RDX: 0000000000000101 RSI: 0000000000000000 RDI: 0000000000000003
RBP: ffffc90000007b60 R08: ffffffff8424068d R09: 000000000000000b
R10: ffffc900000077f0 R11: 1ffff92000000ee0 R12: dffffc0000000000
R13: 0000000000000000 R14: 0000607e08a3f028 R15: 0000000000000003
FS: 00007fe01f7f2700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5f6fd6c058 CR3: 0000000112849000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
rt_fibinfo_free_cpus+0xee/0x1c0 net/ipv4/fib_semantics.c:205
fib_nh_common_release+0x8d/0x240 net/ipv4/fib_semantics.c:216
fib_nh_release net/ipv4/fib_semantics.c:228 [inline]
free_fib_info_rcu+0x98/0x190 net/ipv4/fib_semantics.c:240
rcu_do_batch+0x507/0xbc0 kernel/rcu/tree.c:2535
rcu_core+0x4dc/0xef0 kernel/rcu/tree.c:2786
rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2803
__do_softirq+0x24e/0x586 kernel/softirq.c:558
invoke_softirq+0x70/0xd0 kernel/softirq.c:432
__irq_exit_rcu+0x4f/0xb0 kernel/softirq.c:637
irq_exit_rcu+0x9/0x10 kernel/softirq.c:649
sysvec_apic_timer_interrupt+0x9a/0xc0 arch/x86/kernel/apic/apic.c:1097
asm_sysvec_apic_timer_interrupt+0x12/0x20
RIP: 0010:console_unlock+0xbf9/0x11b0 kernel/printk/printk.c:2779
Code: 00 48 81 e3 00 02 00 00 75 17 e8 02 e9 18 00 45 84 ff 74 1c e9 fe 04 00 00 0f 1f 84 00 00 00 00 00 e8 eb e8 18 00 fb 45 84 ff <0f> 85 e7 04 00 00 48 c7 c7 a0 fb 0d 86 be 04 00 00 00 e8 40 a9 57
RSP: 0018:ffffc90002b77260 EFLAGS: 00000246
RAX: ffffffff81578f05 RBX: 0000000000000200 RCX: ffff88810cd14300
RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000000000000
RBP: ffffc90002b774b0 R08: ffffffff81578ee0 R09: 0000000000000003
R10: fffff5200056ee3d R11: 1ffff9200056ee3c R12: ffffffff863fa0c8
R13: ffffc90002b77420 R14: dffffc0000000000 R15: 0000000000000000
vprintk_emit+0x141/0x440 kernel/printk/printk.c:2272
vprintk_default+0x26/0x30 kernel/printk/printk.c:2283
vprintk+0x86/0x90 kernel/printk/printk_safe.c:50
_printk+0xcf/0x10f kernel/printk/printk.c:2293
fail_dump lib/fault-inject.c:45 [inline]
should_fail+0x398/0x510 lib/fault-inject.c:146
__should_failslab+0x9f/0xe0 mm/failslab.c:33
should_failslab+0x9/0x20 mm/slab_common.c:1313
slab_pre_alloc_hook mm/slab.h:724 [inline]
slab_alloc_node mm/slub.c:3131 [inline]
slab_alloc mm/slub.c:3225 [inline]
kmem_cache_alloc_trace+0x4a/0x320 mm/slub.c:3256
kmalloc include/linux/slab.h:581 [inline]
kzalloc include/linux/slab.h:714 [inline]
percpu_ref_init+0xc9/0x350 lib/percpu-refcount.c:76
css_create kernel/cgroup/cgroup.c:5312 [inline]
cgroup_apply_control_enable+0x383/0x10c0 kernel/cgroup/cgroup.c:3124
cgroup_apply_control+0x93/0x710 kernel/cgroup/cgroup.c:3206
cgroup_subtree_control_write+0xdde/0x1340 kernel/cgroup/cgroup.c:3364
cgroup_file_write+0x28e/0x590 kernel/cgroup/cgroup.c:3882
kernfs_fop_write_iter+0x2cd/0x410 fs/kernfs/file.c:291
call_write_iter include/linux/fs.h:2050 [inline]
new_sync_write fs/read_write.c:504 [inline]
vfs_write+0xbb4/0xf30 fs/read_write.c:591
ksys_write+0x198/0x2c0 fs/read_write.c:644
__do_sys_write fs/read_write.c:656 [inline]
__se_sys_write fs/read_write.c:653 [inline]
__x64_sys_write+0x7b/0x90 fs/read_write.c:653
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x2f/0x50 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fe01e689049
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fe01f7f2168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fe01e79c030 RCX: 00007fe01e689049
RDX: 0000000000000006 RSI: 0000000020000140 RDI: 0000000000000004
RBP: 00007fe01f7f21d0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 00007ffd6905515f R14: 00007fe01f7f2300 R15: 0000000000022000
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:dst_dev_put+0x26/0x1c0 net/core/dst.c:154
Code: 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 ff 49 bc 00 00 00 00 00 fc ff df e8 41 cd 99 fd 4d 89 fd 49 c1 ed 03 <43> 80 7c 25 00 00 74 08 4c 89 ff e8 aa 8b d8 fd 4d 8b 37 49 8d 7f
RSP: 0018:ffffc90000007b38 EFLAGS: 00010246
RAX: ffffffff83d6aaaf RBX: 0000000000000003 RCX: ffff88810cd14300
RDX: 0000000000000101 RSI: 0000000000000000 RDI: 0000000000000003
RBP: ffffc90000007b60 R08: ffffffff8424068d R09: 000000000000000b
R10: ffffc900000077f0 R11: 1ffff92000000ee0 R12: dffffc0000000000
R13: 0000000000000000 R14: 0000607e08a3f028 R15: 0000000000000003
FS: 00007fe01f7f2700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5f6fd6c058 CR3: 0000000112849000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 55 push %rbp
5: 48 89 e5 mov %rsp,%rbp
8: 41 57 push %r15
a: 41 56 push %r14
c: 41 55 push %r13
e: 41 54 push %r12
10: 53 push %rbx
11: 49 89 ff mov %rdi,%r15
14: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12
1b: fc ff df
1e: e8 41 cd 99 fd callq 0xfd99cd64
23: 4d 89 fd mov %r15,%r13
26: 49 c1 ed 03 shr $0x3,%r13
* 2a: 43 80 7c 25 00 00 cmpb $0x0,0x0(%r13,%r12,1) <-- trapping instruction
30: 74 08 je 0x3a
32: 4c 89 ff mov %r15,%rdi
35: e8 aa 8b d8 fd callq 0xfdd88be4
3a: 4d 8b 37 mov (%r15),%r14
3d: 49 rex.WB
3e: 8d .byte 0x8d
3f: 7f .byte 0x7f