general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 0 PID: 491 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:dst_dev_put+0x26/0x1c0 net/core/dst.c:154 Code: 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 ff 49 bc 00 00 00 00 00 fc ff df e8 41 cd 99 fd 4d 89 fd 49 c1 ed 03 <43> 80 7c 25 00 00 74 08 4c 89 ff e8 aa 8b d8 fd 4d 8b 37 49 8d 7f RSP: 0018:ffffc90000007b38 EFLAGS: 00010246 RAX: ffffffff83d6aaaf RBX: 0000000000000003 RCX: ffff88810cd14300 RDX: 0000000000000101 RSI: 0000000000000000 RDI: 0000000000000003 RBP: ffffc90000007b60 R08: ffffffff8424068d R09: 000000000000000b R10: ffffc900000077f0 R11: 1ffff92000000ee0 R12: dffffc0000000000 R13: 0000000000000000 R14: 0000607e08a3f028 R15: 0000000000000003 FS: 00007fe01f7f2700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f5f6fd6c058 CR3: 0000000112849000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rt_fibinfo_free_cpus+0xee/0x1c0 net/ipv4/fib_semantics.c:205 fib_nh_common_release+0x8d/0x240 net/ipv4/fib_semantics.c:216 fib_nh_release net/ipv4/fib_semantics.c:228 [inline] free_fib_info_rcu+0x98/0x190 net/ipv4/fib_semantics.c:240 rcu_do_batch+0x507/0xbc0 kernel/rcu/tree.c:2535 rcu_core+0x4dc/0xef0 kernel/rcu/tree.c:2786 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2803 __do_softirq+0x24e/0x586 kernel/softirq.c:558 invoke_softirq+0x70/0xd0 kernel/softirq.c:432 __irq_exit_rcu+0x4f/0xb0 kernel/softirq.c:637 irq_exit_rcu+0x9/0x10 kernel/softirq.c:649 sysvec_apic_timer_interrupt+0x9a/0xc0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 RIP: 0010:console_unlock+0xbf9/0x11b0 kernel/printk/printk.c:2779 Code: 00 48 81 e3 00 02 00 00 75 17 e8 02 e9 18 00 45 84 ff 74 1c e9 fe 04 00 00 0f 1f 84 00 00 00 00 00 e8 eb e8 18 00 fb 45 84 ff <0f> 85 e7 04 00 00 48 c7 c7 a0 fb 0d 86 be 04 00 00 00 e8 40 a9 57 RSP: 0018:ffffc90002b77260 EFLAGS: 00000246 RAX: ffffffff81578f05 RBX: 0000000000000200 RCX: ffff88810cd14300 RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000000000000 RBP: ffffc90002b774b0 R08: ffffffff81578ee0 R09: 0000000000000003 R10: fffff5200056ee3d R11: 1ffff9200056ee3c R12: ffffffff863fa0c8 R13: ffffc90002b77420 R14: dffffc0000000000 R15: 0000000000000000 vprintk_emit+0x141/0x440 kernel/printk/printk.c:2272 vprintk_default+0x26/0x30 kernel/printk/printk.c:2283 vprintk+0x86/0x90 kernel/printk/printk_safe.c:50 _printk+0xcf/0x10f kernel/printk/printk.c:2293 fail_dump lib/fault-inject.c:45 [inline] should_fail+0x398/0x510 lib/fault-inject.c:146 __should_failslab+0x9f/0xe0 mm/failslab.c:33 should_failslab+0x9/0x20 mm/slab_common.c:1313 slab_pre_alloc_hook mm/slab.h:724 [inline] slab_alloc_node mm/slub.c:3131 [inline] slab_alloc mm/slub.c:3225 [inline] kmem_cache_alloc_trace+0x4a/0x320 mm/slub.c:3256 kmalloc include/linux/slab.h:581 [inline] kzalloc include/linux/slab.h:714 [inline] percpu_ref_init+0xc9/0x350 lib/percpu-refcount.c:76 css_create kernel/cgroup/cgroup.c:5312 [inline] cgroup_apply_control_enable+0x383/0x10c0 kernel/cgroup/cgroup.c:3124 cgroup_apply_control+0x93/0x710 kernel/cgroup/cgroup.c:3206 cgroup_subtree_control_write+0xdde/0x1340 kernel/cgroup/cgroup.c:3364 cgroup_file_write+0x28e/0x590 kernel/cgroup/cgroup.c:3882 kernfs_fop_write_iter+0x2cd/0x410 fs/kernfs/file.c:291 call_write_iter include/linux/fs.h:2050 [inline] new_sync_write fs/read_write.c:504 [inline] vfs_write+0xbb4/0xf30 fs/read_write.c:591 ksys_write+0x198/0x2c0 fs/read_write.c:644 __do_sys_write fs/read_write.c:656 [inline] __se_sys_write fs/read_write.c:653 [inline] __x64_sys_write+0x7b/0x90 fs/read_write.c:653 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2f/0x50 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fe01e689049 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe01f7f2168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007fe01e79c030 RCX: 00007fe01e689049 RDX: 0000000000000006 RSI: 0000000020000140 RDI: 0000000000000004 RBP: 00007fe01f7f21d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd6905515f R14: 00007fe01f7f2300 R15: 0000000000022000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:dst_dev_put+0x26/0x1c0 net/core/dst.c:154 Code: 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 ff 49 bc 00 00 00 00 00 fc ff df e8 41 cd 99 fd 4d 89 fd 49 c1 ed 03 <43> 80 7c 25 00 00 74 08 4c 89 ff e8 aa 8b d8 fd 4d 8b 37 49 8d 7f RSP: 0018:ffffc90000007b38 EFLAGS: 00010246 RAX: ffffffff83d6aaaf RBX: 0000000000000003 RCX: ffff88810cd14300 RDX: 0000000000000101 RSI: 0000000000000000 RDI: 0000000000000003 RBP: ffffc90000007b60 R08: ffffffff8424068d R09: 000000000000000b R10: ffffc900000077f0 R11: 1ffff92000000ee0 R12: dffffc0000000000 R13: 0000000000000000 R14: 0000607e08a3f028 R15: 0000000000000003 FS: 00007fe01f7f2700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f5f6fd6c058 CR3: 0000000112849000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 00 00 add %al,(%rax) 4: 55 push %rbp 5: 48 89 e5 mov %rsp,%rbp 8: 41 57 push %r15 a: 41 56 push %r14 c: 41 55 push %r13 e: 41 54 push %r12 10: 53 push %rbx 11: 49 89 ff mov %rdi,%r15 14: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12 1b: fc ff df 1e: e8 41 cd 99 fd callq 0xfd99cd64 23: 4d 89 fd mov %r15,%r13 26: 49 c1 ed 03 shr $0x3,%r13 * 2a: 43 80 7c 25 00 00 cmpb $0x0,0x0(%r13,%r12,1) <-- trapping instruction 30: 74 08 je 0x3a 32: 4c 89 ff mov %r15,%rdi 35: e8 aa 8b d8 fd callq 0xfdd88be4 3a: 4d 8b 37 mov (%r15),%r14 3d: 49 rex.WB 3e: 8d .byte 0x8d 3f: 7f .byte 0x7f