Oops: general protection fault, probably for non-canonical address 0xdffffc0000000030: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000180-0x0000000000000187] CPU: 0 PID: 5182 Comm: kworker/0:8 Not tainted 6.10.0-rc1-syzkaller-00027-g4a4be1ad3a6e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Workqueue: rcu_gp srcu_invoke_callbacks RIP: 0010:rcu_seq_current kernel/rcu/rcu.h:138 [inline] RIP: 0010:srcu_invoke_callbacks+0x148/0x490 kernel/rcu/srcutree.c:1733 Code: 48 8b 5c 24 20 74 08 4c 89 f7 e8 63 b0 7f 00 48 8d 83 20 ff ff ff 48 89 44 24 30 bb 80 01 00 00 49 03 1e 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 39 b0 7f 00 48 8b 33 4c 8b 74 24 RSP: 0018:ffffc90003dbfaa0 EFLAGS: 00010016 RAX: 0000000000000030 RBX: 0000000000000180 RCX: 0000000000000001 RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffffe8ffffc85318 RBP: ffffc90003dbfbb0 R08: 0000000000000003 R09: fffff520007b7f30 R10: dffffc0000000000 R11: fffff520007b7f30 R12: 1ffff920007b7f60 R13: dffffc0000000000 R14: ffff8880503842f8 R15: ffffe8ffffc85300 FS: 0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000140 CR3: 0000000059786000 CR4: 0000000000350ef0 Call Trace: process_one_work kernel/workqueue.c:3231 [inline] process_scheduled_works+0xa2e/0x1830 kernel/workqueue.c:3312 worker_thread+0x86d/0xd70 kernel/workqueue.c:3393 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:rcu_seq_current kernel/rcu/rcu.h:138 [inline] RIP: 0010:srcu_invoke_callbacks+0x148/0x490 kernel/rcu/srcutree.c:1733 Code: 48 8b 5c 24 20 74 08 4c 89 f7 e8 63 b0 7f 00 48 8d 83 20 ff ff ff 48 89 44 24 30 bb 80 01 00 00 49 03 1e 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 39 b0 7f 00 48 8b 33 4c 8b 74 24 RSP: 0018:ffffc90003dbfaa0 EFLAGS: 00010016 RAX: 0000000000000030 RBX: 0000000000000180 RCX: 0000000000000001 RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffffe8ffffc85318 RBP: ffffc90003dbfbb0 R08: 0000000000000003 R09: fffff520007b7f30 R10: dffffc0000000000 R11: fffff520007b7f30 R12: 1ffff920007b7f60 R13: dffffc0000000000 R14: ffff8880503842f8 R15: ffffe8ffffc85300 FS: 0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000140 CR3: 0000000059786000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: 48 8b 5c 24 20 mov 0x20(%rsp),%rbx 5: 74 08 je 0xf 7: 4c 89 f7 mov %r14,%rdi a: e8 63 b0 7f 00 call 0x7fb072 f: 48 8d 83 20 ff ff ff lea -0xe0(%rbx),%rax 16: 48 89 44 24 30 mov %rax,0x30(%rsp) 1b: bb 80 01 00 00 mov $0x180,%ebx 20: 49 03 1e add (%r14),%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 df mov %rbx,%rdi 34: e8 39 b0 7f 00 call 0x7fb072 39: 48 8b 33 mov (%rbx),%rsi 3c: 4c rex.WR 3d: 8b .byte 0x8b 3e: 74 24 je 0x64