Oops: general protection fault, probably for non-canonical address 0xdffffc001fffe000: 0000 [#1] SMP KASAN NOPTI KASAN: probably user-memory-access in range [0x00000000ffff0000-0x00000000ffff0007] CPU: 1 UID: 0 PID: 11123 Comm: kworker/u8:30 Not tainted 6.16.0-rc7-syzkaller-00018-g01a412d06bc5 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: netns cleanup_net RIP: 0010:ip6_mc_clear_src+0x89/0x5a0 net/ipv6/mcast.c:2599 Code: 49 bc 00 00 00 00 00 fc ff df 48 8d 45 10 49 89 c5 48 89 04 24 49 c1 ed 03 4d 01 e5 eb 32 e8 0e 4f 7f f7 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 80 04 00 00 4c 8b 3b 48 8d 7b 30 48 89 de e8 RSP: 0018:ffffc90003527638 EFLAGS: 00010206 RAX: 000000001fffe000 RBX: 00000000ffff0000 RCX: ffffffff8a3c99db RDX: ffff888028484880 RSI: ffffffff8a3c9962 RDI: 0000000000000005 RBP: ffff888058759c00 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: dffffc0000000000 R13: ffffed100b0eb382 R14: ffff888058759c28 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff888124820000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000025f7e000 CR4: 00000000003526f0 Call Trace: mld_clear_delrec+0xfb/0x640 net/ipv6/mcast.c:826 ipv6_mc_destroy_dev+0x49/0x690 net/ipv6/mcast.c:2842 addrconf_ifdown.isra.0+0x13ef/0x1a90 net/ipv6/addrconf.c:3995 addrconf_notify+0x220/0x19e0 net/ipv6/addrconf.c:3775 notifier_call_chain+0xbc/0x410 kernel/notifier.c:85 call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:2230 call_netdevice_notifiers_extack net/core/dev.c:2268 [inline] call_netdevice_notifiers net/core/dev.c:2282 [inline] unregister_netdevice_many_notify+0xf9d/0x2700 net/core/dev.c:12077 ops_exit_rtnl_list net/core/net_namespace.c:188 [inline] ops_undo_list+0x8fc/0xab0 net/core/net_namespace.c:249 cleanup_net+0x408/0x890 net/core/net_namespace.c:686 process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3321 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3402 kthread+0x3c5/0x780 kernel/kthread.c:464 ret_from_fork+0x5d4/0x6f0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:ip6_mc_clear_src+0x89/0x5a0 net/ipv6/mcast.c:2599 Code: 49 bc 00 00 00 00 00 fc ff df 48 8d 45 10 49 89 c5 48 89 04 24 49 c1 ed 03 4d 01 e5 eb 32 e8 0e 4f 7f f7 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 80 04 00 00 4c 8b 3b 48 8d 7b 30 48 89 de e8 RSP: 0018:ffffc90003527638 EFLAGS: 00010206 RAX: 000000001fffe000 RBX: 00000000ffff0000 RCX: ffffffff8a3c99db RDX: ffff888028484880 RSI: ffffffff8a3c9962 RDI: 0000000000000005 RBP: ffff888058759c00 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: dffffc0000000000 R13: ffffed100b0eb382 R14: ffff888058759c28 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff888124720000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00002000003db000 CR3: 000000003b27e000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12 7: fc ff df a: 48 8d 45 10 lea 0x10(%rbp),%rax e: 49 89 c5 mov %rax,%r13 11: 48 89 04 24 mov %rax,(%rsp) 15: 49 c1 ed 03 shr $0x3,%r13 19: 4d 01 e5 add %r12,%r13 1c: eb 32 jmp 0x50 1e: e8 0e 4f 7f f7 call 0xf77f4f31 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction 2f: 0f 85 80 04 00 00 jne 0x4b5 35: 4c 8b 3b mov (%rbx),%r15 38: 48 8d 7b 30 lea 0x30(%rbx),%rdi 3c: 48 89 de mov %rbx,%rsi 3f: e8 .byte 0xe8