Oops: general protection fault, probably for non-canonical address 0xdffffc001fffe000: 0000 [#1] SMP KASAN PTI KASAN: probably user-memory-access in range [0x00000000ffff0000-0x00000000ffff0007] CPU: 0 UID: 0 PID: 14263 Comm: kworker/0:18 Not tainted 6.16.0-rc2-syzkaller-00159-ge0fca6f2cebf #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: mld mld_ifc_work RIP: 0010:mld_clear_zeros+0xf2/0x430 net/ipv6/mcast.c:2087 Code: e8 b3 aa 9a f7 85 ed 0f 84 bd 00 00 00 e8 66 a6 9a f7 eb 05 e8 5f a6 9a f7 49 89 dc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 48 89 df e8 5f 24 fe f7 4c 8b 33 4c 8d 6b 2a RSP: 0018:ffffc9000b7179b0 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: 00000000ffff0000 RCX: ffff888025b5bc00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000000000001 R08: 00000000000002ff R09: 160000ff01000000 R10: 00000000000002ff R11: 160000ff01000000 R12: 000000001fffe000 R13: 1ffff11004848706 R14: ffff88803443d538 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888125c51000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffce9e0edd0 CR3: 00000000284a8000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: mld_send_cr net/ipv6/mcast.c:2128 [inline] mld_ifc_work+0x35d/0xde0 net/ipv6/mcast.c:2702 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3f9/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:mld_clear_zeros+0xf2/0x430 net/ipv6/mcast.c:2087 Code: e8 b3 aa 9a f7 85 ed 0f 84 bd 00 00 00 e8 66 a6 9a f7 eb 05 e8 5f a6 9a f7 49 89 dc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 48 89 df e8 5f 24 fe f7 4c 8b 33 4c 8d 6b 2a RSP: 0018:ffffc9000b7179b0 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: 00000000ffff0000 RCX: ffff888025b5bc00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000000000001 R08: 00000000000002ff R09: 160000ff01000000 R10: 00000000000002ff R11: 160000ff01000000 R12: 000000001fffe000 R13: 1ffff11004848706 R14: ffff88803443d538 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888125c51000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fffc9356388 CR3: 000000000df38000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: e8 b3 aa 9a f7 call 0xf79aaab8 5: 85 ed test %ebp,%ebp 7: 0f 84 bd 00 00 00 je 0xca d: e8 66 a6 9a f7 call 0xf79aa678 12: eb 05 jmp 0x19 14: e8 5f a6 9a f7 call 0xf79aa678 19: 49 89 dc mov %rbx,%r12 1c: 49 c1 ec 03 shr $0x3,%r12 20: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 27: fc ff df * 2a: 41 80 3c 04 00 cmpb $0x0,(%r12,%rax,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 df mov %rbx,%rdi 34: e8 5f 24 fe f7 call 0xf7fe2498 39: 4c 8b 33 mov (%rbx),%r14 3c: 4c 8d 6b 2a lea 0x2a(%rbx),%r13