BUG: kernel NULL pointer dereference, address: 0000000000000070 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 11226b067 P4D 11226b067 PUD 112178067 PMD 0 Oops: 0000 [#1] PREEMPT SMP CPU: 1 PID: 432 Comm: syz-executor.0 Not tainted 5.18.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 RIP: 0010:skb_segment+0xbd5/0xe40 net/core/skbuff.c:4087 Code: ff ff 48 85 c0 74 59 4c 89 5d 90 4c 89 55 98 41 f6 87 83 00 00 00 10 0f 85 0c f7 ff ff 41 80 a7 80 00 00 00 9f e9 ff f6 ff ff <41> 8b 5a 70 e9 94 f7 ff ff a8 01 75 10 48 c7 c1 80 40 b6 81 48 39 RSP: 0018:ffffc90000dab9b8 EFLAGS: 00010246 RAX: 0000000000010046 RBX: 0000000000000046 RCX: 000000000000ffff RDX: ffffffff00000000 RSI: 000000000000003e RDI: 000000000000003e RBP: ffffc90000dabab8 R08: 0000000000000011 R09: ffff8881148eee00 R10: 0000000000000000 R11: ffff88810c4fe000 R12: ffff8881119faaf0 R13: 0000000000000000 R14: ffff88810c4fe000 R15: 0000000000000000 FS: 00007f341dc926c0(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000070 CR3: 0000000112279000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: udp6_ufo_fragment+0x23c/0x2b0 net/ipv6/udp_offload.c:108 ipv6_gso_segment+0x158/0x320 net/ipv6/ip6_offload.c:116 skb_mac_gso_segment+0x9a/0x110 net/core/gro.c:141 __skb_gso_segment+0xd8/0x130 net/core/dev.c:3359 skb_gso_segment include/linux/netdevice.h:4690 [inline] validate_xmit_skb+0xc4/0x390 net/core/dev.c:3618 __dev_queue_xmit+0x580/0xd40 net/core/dev.c:4199 dev_queue_xmit+0xb/0x10 net/core/dev.c:4241 packet_snd net/packet/af_packet.c:3071 [inline] packet_sendmsg+0x11e0/0x1620 net/packet/af_packet.c:3102 sock_sendmsg_nosec net/socket.c:705 [inline] sock_sendmsg net/socket.c:725 [inline] __sys_sendto+0x2ce/0x340 net/socket.c:2040 __do_sys_sendto net/socket.c:2052 [inline] __se_sys_sendto net/socket.c:2048 [inline] __x64_sys_sendto+0x21/0x30 net/socket.c:2048 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f341ce7cba9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f341dc920c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f341cf9bf80 RCX: 00007f341ce7cba9 RDX: 0000000000010048 RSI: 00000000200000c0 RDI: 0000000000000003 RBP: 00007f341cec847a R08: 0000000020000540 R09: 0000000000000014 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f341cf9bf80 R15: 00007ffcb5129ba8 Modules linked in: CR2: 0000000000000070 ---[ end trace 0000000000000000 ]--- RIP: 0010:skb_segment+0xbd5/0xe40 net/core/skbuff.c:4087 Code: ff ff 48 85 c0 74 59 4c 89 5d 90 4c 89 55 98 41 f6 87 83 00 00 00 10 0f 85 0c f7 ff ff 41 80 a7 80 00 00 00 9f e9 ff f6 ff ff <41> 8b 5a 70 e9 94 f7 ff ff a8 01 75 10 48 c7 c1 80 40 b6 81 48 39 RSP: 0018:ffffc90000dab9b8 EFLAGS: 00010246 RAX: 0000000000010046 RBX: 0000000000000046 RCX: 000000000000ffff RDX: ffffffff00000000 RSI: 000000000000003e RDI: 000000000000003e RBP: ffffc90000dabab8 R08: 0000000000000011 R09: ffff8881148eee00 R10: 0000000000000000 R11: ffff88810c4fe000 R12: ffff8881119faaf0 R13: 0000000000000000 R14: ffff88810c4fe000 R15: 0000000000000000 FS: 00007f341dc926c0(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000070 CR3: 0000000112279000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: ff 48 85 decl -0x7b(%rax) 3: c0 74 59 4c 89 shlb $0x89,0x4c(%rcx,%rbx,2) 8: 5d pop %rbp 9: 90 nop a: 4c 89 55 98 mov %r10,-0x68(%rbp) e: 41 f6 87 83 00 00 00 testb $0x10,0x83(%r15) 15: 10 16: 0f 85 0c f7 ff ff jne 0xfffff728 1c: 41 80 a7 80 00 00 00 andb $0x9f,0x80(%r15) 23: 9f 24: e9 ff f6 ff ff jmp 0xfffff728 * 29: 41 8b 5a 70 mov 0x70(%r10),%ebx <-- trapping instruction 2d: e9 94 f7 ff ff jmp 0xfffff7c6 32: a8 01 test $0x1,%al 34: 75 10 jne 0x46 36: 48 c7 c1 80 40 b6 81 mov $0xffffffff81b64080,%rcx 3d: 48 rex.W 3e: 39 .byte 0x39