Oops: general protection fault, probably for non-canonical address 0xdffffc001fffe001: 0000 [#1] SMP KASAN PTI
KASAN: probably user-memory-access in range [0x00000000ffff0008-0x00000000ffff000f]
CPU: 1 UID: 0 PID: 10738 Comm: kworker/u8:32 Not tainted 6.16.0-rc7-syzkaller-02024-gfa582ca7e187 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
Workqueue: netns cleanup_net
RIP: 0010:vti6_exit_rtnl_net+0x100/0x2d0 net/ipv6/ip6_vti.c:1124
Code: 4c 89 ff e8 a2 d4 e7 f7 4d 8b 3f 4d 85 ff 75 0f e8 f5 c4 85 f7 e9 cc 00 00 00 e8 eb c4 85 f7 4d 8d 67 08 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 71 d4 e7 f7 49 8b 3c 24 48 89 de
RSP: 0018:ffffc90003b8f898 EFLAGS: 00010202
RAX: 000000001fffe001 RBX: ffffc90003b8f940 RCX: ffff8880245c3c00
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff8a3a145e
R10: dffffc0000000000 R11: ffffffff8a3a6250 R12: 00000000ffff0008
R13: dffffc0000000000 R14: 0000000000000004 R15: 00000000ffff0000
FS: 0000000000000000(0000) GS:ffff888125d23000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000110c2f03ec CR3: 0000000034558000 CR4: 00000000003526f0
Call Trace:
<TASK>
ops_exit_rtnl_list net/core/net_namespace.c:180 [inline]
ops_undo_list+0x34d/0x990 net/core/net_namespace.c:247
cleanup_net+0x4c5/0x800 net/core/net_namespace.c:682
process_one_work kernel/workqueue.c:3238 [inline]
process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
kthread+0x70e/0x8a0 kernel/kthread.c:464
ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:vti6_exit_rtnl_net+0x100/0x2d0 net/ipv6/ip6_vti.c:1124
Code: 4c 89 ff e8 a2 d4 e7 f7 4d 8b 3f 4d 85 ff 75 0f e8 f5 c4 85 f7 e9 cc 00 00 00 e8 eb c4 85 f7 4d 8d 67 08 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 71 d4 e7 f7 49 8b 3c 24 48 89 de
RSP: 0018:ffffc90003b8f898 EFLAGS: 00010202
RAX: 000000001fffe001 RBX: ffffc90003b8f940 RCX: ffff8880245c3c00
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff8a3a145e
R10: dffffc0000000000 R11: ffffffff8a3a6250 R12: 00000000ffff0008
R13: dffffc0000000000 R14: 0000000000000004 R15: 00000000ffff0000
FS: 0000000000000000(0000) GS:ffff888125d23000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffc0381eba8 CR3: 00000000773e2000 CR4: 00000000003526f0
----------------
Code disassembly (best guess):
0: 4c 89 ff mov %r15,%rdi
3: e8 a2 d4 e7 f7 call 0xf7e7d4aa
8: 4d 8b 3f mov (%r15),%r15
b: 4d 85 ff test %r15,%r15
e: 75 0f jne 0x1f
10: e8 f5 c4 85 f7 call 0xf785c50a
15: e9 cc 00 00 00 jmp 0xe6
1a: e8 eb c4 85 f7 call 0xf785c50a
1f: 4d 8d 67 08 lea 0x8(%r15),%r12
23: 4c 89 e0 mov %r12,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 4c 89 e7 mov %r12,%rdi
34: e8 71 d4 e7 f7 call 0xf7e7d4aa
39: 49 8b 3c 24 mov (%r12),%rdi
3d: 48 89 de mov %rbx,%rsi