Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] CPU: 1 UID: 0 PID: 1330 Comm: kworker/u8:9 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: krdsd rds_tcp_accept_worker RIP: 0010:rds_tcp_accept_one+0x9aa/0xd90 net/rds/tcp_listen.c:319 Code: fa 48 c1 ea 03 80 3c 02 00 0f 85 b1 03 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 64 24 18 49 8d 7c 24 12 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 76 03 00 00 RSP: 0018:ffffc900055cfb68 EFLAGS: 00010212 RAX: dffffc0000000000 RBX: ffff88803232bc00 RCX: 0000000000000000 RDX: 0000000000000002 RSI: ffffffff8ad9f3fa RDI: 0000000000000012 RBP: ffff88802bfe8780 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000 R13: ffff88805663c000 R14: ffff88805255c000 R15: ffff88805663c020 FS: 0000000000000000(0000) GS:ffff88812444a000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f55f03ac000 CR3: 000000005b82d000 CR4: 0000000000350ef0 Call Trace: rds_tcp_accept_worker+0x41/0x60 net/rds/tcp.c:524 process_one_work+0x9d7/0x1920 kernel/workqueue.c:3275 process_scheduled_works kernel/workqueue.c:3358 [inline] worker_thread+0x5da/0xe40 kernel/workqueue.c:3439 kthread+0x370/0x450 kernel/kthread.c:467 ret_from_fork+0x754/0xd80 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:rds_tcp_accept_one+0x9aa/0xd90 net/rds/tcp_listen.c:319 Code: fa 48 c1 ea 03 80 3c 02 00 0f 85 b1 03 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 64 24 18 49 8d 7c 24 12 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 76 03 00 00 RSP: 0018:ffffc900055cfb68 EFLAGS: 00010212 RAX: dffffc0000000000 RBX: ffff88803232bc00 RCX: 0000000000000000 RDX: 0000000000000002 RSI: ffffffff8ad9f3fa RDI: 0000000000000012 RBP: ffff88802bfe8780 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000 R13: ffff88805663c000 R14: ffff88805255c000 R15: ffff88805663c020 FS: 0000000000000000(0000) GS:ffff88812434a000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005614e7d195f8 CR3: 0000000028c6d000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: fa cli 1: 48 c1 ea 03 shr $0x3,%rdx 5: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 9: 0f 85 b1 03 00 00 jne 0x3c0 f: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 16: fc ff df 19: 4d 8b 64 24 18 mov 0x18(%r12),%r12 1e: 49 8d 7c 24 12 lea 0x12(%r12),%rdi 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 48 89 fa mov %rdi,%rdx 31: 83 e2 07 and $0x7,%edx 34: 38 d0 cmp %dl,%al 36: 7f 08 jg 0x40 38: 84 c0 test %al,%al 3a: 0f 85 76 03 00 00 jne 0x3b6