general protection fault, probably for non-canonical address 0xe01ffbf110173887: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0x00ffff8880b9c438-0x00ffff8880b9c43f] CPU: 0 PID: 16882 Comm: kworker/u4:8 Not tainted 5.13.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: netns cleanup_net RIP: 0010:__lock_acquire+0xd7d/0x54a0 kernel/locking/lockdep.c:4885 Code: e5 0d 41 be 01 00 00 00 0f 86 c8 00 00 00 89 05 e9 59 e5 0d e9 bd 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 f3 2f 00 00 48 81 3b c0 53 eb 8e 0f 84 52 f3 ff RSP: 0018:ffffc9000204f730 EFLAGS: 00010006 RAX: dffffc0000000000 RBX: 00ffff8880b9c43b RCX: 0000000000000000 RDX: 001ffff110173887 RSI: 0000000000000000 RDI: 0000000000000001 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffff88802e1bd4c0 R14: 0000000000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000002a5f848 CR3: 0000000033eba000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire kernel/locking/lockdep.c:5625 [inline] lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5590 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:159 lock_hrtimer_base kernel/time/hrtimer.c:173 [inline] hrtimer_try_to_cancel kernel/time/hrtimer.c:1183 [inline] hrtimer_try_to_cancel+0xa5/0x1e0 kernel/time/hrtimer.c:1168 hrtimer_cancel+0x13/0x40 kernel/time/hrtimer.c:1295 napi_disable+0xc3/0x110 net/core/dev.c:6946 gro_cells_destroy net/core/gro_cells.c:101 [inline] gro_cells_destroy+0x10d/0x360 net/core/gro_cells.c:92 ip_tunnel_dev_free+0x15/0x60 net/ipv4/ip_tunnel.c:1000 netdev_run_todo+0x6b4/0xa80 net/core/dev.c:10609 ip_tunnel_delete_nets+0x3f0/0x5b0 net/ipv4/ip_tunnel.c:1114 ops_exit_list+0x10d/0x160 net/core/net_namespace.c:178 cleanup_net+0x4ea/0xb10 net/core/net_namespace.c:595 process_one_work+0x98d/0x1630 kernel/workqueue.c:2276 worker_thread+0x658/0x11f0 kernel/workqueue.c:2422 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Modules linked in: ---[ end trace aaad51e9f141dce4 ]--- RIP: 0010:__lock_acquire+0xd7d/0x54a0 kernel/locking/lockdep.c:4885 Code: e5 0d 41 be 01 00 00 00 0f 86 c8 00 00 00 89 05 e9 59 e5 0d e9 bd 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 f3 2f 00 00 48 81 3b c0 53 eb 8e 0f 84 52 f3 ff RSP: 0018:ffffc9000204f730 EFLAGS: 00010006 RAX: dffffc0000000000 RBX: 00ffff8880b9c43b RCX: 0000000000000000 RDX: 001ffff110173887 RSI: 0000000000000000 RDI: 0000000000000001 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffff88802e1bd4c0 R14: 0000000000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000002a5f848 CR3: 0000000033eba000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400