Oops: general protection fault, probably for non-canonical address 0xdffffc001fffc000: 0000 [#1] SMP KASAN PTI KASAN: probably user-memory-access in range [0x00000000fffe0000-0x00000000fffe0007] CPU: 1 UID: 0 PID: 13645 Comm: kworker/1:40 Not tainted 6.17.0-rc1-syzkaller-00127-g715c7a36d59f #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: mld mld_ifc_work RIP: 0010:add_grec+0x79f/0x1740 net/ipv6/mcast.c:1960 Code: c6 e8 05 51 87 f7 45 85 ff 0f 84 b1 00 00 00 e8 b7 4c 87 f7 eb 05 e8 b0 4c 87 f7 4c 89 e0 48 c1 e8 03 48 89 84 24 a0 00 00 00 <42> 80 3c 30 00 74 08 4c 89 e7 e8 e2 b5 ea f7 4d 8b 3c 24 48 8b 7c RSP: 0018:ffffc9000b50f8f8 EFLAGS: 00010206 RAX: 000000001fffc000 RBX: 0000000000000000 RCX: ffff88802f909e00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffff88802f909e00 R09: 0000000000000002 R10: 0000000000000004 R11: 0000000000000000 R12: 00000000fffe0000 R13: 0000000000000005 R14: dffffc0000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff888125d1c000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8a19128000 CR3: 000000004776c000 CR4: 00000000003526f0 Call Trace: mld_send_cr net/ipv6/mcast.c:2145 [inline] mld_ifc_work+0x676/0xd60 net/ipv6/mcast.c:2698 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3319 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400 kthread+0x70e/0x8a0 kernel/kthread.c:463 ret_from_fork+0x3f9/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:add_grec+0x79f/0x1740 net/ipv6/mcast.c:1960 Code: c6 e8 05 51 87 f7 45 85 ff 0f 84 b1 00 00 00 e8 b7 4c 87 f7 eb 05 e8 b0 4c 87 f7 4c 89 e0 48 c1 e8 03 48 89 84 24 a0 00 00 00 <42> 80 3c 30 00 74 08 4c 89 e7 e8 e2 b5 ea f7 4d 8b 3c 24 48 8b 7c RSP: 0018:ffffc9000b50f8f8 EFLAGS: 00010206 RAX: 000000001fffc000 RBX: 0000000000000000 RCX: ffff88802f909e00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffff88802f909e00 R09: 0000000000000002 R10: 0000000000000004 R11: 0000000000000000 R12: 00000000fffe0000 R13: 0000000000000005 R14: dffffc0000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff888125d1c000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005555633d85c8 CR3: 000000004054e000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: e8 05 51 87 f7 call 0xf787510a 5: 45 85 ff test %r15d,%r15d 8: 0f 84 b1 00 00 00 je 0xbf e: e8 b7 4c 87 f7 call 0xf7874cca 13: eb 05 jmp 0x1a 15: e8 b0 4c 87 f7 call 0xf7874cca 1a: 4c 89 e0 mov %r12,%rax 1d: 48 c1 e8 03 shr $0x3,%rax 21: 48 89 84 24 a0 00 00 mov %rax,0xa0(%rsp) 28: 00 * 29: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) <-- trapping instruction 2e: 74 08 je 0x38 30: 4c 89 e7 mov %r12,%rdi 33: e8 e2 b5 ea f7 call 0xf7eab61a 38: 4d 8b 3c 24 mov (%r12),%r15 3c: 48 rex.W 3d: 8b .byte 0x8b 3e: 7c .byte 0x7c