Oops: general protection fault, probably for non-canonical address 0xdffffc0000000008: 0000 [#1] SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000040-0x0000000000000047]
CPU: 0 UID: 0 PID: 10102 Comm: syz-executor Not tainted 6.16.0-rc4-next-20250630-syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:__cpa_addr arch/x86/mm/pat/set_memory.c:320 [inline]
RIP: 0010:__cpa_flush_tlb+0x123/0x270 arch/x86/mm/pat/set_memory.c:408
Code: 8b 44 24 30 80 3c 18 00 74 08 4c 89 e7 e8 d5 c1 ae 00 4d 8b 24 24 85 ed 0f 85 ad 00 00 00 e8 c4 ad 4a 00 4c 89 e0 48 c1 e8 03 <80> 3c 18 00 4c 89 f5 74 08 4c 89 e7 e8 ac c1 ae 00 49 c1 e5 0c 4d
RSP: 0018:ffffc90000007ef0 EFLAGS: 00010003
RAX: 0000000000000008 RBX: dffffc0000000000 RCX: ffff8880591e0000
RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff8fa17437 R09: 1ffffffff1f42e86
R10: dffffc0000000000 R11: ffffffff81751cb0 R12: 0000000000000046
R13: 0000000000000000 R14: ffffc90005067480 R15: 0000000000000001
FS: 0000555574063500(0000) GS:ffff888125c1d000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe4b33bd000 CR3: 0000000033424000 CR4: 00000000003526f0
Call Trace:
csd_do_func kernel/smp.c:134 [inline]
__flush_smp_call_function_queue+0x370/0xaa0 kernel/smp.c:540
__sysvec_call_function_single+0xa8/0x3d0 arch/x86/kernel/smp.c:271
instr_sysvec_call_function_single arch/x86/kernel/smp.c:266 [inline]
sysvec_call_function_single+0x9e/0xc0 arch/x86/kernel/smp.c:266
asm_sysvec_call_function_single+0x1a/0x20 arch/x86/include/asm/idtentry.h:709
RIP: 0010:console_flush_all+0x7f7/0xc40 kernel/printk/printk.c:3227
Code: 48 21 c3 0f 85 e9 01 00 00 e8 65 2d 1f 00 48 8b 5c 24 20 4d 85 f6 75 07 e8 56 2d 1f 00 eb 06 e8 4f 2d 1f 00 fb 48 8b 44 24 28 <42> 80 3c 20 00 74 08 48 89 df e8 3a 41 83 00 48 8b 1b 48 8b 44 24
RSP: 0018:ffffc9000b476740 EFLAGS: 00000293
RAX: 1ffffffff1d36a63 RBX: ffffffff8e9b5318 RCX: ffff8880591e0000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000b476890 R08: ffffffff8fa17437 R09: 1ffffffff1f42e86
R10: dffffc0000000000 R11: fffffbfff1f42e87 R12: dffffc0000000000
R13: 0000000000000001 R14: 0000000000000200 R15: ffffffff8e9b52c0
__console_flush_and_unlock kernel/printk/printk.c:3285 [inline]
console_unlock+0xc4/0x270 kernel/printk/printk.c:3325
vprintk_emit+0x5b7/0x7a0 kernel/printk/printk.c:2450
_printk+0xcf/0x120 kernel/printk/printk.c:2475
netdev_info+0x10a/0x160 net/core/dev.c:12605
team_port_add drivers/net/team/team_core.c:1307 [inline]
team_add_slave+0x2141/0x26f0 drivers/net/team/team_core.c:1977
do_set_master+0x533/0x6d0 net/core/rtnetlink.c:2946
do_setlink+0xcf0/0x41c0 net/core/rtnetlink.c:3148
rtnl_changelink net/core/rtnetlink.c:3759 [inline]
__rtnl_newlink net/core/rtnetlink.c:3918 [inline]
rtnl_newlink+0x160b/0x1c70 net/core/rtnetlink.c:4055
rtnetlink_rcv_msg+0x7cf/0xb70 net/core/rtnetlink.c:6944
netlink_rcv_skb+0x205/0x470 net/netlink/af_netlink.c:2534
netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]
netlink_unicast+0x758/0x8d0 net/netlink/af_netlink.c:1339
netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1883
sock_sendmsg_nosec net/socket.c:714 [inline]
__sock_sendmsg+0x21c/0x270 net/socket.c:729
__sys_sendto+0x3bd/0x520 net/socket.c:2228
__do_sys_sendto net/socket.c:2235 [inline]
__se_sys_sendto net/socket.c:2231 [inline]
__x64_sys_sendto+0xde/0x100 net/socket.c:2231
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f8a3e1907bc
Code: 2a 5f 02 00 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 70 5f 02 00 48 8b
RSP: 002b:00007ffc56dfadc0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007f8a3eee4620 RCX: 00007f8a3e1907bc
RDX: 0000000000000028 RSI: 00007f8a3eee4670 RDI: 0000000000000003
RBP: 0000000000000000 R08: 00007ffc56dfae14 R09: 000000000000000c
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003
R13: 0000000000000000 R14: 00007f8a3eee4670 R15: 0000000000000000
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__cpa_addr arch/x86/mm/pat/set_memory.c:320 [inline]
RIP: 0010:__cpa_flush_tlb+0x123/0x270 arch/x86/mm/pat/set_memory.c:408
Code: 8b 44 24 30 80 3c 18 00 74 08 4c 89 e7 e8 d5 c1 ae 00 4d 8b 24 24 85 ed 0f 85 ad 00 00 00 e8 c4 ad 4a 00 4c 89 e0 48 c1 e8 03 <80> 3c 18 00 4c 89 f5 74 08 4c 89 e7 e8 ac c1 ae 00 49 c1 e5 0c 4d
RSP: 0018:ffffc90000007ef0 EFLAGS: 00010003
RAX: 0000000000000008 RBX: dffffc0000000000 RCX: ffff8880591e0000
RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff8fa17437 R09: 1ffffffff1f42e86
R10: dffffc0000000000 R11: ffffffff81751cb0 R12: 0000000000000046
R13: 0000000000000000 R14: ffffc90005067480 R15: 0000000000000001
FS: 0000555574063500(0000) GS:ffff888125c1d000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe4b33bd000 CR3: 0000000033424000 CR4: 00000000003526f0
----------------
Code disassembly (best guess):
0: 8b 44 24 30 mov 0x30(%rsp),%eax
4: 80 3c 18 00 cmpb $0x0,(%rax,%rbx,1)
8: 74 08 je 0x12
a: 4c 89 e7 mov %r12,%rdi
d: e8 d5 c1 ae 00 call 0xaec1e7
12: 4d 8b 24 24 mov (%r12),%r12
16: 85 ed test %ebp,%ebp
18: 0f 85 ad 00 00 00 jne 0xcb
1e: e8 c4 ad 4a 00 call 0x4aade7
23: 4c 89 e0 mov %r12,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 80 3c 18 00 cmpb $0x0,(%rax,%rbx,1) <-- trapping instruction
2e: 4c 89 f5 mov %r14,%rbp
31: 74 08 je 0x3b
33: 4c 89 e7 mov %r12,%rdi
36: e8 ac c1 ae 00 call 0xaec1e7
3b: 49 c1 e5 0c shl $0xc,%r13
3f: 4d rex.WRB