Oops: general protection fault, probably for non-canonical address 0xdffffc0000000008: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000040-0x0000000000000047] CPU: 0 UID: 0 PID: 10102 Comm: syz-executor Not tainted 6.16.0-rc4-next-20250630-syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:__cpa_addr arch/x86/mm/pat/set_memory.c:320 [inline] RIP: 0010:__cpa_flush_tlb+0x123/0x270 arch/x86/mm/pat/set_memory.c:408 Code: 8b 44 24 30 80 3c 18 00 74 08 4c 89 e7 e8 d5 c1 ae 00 4d 8b 24 24 85 ed 0f 85 ad 00 00 00 e8 c4 ad 4a 00 4c 89 e0 48 c1 e8 03 <80> 3c 18 00 4c 89 f5 74 08 4c 89 e7 e8 ac c1 ae 00 49 c1 e5 0c 4d RSP: 0018:ffffc90000007ef0 EFLAGS: 00010003 RAX: 0000000000000008 RBX: dffffc0000000000 RCX: ffff8880591e0000 RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff8fa17437 R09: 1ffffffff1f42e86 R10: dffffc0000000000 R11: ffffffff81751cb0 R12: 0000000000000046 R13: 0000000000000000 R14: ffffc90005067480 R15: 0000000000000001 FS: 0000555574063500(0000) GS:ffff888125c1d000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe4b33bd000 CR3: 0000000033424000 CR4: 00000000003526f0 Call Trace: csd_do_func kernel/smp.c:134 [inline] __flush_smp_call_function_queue+0x370/0xaa0 kernel/smp.c:540 __sysvec_call_function_single+0xa8/0x3d0 arch/x86/kernel/smp.c:271 instr_sysvec_call_function_single arch/x86/kernel/smp.c:266 [inline] sysvec_call_function_single+0x9e/0xc0 arch/x86/kernel/smp.c:266 asm_sysvec_call_function_single+0x1a/0x20 arch/x86/include/asm/idtentry.h:709 RIP: 0010:console_flush_all+0x7f7/0xc40 kernel/printk/printk.c:3227 Code: 48 21 c3 0f 85 e9 01 00 00 e8 65 2d 1f 00 48 8b 5c 24 20 4d 85 f6 75 07 e8 56 2d 1f 00 eb 06 e8 4f 2d 1f 00 fb 48 8b 44 24 28 <42> 80 3c 20 00 74 08 48 89 df e8 3a 41 83 00 48 8b 1b 48 8b 44 24 RSP: 0018:ffffc9000b476740 EFLAGS: 00000293 RAX: 1ffffffff1d36a63 RBX: ffffffff8e9b5318 RCX: ffff8880591e0000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc9000b476890 R08: ffffffff8fa17437 R09: 1ffffffff1f42e86 R10: dffffc0000000000 R11: fffffbfff1f42e87 R12: dffffc0000000000 R13: 0000000000000001 R14: 0000000000000200 R15: ffffffff8e9b52c0 __console_flush_and_unlock kernel/printk/printk.c:3285 [inline] console_unlock+0xc4/0x270 kernel/printk/printk.c:3325 vprintk_emit+0x5b7/0x7a0 kernel/printk/printk.c:2450 _printk+0xcf/0x120 kernel/printk/printk.c:2475 netdev_info+0x10a/0x160 net/core/dev.c:12605 team_port_add drivers/net/team/team_core.c:1307 [inline] team_add_slave+0x2141/0x26f0 drivers/net/team/team_core.c:1977 do_set_master+0x533/0x6d0 net/core/rtnetlink.c:2946 do_setlink+0xcf0/0x41c0 net/core/rtnetlink.c:3148 rtnl_changelink net/core/rtnetlink.c:3759 [inline] __rtnl_newlink net/core/rtnetlink.c:3918 [inline] rtnl_newlink+0x160b/0x1c70 net/core/rtnetlink.c:4055 rtnetlink_rcv_msg+0x7cf/0xb70 net/core/rtnetlink.c:6944 netlink_rcv_skb+0x205/0x470 net/netlink/af_netlink.c:2534 netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline] netlink_unicast+0x758/0x8d0 net/netlink/af_netlink.c:1339 netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1883 sock_sendmsg_nosec net/socket.c:714 [inline] __sock_sendmsg+0x21c/0x270 net/socket.c:729 __sys_sendto+0x3bd/0x520 net/socket.c:2228 __do_sys_sendto net/socket.c:2235 [inline] __se_sys_sendto net/socket.c:2231 [inline] __x64_sys_sendto+0xde/0x100 net/socket.c:2231 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f8a3e1907bc Code: 2a 5f 02 00 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 70 5f 02 00 48 8b RSP: 002b:00007ffc56dfadc0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f8a3eee4620 RCX: 00007f8a3e1907bc RDX: 0000000000000028 RSI: 00007f8a3eee4670 RDI: 0000000000000003 RBP: 0000000000000000 R08: 00007ffc56dfae14 R09: 000000000000000c R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 R13: 0000000000000000 R14: 00007f8a3eee4670 R15: 0000000000000000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__cpa_addr arch/x86/mm/pat/set_memory.c:320 [inline] RIP: 0010:__cpa_flush_tlb+0x123/0x270 arch/x86/mm/pat/set_memory.c:408 Code: 8b 44 24 30 80 3c 18 00 74 08 4c 89 e7 e8 d5 c1 ae 00 4d 8b 24 24 85 ed 0f 85 ad 00 00 00 e8 c4 ad 4a 00 4c 89 e0 48 c1 e8 03 <80> 3c 18 00 4c 89 f5 74 08 4c 89 e7 e8 ac c1 ae 00 49 c1 e5 0c 4d RSP: 0018:ffffc90000007ef0 EFLAGS: 00010003 RAX: 0000000000000008 RBX: dffffc0000000000 RCX: ffff8880591e0000 RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff8fa17437 R09: 1ffffffff1f42e86 R10: dffffc0000000000 R11: ffffffff81751cb0 R12: 0000000000000046 R13: 0000000000000000 R14: ffffc90005067480 R15: 0000000000000001 FS: 0000555574063500(0000) GS:ffff888125c1d000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe4b33bd000 CR3: 0000000033424000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 8b 44 24 30 mov 0x30(%rsp),%eax 4: 80 3c 18 00 cmpb $0x0,(%rax,%rbx,1) 8: 74 08 je 0x12 a: 4c 89 e7 mov %r12,%rdi d: e8 d5 c1 ae 00 call 0xaec1e7 12: 4d 8b 24 24 mov (%r12),%r12 16: 85 ed test %ebp,%ebp 18: 0f 85 ad 00 00 00 jne 0xcb 1e: e8 c4 ad 4a 00 call 0x4aade7 23: 4c 89 e0 mov %r12,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 80 3c 18 00 cmpb $0x0,(%rax,%rbx,1) <-- trapping instruction 2e: 4c 89 f5 mov %r14,%rbp 31: 74 08 je 0x3b 33: 4c 89 e7 mov %r12,%rdi 36: e8 ac c1 ae 00 call 0xaec1e7 3b: 49 c1 e5 0c shl $0xc,%r13 3f: 4d rex.WRB