dvmrp1: left allmulticast mode Oops: general protection fault, probably for non-canonical address 0xdffffc001fffe1ac: 0000 [#1] SMP KASAN PTI KASAN: probably user-memory-access in range [0x00000000ffff0d60-0x00000000ffff0d67] CPU: 1 UID: 0 PID: 16388 Comm: syz.1.2836 Not tainted 6.16.0-syzkaller-12084-g33caa208dba6 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:ip_mc_hash_remove net/ipv4/igmp.c:1431 [inline] RIP: 0010:__ip_mc_dec_group+0x2fd/0x690 net/ipv4/igmp.c:1774 Code: e9 16 bc f7 c6 05 08 8e 89 05 01 48 c7 c7 00 90 9e 8c be 97 05 00 00 48 c7 c2 80 90 9e 8c e8 1a f1 99 f7 4c 89 e3 48 c1 eb 03 <42> 80 3c 2b 00 74 08 4c 89 e7 e8 54 81 1f f8 4d 8b 2c 24 4d 39 f5 RSP: 0018:ffffc9001cc275f8 EFLAGS: 00010206 RAX: ffffffff8a03948e RBX: 000000001fffe1ac RCX: 0000000000080000 RDX: ffffc9000b799000 RSI: 0000000000002192 RDI: 0000000000002193 RBP: ffff88804dfb6820 R08: ffffffff8f5348a7 R09: 1ffffffff1ea6914 R10: dffffc0000000000 R11: fffffbfff1ea6915 R12: 00000000ffff0d60 R13: dffffc0000000000 R14: ffff888021f01800 R15: 1ffff11009bf6d04 FS: 00007faedf74a6c0(0000) GS:ffff888125d21000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3ffdcaf000 CR3: 0000000031d50000 CR4: 00000000003526f0 Call Trace: inetdev_event+0x2a7/0x15b0 net/ipv4/devinet.c:1642 notifier_call_chain+0x1b6/0x3e0 kernel/notifier.c:85 call_netdevice_notifiers_extack net/core/dev.c:2267 [inline] call_netdevice_notifiers net/core/dev.c:2281 [inline] netif_close_many+0x29c/0x410 net/core/dev.c:1784 unregister_netdevice_many_notify+0x7b9/0x1ff0 net/core/dev.c:12118 mroute_clean_tables+0x3a4/0xaa0 net/ipv4/ipmr.c:1312 ip_mroute_setsockopt+0xaa3/0xf60 net/ipv4/ipmr.c:1496 do_ip_setsockopt+0xf11/0x2d00 net/ipv4/ip_sockglue.c:948 ip_setsockopt+0x66/0x110 net/ipv4/ip_sockglue.c:1417 do_sock_setsockopt+0x17c/0x1b0 net/socket.c:2344 __sys_setsockopt net/socket.c:2369 [inline] __do_sys_setsockopt net/socket.c:2375 [inline] __se_sys_setsockopt net/socket.c:2372 [inline] __x64_sys_setsockopt+0x13f/0x1b0 net/socket.c:2372 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7faede98ebe9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007faedf74a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007faedebb5fa0 RCX: 00007faede98ebe9 RDX: 00000000000000d4 RSI: 0000000000000000 RDI: 0000000000000009 RBP: 00007faedea11e19 R08: 0000000000000004 R09: 0000000000000000 R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000000 R13: 00007faedebb6038 R14: 00007faedebb5fa0 R15: 00007fffe7159e08 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:ip_mc_hash_remove net/ipv4/igmp.c:1431 [inline] RIP: 0010:__ip_mc_dec_group+0x2fd/0x690 net/ipv4/igmp.c:1774 Code: e9 16 bc f7 c6 05 08 8e 89 05 01 48 c7 c7 00 90 9e 8c be 97 05 00 00 48 c7 c2 80 90 9e 8c e8 1a f1 99 f7 4c 89 e3 48 c1 eb 03 <42> 80 3c 2b 00 74 08 4c 89 e7 e8 54 81 1f f8 4d 8b 2c 24 4d 39 f5 RSP: 0018:ffffc9001cc275f8 EFLAGS: 00010206 RAX: ffffffff8a03948e RBX: 000000001fffe1ac RCX: 0000000000080000 RDX: ffffc9000b799000 RSI: 0000000000002192 RDI: 0000000000002193 RBP: ffff88804dfb6820 R08: ffffffff8f5348a7 R09: 1ffffffff1ea6914 R10: dffffc0000000000 R11: fffffbfff1ea6915 R12: 00000000ffff0d60 R13: dffffc0000000000 R14: ffff888021f01800 R15: 1ffff11009bf6d04 FS: 00007faedf74a6c0(0000) GS:ffff888125d21000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c34a5b7 CR3: 0000000031d50000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: e9 16 bc f7 c6 jmp 0xc6f7bc1b 5: 05 08 8e 89 05 add $0x5898e08,%eax a: 01 48 c7 add %ecx,-0x39(%rax) d: c7 00 90 9e 8c be movl $0xbe8c9e90,(%rax) 13: 97 xchg %eax,%edi 14: 05 00 00 48 c7 add $0xc7480000,%eax 19: c2 80 90 ret $0x9080 1c: 9e sahf 1d: 8c e8 mov %gs,%eax 1f: 1a f1 sbb %cl,%dh 21: 99 cltd 22: f7 4c 89 e3 48 c1 eb testl $0x3ebc148,-0x1d(%rcx,%rcx,4) 29: 03 * 2a: 42 80 3c 2b 00 cmpb $0x0,(%rbx,%r13,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 4c 89 e7 mov %r12,%rdi 34: e8 54 81 1f f8 call 0xf81f818d 39: 4d 8b 2c 24 mov (%r12),%r13 3d: 4d 39 f5 cmp %r14,%r13