Oops: general protection fault, probably for non-canonical address 0xdffffc0000000007: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000038-0x000000000000003f] CPU: 1 UID: 0 PID: 31534 Comm: syz.1.14759 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:rt_cache_valid net/ipv4/route.c:1582 [inline] RIP: 0010:__mkroute_output net/ipv4/route.c:2650 [inline] RIP: 0010:ip_route_output_key_hash_rcu+0x12ba/0x25d0 net/ipv4/route.c:2875 Code: c3 31 ff 89 c6 e8 b6 9b c7 f7 85 db 74 5b e8 6d 97 c7 f7 eb 05 e8 66 97 c7 f7 4d 85 ff 74 36 49 8d 5f 3a 48 89 d8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 ff 10 00 00 0f b7 1b bf ff ff 00 00 89 RSP: 0018:ffffc90000a086e0 EFLAGS: 00010202 RAX: 0000000000000007 RBX: 0000000000000039 RCX: ffff888031f99e40 RDX: 0000000000000100 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000080000000 R08: ffff888031f99e40 R09: 0000000000000003 R10: 0000000000000005 R11: 0000000000000100 R12: dffffc0000000000 R13: 0000000000000000 R14: ffff888028a1cf58 R15: ffffffffffffffff FS: 0000000000000000(0000) GS:ffff8881255b0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c260d3f CR3: 000000000e54a000 CR4: 00000000003526f0 Call Trace: ip_route_output_key_hash+0x18d/0x2a0 net/ipv4/route.c:2705 __ip_route_output_key include/net/route.h:169 [inline] ip_route_output_flow+0x2a/0x150 net/ipv4/route.c:2932 ip_route_output_key include/net/route.h:179 [inline] tipc_udp_xmit+0x1f2/0xc10 net/tipc/udp_media.c:189 tipc_udp_send_msg+0x27f/0x3f0 net/tipc/udp_media.c:271 tipc_bearer_xmit_skb+0x2b3/0x400 net/tipc/bearer.c:575 tipc_disc_timeout+0x595/0x6f0 net/tipc/discover.c:338 call_timer_fn+0x192/0x5a0 kernel/time/timer.c:1748 expire_timers kernel/time/timer.c:1799 [inline] __run_timers kernel/time/timer.c:2373 [inline] __run_timer_base+0x652/0x8b0 kernel/time/timer.c:2385 run_timer_base kernel/time/timer.c:2394 [inline] run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2404 handle_softirqs+0x22a/0x7c0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:lock_acquire+0x221/0x330 kernel/locking/lockdep.c:5872 Code: ff ff ff e8 a1 e5 fd 09 f7 44 24 08 00 02 00 00 0f 84 3a ff ff ff 65 48 8b 05 1b a3 76 11 48 3b 44 24 58 75 33 fb 48 83 c4 60 <5b> 41 5c 41 5d 41 5e 41 5f 5d e9 00 ca 00 0a cc 48 8d 3d c8 7f 73 RSP: 0018:ffffc90003e4f610 EFLAGS: 00000282 RAX: 2b5fc6a6dd020300 RBX: 0000000000000000 RCX: 0000000080000001 RDX: 00000000a4751b23 RSI: ffffffff8e151802 RDI: ffffffff8c276500 RBP: ffffffff82396334 R08: ffffffff82396334 R09: ffffffff8e75e0a0 R10: dffffc0000000000 R11: fffff94000b52919 R12: 0000000000000002 R13: ffffffff8e75e0a0 R14: 0000000000000000 R15: 0000000000000246 rcu_lock_acquire include/linux/rcupdate.h:312 [inline] rcu_read_lock include/linux/rcupdate.h:850 [inline] page_table_check_clear+0x164/0x5f0 mm/page_table_check.c:77 ptep_get_and_clear_full arch/x86/include/asm/jump_label.h:-1 [inline] get_and_clear_full_ptes include/linux/pgtable.h:725 [inline] zap_present_folio_ptes mm/memory.c:1630 [inline] zap_present_ptes mm/memory.c:1712 [inline] do_zap_pte_range mm/memory.c:1814 [inline] zap_pte_range mm/memory.c:1858 [inline] zap_pmd_range mm/memory.c:1950 [inline] zap_pud_range mm/memory.c:1978 [inline] zap_p4d_range mm/memory.c:1999 [inline] unmap_page_range+0x3294/0x4030 mm/memory.c:2020 unmap_single_vma mm/memory.c:2062 [inline] unmap_vmas+0x3c0/0x5c0 mm/memory.c:2104 exit_mmap+0x251/0xb30 mm/mmap.c:1277 __mmput+0x118/0x430 kernel/fork.c:1174 exit_mm+0x168/0x220 kernel/exit.c:581 do_exit+0x62e/0x2310 kernel/exit.c:959 do_group_exit+0x21b/0x2d0 kernel/exit.c:1112 __do_sys_exit_group kernel/exit.c:1123 [inline] __se_sys_exit_group kernel/exit.c:1121 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1121 x64_sys_call+0x221a/0x2240 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f11b8b9c629 Code: Unable to access opcode bytes at 0x7f11b8b9c5ff. RSP: 002b:00007ffcec0539e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f11b8b9c629 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffcec053a4c R08: 0000000000000000 R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 00000000000001e4 R13: 00000000000927c0 R14: 00000000001a46d8 R15: 00007ffcec053aa0 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:rt_cache_valid net/ipv4/route.c:1582 [inline] RIP: 0010:__mkroute_output net/ipv4/route.c:2650 [inline] RIP: 0010:ip_route_output_key_hash_rcu+0x12ba/0x25d0 net/ipv4/route.c:2875 Code: c3 31 ff 89 c6 e8 b6 9b c7 f7 85 db 74 5b e8 6d 97 c7 f7 eb 05 e8 66 97 c7 f7 4d 85 ff 74 36 49 8d 5f 3a 48 89 d8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 ff 10 00 00 0f b7 1b bf ff ff 00 00 89 RSP: 0018:ffffc90000a086e0 EFLAGS: 00010202 RAX: 0000000000000007 RBX: 0000000000000039 RCX: ffff888031f99e40 RDX: 0000000000000100 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000080000000 R08: ffff888031f99e40 R09: 0000000000000003 R10: 0000000000000005 R11: 0000000000000100 R12: dffffc0000000000 R13: 0000000000000000 R14: ffff888028a1cf58 R15: ffffffffffffffff FS: 0000000000000000(0000) GS:ffff8881255b0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c260d3f CR3: 000000000e54a000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: c3 ret 1: 31 ff xor %edi,%edi 3: 89 c6 mov %eax,%esi 5: e8 b6 9b c7 f7 call 0xf7c79bc0 a: 85 db test %ebx,%ebx c: 74 5b je 0x69 e: e8 6d 97 c7 f7 call 0xf7c79780 13: eb 05 jmp 0x1a 15: e8 66 97 c7 f7 call 0xf7c79780 1a: 4d 85 ff test %r15,%r15 1d: 74 36 je 0x55 1f: 49 8d 5f 3a lea 0x3a(%r15),%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 0f b6 04 20 movzbl (%rax,%r12,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 0f 85 ff 10 00 00 jne 0x1136 37: 0f b7 1b movzwl (%rbx),%ebx 3a: bf ff ff 00 00 mov $0xffff,%edi 3f: 89 .byte 0x89