Oops: general protection fault, probably for non-canonical address 0xdffffc0000000060: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000300-0x0000000000000307] CPU: 0 UID: 0 PID: 10061 Comm: dhcpcd-run-hook Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 RIP: 0010:strcmp+0x3c/0xc0 lib/string.c:284 Code: 00 fc ff df 45 31 f6 4a 8d 04 37 48 89 c1 48 c1 e9 03 0f b6 0c 19 84 c9 75 28 42 0f b6 2c 37 4a 8d 04 36 48 89 c1 48 c1 e9 03 <0f> b6 0c 19 84 c9 75 2f 42 3a 2c 36 75 48 49 ff c6 40 84 ed 75 c7 RSP: 0000:ffffc90002ea7780 EFLAGS: 00010006 RAX: 0000000000000300 RBX: dffffc0000000000 RCX: 0000000000000060 RDX: 0000000000000001 RSI: 0000000000000300 RDI: ffffffff8c28b220 RBP: 0000000000000026 R08: 0000000000000001 R09: ffff888029df8020 R10: dffffc0000000000 R11: ffffed100675a802 R12: ffffffff93e4e698 R13: ffffffff96c20d28 R14: 0000000000000000 R15: ffffffff93e1a380 FS: 00007f10e63eac80(0000) GS:ffff888125293000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000560c02fb01a8 CR3: 0000000059332000 CR4: 00000000003526f0 Call Trace: count_matching_names+0x57/0x90 kernel/locking/lockdep.c:878 register_lock_class+0x200/0x2e0 kernel/locking/lockdep.c:1344 __lock_acquire+0xad/0x2cf0 kernel/locking/lockdep.c:5112 lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:132 [inline] _raw_spin_lock_irqsave+0x40/0x60 kernel/locking/spinlock.c:166 complete_with_flags kernel/sched/completion.c:25 [inline] complete+0x28/0x1b0 kernel/sched/completion.c:52 transfer drivers/usb/gadget/udc/dummy_hcd.c:1527 [inline] dummy_timer+0x2136/0x4650 drivers/usb/gadget/udc/dummy_hcd.c:1989 __run_hrtimer kernel/time/hrtimer.c:1930 [inline] __hrtimer_run_queues+0x3c0/0xa20 kernel/time/hrtimer.c:1994 hrtimer_run_softirq+0x17a/0x240 kernel/time/hrtimer.c:2011 handle_softirqs+0x22a/0x840 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0xca/0x220 kernel/softirq.c:735 irq_exit_rcu+0x9/0x30 kernel/softirq.c:752 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1061 [inline] sysvec_apic_timer_interrupt+0x57/0xc0 arch/x86/kernel/apic/apic.c:1061 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0033:0x7f10e660c6ff Code: 89 f8 09 f0 c1 e0 14 3d 00 00 00 f8 0f 87 29 03 00 00 c5 fe 6f 07 c5 fd 74 0e c5 85 74 d0 c5 ed df c9 c5 fd d7 c9 ff c1 74 61 <90> f3 0f bc c9 0f b6 04 0f 0f b6 0c 0e 29 c8 0f 01 d6 75 04 c5 f8 RSP: 002b:00007ffd7abf1378 EFLAGS: 00000203 RAX: 00000000dd100000 RBX: 0000560c02fa9dc8 RCX: 0000000000000002 RDX: 0000000000000000 RSI: 0000560c02fa9dc0 RDI: 00007f10e6733dd1 RBP: 00007ffd7abf13b0 R08: 00007f10e66d5c2e R09: 0000000000000040 R10: 0000000000000004 R11: 0000000000000202 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ffd7abf13b8 R15: 0000000000000001 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:strcmp+0x3c/0xc0 lib/string.c:284 Code: 00 fc ff df 45 31 f6 4a 8d 04 37 48 89 c1 48 c1 e9 03 0f b6 0c 19 84 c9 75 28 42 0f b6 2c 37 4a 8d 04 36 48 89 c1 48 c1 e9 03 <0f> b6 0c 19 84 c9 75 2f 42 3a 2c 36 75 48 49 ff c6 40 84 ed 75 c7 RSP: 0000:ffffc90002ea7780 EFLAGS: 00010006 RAX: 0000000000000300 RBX: dffffc0000000000 RCX: 0000000000000060 RDX: 0000000000000001 RSI: 0000000000000300 RDI: ffffffff8c28b220 RBP: 0000000000000026 R08: 0000000000000001 R09: ffff888029df8020 R10: dffffc0000000000 R11: ffffed100675a802 R12: ffffffff93e4e698 R13: ffffffff96c20d28 R14: 0000000000000000 R15: ffffffff93e1a380 FS: 00007f10e63eac80(0000) GS:ffff888125293000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000560c02fb01a8 CR3: 0000000059332000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess), 4 bytes skipped: 0: 45 31 f6 xor %r14d,%r14d 3: 4a 8d 04 37 lea (%rdi,%r14,1),%rax 7: 48 89 c1 mov %rax,%rcx a: 48 c1 e9 03 shr $0x3,%rcx e: 0f b6 0c 19 movzbl (%rcx,%rbx,1),%ecx 12: 84 c9 test %cl,%cl 14: 75 28 jne 0x3e 16: 42 0f b6 2c 37 movzbl (%rdi,%r14,1),%ebp 1b: 4a 8d 04 36 lea (%rsi,%r14,1),%rax 1f: 48 89 c1 mov %rax,%rcx 22: 48 c1 e9 03 shr $0x3,%rcx * 26: 0f b6 0c 19 movzbl (%rcx,%rbx,1),%ecx <-- trapping instruction 2a: 84 c9 test %cl,%cl 2c: 75 2f jne 0x5d 2e: 42 3a 2c 36 cmp (%rsi,%r14,1),%bpl 32: 75 48 jne 0x7c 34: 49 ff c6 inc %r14 37: 40 84 ed test %bpl,%bpl 3a: 75 c7 jne 0x3