Unable to handle kernel execute from non-executable memory at virtual address ffff800017628ea0
Mem abort info:
ESR = 0x000000008600000e
EC = 0x21: IABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x0e: level 2 permission fault
swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001b4920000
[ffff800017628ea0] pgd=100000023ffff003, p4d=100000023ffff003, pud=100000023fffe003, pmd=00680001b7a00701
Internal error: Oops: 8600000e [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 3551 Comm: kworker/1:3 Not tainted 5.15.117-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023
Workqueue: mld mld_ifc_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : stack_trace+0x1dca60/0x840000
lr : dev_hard_header include/linux/netdevice.h:3291 [inline]
lr : macvlan_hard_header+0xe4/0x114 drivers/net/macvlan.c:594
sp : ffff80001f0a7510
x29: ffff80001f0a7510 x28: ffff80000c83d290 x27: ffff0000db888238
x26: dfff800000000000 x25: ffff800017628ea0 x24: ffff800016ef54a0
x23: ffff0000ce081d28 x22: ffff0000e22ebb40 x21: 00000000000086dd
x20: ffff0000d95a19a8 x19: 0000000000000060 x18: 0000000000000200
x17: ff808000108fb7f4 x16: ffff8000082ea770 x15: ffff8000108fb7f4
x14: 1ffff0000291e06a x13: ffffffffffffffff x12: 0000000000000000
x11: ff8080000c83d358 x10: 0000000000000000 x9 : ffff80000c83d358
x8 : ffff0000d3931b40 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000060 x4 : ffff0000ce081d28 x3 : ffff0000d95a19a8
x2 : 00000000000086dd x1 : ffff800016ef54a0 x0 : ffff0000e22ebb40
Call trace:
stack_trace+0x1dca60/0x840000
dev_hard_header include/linux/netdevice.h:3291 [inline]
neigh_resolve_output+0x408/0x5dc net/core/neighbour.c:1519
neigh_output include/net/neighbour.h:516 [inline]
ip6_finish_output2+0x1344/0x1c48 net/ipv6/ip6_output.c:126
__ip6_finish_output+0x518/0x67c net/ipv6/ip6_output.c:191
ip6_finish_output+0x40/0x218 net/ipv6/ip6_output.c:201
NF_HOOK_COND include/linux/netfilter.h:296 [inline]
ip6_output+0x270/0x594 net/ipv6/ip6_output.c:224
dst_output include/net/dst.h:449 [inline]
NF_HOOK+0x160/0x4ec include/linux/netfilter.h:307
mld_sendpack+0x828/0x1264 net/ipv6/mcast.c:1820
mld_send_cr net/ipv6/mcast.c:2121 [inline]
mld_ifc_work+0x85c/0xb9c net/ipv6/mcast.c:2653
process_one_work+0x790/0x11b8 kernel/workqueue.c:2307
worker_thread+0x910/0x1034 kernel/workqueue.c:2454
kthread+0x37c/0x45c kernel/kthread.c:319
ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:870
Code: 1194f0fc ffff8000 08021e10 ffff8000 (00000000)
---[ end trace e8d9337ed4fa828e ]---
----------------
Code disassembly (best guess):
0: 1194f0fc .inst 0x1194f0fc ; undefined
4: ffff8000 .inst 0xffff8000 ; undefined
8: 08021e10 stxrb w2, w16, [x16]
c: ffff8000 .inst 0xffff8000 ; undefined
* 10: 00000000 udf #0 <-- trapping instruction