Unable to handle kernel paging request at virtual address ffff8001f1d0d008 Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005 CM = 0, WnR = 0 swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001c54dc000 [ffff8001f1d0d008] pgd=100000023ffff003, p4d=100000023ffff003, pud=0000000000000000 Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 20 Comm: ksoftirqd/1 Not tainted 6.1.0-rc6-syzkaller-32662-g6d464646530f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ip6_rcv_core+0x19c/0xad8 net/ipv6/ip6_input.c:166 lr : ip6_rcv_core+0x194/0xad8 net/ipv6/ip6_input.c:166 sp : ffff80000f303b10 x29: ffff80000f303b10 x28: ffff0001feff0110 x27: ffff000130599c00 x26: ffff80000d95c000 x25: ffff80000d95c000 x24: ffff00012e829800 x23: 0000000000000000 x22: ffff80000cd2803b x21: ffff00012e812000 x20: ffff000116af3680 x19: ffff000130599c00 x18: 000000000000008e x17: ffff80000c0cd83c x16: ffff80000dbe6158 x15: ffff0000c0330000 x14: 0000000000000000 x13: 00000000ffffffff x12: ffff0000c0330000 x11: ff808000095cfff8 x10: 0000000000000000 x9 : ffff8000095cfff8 x8 : ffff8001f1d0d000 x7 : ffff80000b7a8770 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000002 x2 : 0000000000000008 x1 : ffff80000cd2803b x0 : 0000000000000001 Call trace: ip6_rcv_core+0x19c/0xad8 net/ipv6/ip6_input.c:166 ipv6_rcv+0x38/0xb8 net/ipv6/ip6_input.c:306 __netif_receive_skb_one_core net/core/dev.c:5489 [inline] __netif_receive_skb+0x70/0x14c net/core/dev.c:5603 process_backlog+0x240/0x388 net/core/dev.c:5931 __napi_poll+0x5c/0x24c net/core/dev.c:6498 napi_poll+0x110/0x484 net/core/dev.c:6565 net_rx_action+0x18c/0x414 net/core/dev.c:6676 _stext+0x168/0x37c run_ksoftirqd+0x4c/0x21c kernel/softirq.c:934 smpboot_thread_fn+0x248/0x3ec kernel/smpboot.c:164 kthread+0x12c/0x158 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 Code: aa1603e0 94237a23 d538d088 8b0802e8 (f9400509) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: aa1603e0 mov x0, x22 4: 94237a23 bl 0x8de890 8: d538d088 mrs x8, tpidr_el1 c: 8b0802e8 add x8, x23, x8 * 10: f9400509 ldr x9, [x8, #8] <-- trapping instruction