Unable to handle kernel paging request at virtual address f7ed42511fffffc0 KASAN: maybe wild-memory-access in range [0xbf6e1288fffffe00-0xbf6e1288fffffe07] Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [f7ed42511fffffc0] address between user and kernel address ranges Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: CPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.14.0-rc4-syzkaller-ge056da87c780 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Workqueue: netns cleanup_net pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __skb_unlink include/linux/skbuff.h:2436 [inline] pc : __skb_dequeue include/linux/skbuff.h:2452 [inline] pc : __skb_queue_purge_reason include/linux/skbuff.h:3350 [inline] pc : __skb_queue_purge include/linux/skbuff.h:3356 [inline] pc : gro_cells_destroy+0x1fc/0x38c net/core/gro_cells.c:118 lr : __skb_unlink include/linux/skbuff.h:2435 [inline] lr : __skb_dequeue include/linux/skbuff.h:2452 [inline] lr : __skb_queue_purge_reason include/linux/skbuff.h:3350 [inline] lr : __skb_queue_purge include/linux/skbuff.h:3356 [inline] lr : gro_cells_destroy+0x1f8/0x38c net/core/gro_cells.c:118 sp : ffff800097d37790 x29: ffff800097d377a0 x28: 1fffffbff7edc251 x27: dfff800000000000 x26: bf6e1288fffffe07 x25: fffffffffffffdff x24: fffffdffbf6e128c x23: fffffdffbf6e1298 x22: fffffdffbf6e1288 x21: 0000000000000000 x20: bf6e1288fffffdff x19: ffff0000da31ae60 x18: ffff800097d372a0 x17: 0000000000023fe8 x16: ffff80008b728108 x15: 0000000000000003 x14: 1fffffbff7edc251 x13: 0000000000000000 x12: 0000000000000000 x11: ffff7fbff7edc254 x10: 1fffffbff7edc253 x9 : dfff800000000000 x8 : 17edc2511fffffc0 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000004 x3 : 0000000000000000 x2 : 000000000000000c x1 : 0000000000000000 x0 : fffffdffbf6e128c Call trace: __skb_unlink include/linux/skbuff.h:2436 [inline] (P) __skb_dequeue include/linux/skbuff.h:2452 [inline] (P) __skb_queue_purge_reason include/linux/skbuff.h:3350 [inline] (P) __skb_queue_purge include/linux/skbuff.h:3356 [inline] (P) gro_cells_destroy+0x1fc/0x38c net/core/gro_cells.c:118 (P) ip_tunnel_dev_free+0x20/0x38 net/ipv4/ip_tunnel.c:1101 netdev_run_todo+0xc7c/0xe74 net/core/dev.c:11247 rtnl_unlock+0x14/0x20 net/core/rtnetlink.c:151 cleanup_net+0x5d8/0xa48 net/core/net_namespace.c:648 process_one_work+0x810/0x1638 kernel/workqueue.c:3236 process_scheduled_works kernel/workqueue.c:3317 [inline] worker_thread+0x97c/0xeec kernel/workqueue.c:3398 kthread+0x65c/0x7b0 kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 Code: f9400719 9100229a 97937865 d343ff48 (387b6908) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: f9400719 ldr x25, [x24, #8] 4: 9100229a add x26, x20, #0x8 8: 97937865 bl 0xfffffffffe4de19c c: d343ff48 lsr x8, x26, #3 * 10: 387b6908 ldrb w8, [x8, x27] <-- trapping instruction