Unable to handle kernel paging request at virtual address f4c79fffe0001e6d KASAN: maybe wild-memory-access in range [0xa640ffff0000f368-0xa640ffff0000f36f] Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [f4c79fffe0001e6d] address between user and kernel address ranges Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 6358 Comm: kworker/0:4 Tainted: G W 6.10.0-rc3-syzkaller-gac2193b4b460 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Workqueue: mld mld_ifc_work pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : read_pnet include/net/net_namespace.h:383 [inline] pc : dev_net include/linux/netdevice.h:2577 [inline] pc : rt6_is_valid net/ipv6/route.c:1398 [inline] pc : rt6_get_pcpu_route net/ipv6/route.c:1408 [inline] pc : ip6_pol_route+0x518/0x1314 net/ipv6/route.c:2264 lr : read_pnet include/net/net_namespace.h:383 [inline] lr : dev_net include/linux/netdevice.h:2577 [inline] lr : rt6_is_valid net/ipv6/route.c:1398 [inline] lr : rt6_get_pcpu_route net/ipv6/route.c:1408 [inline] lr : ip6_pol_route+0x514/0x1314 net/ipv6/route.c:2264 sp : ffff800080007400 x29: ffff800080007520 x28: ffff8000800074d0 x27: 1ffff00010000e9a x26: a640ffff0000f36e x25: ffff0000c7c6a642 x24: 0000000000ff0000 x23: ffff800080007498 x22: ffff800080007490 x21: ffff700010000e8c x20: 0000000000000000 x19: dfff800000000000 x18: ffff0000c687b941 x17: ffff800124c6a000 x16: ffff800080559da4 x15: 0000000000000005 x14: 1ffff00010000e2c x13: 0000000000000000 x12: ffff700010000e24 x11: ffff800089da301c x10: 0000000000ff0100 x9 : 0000000000000000 x8 : 14c81fffe0001e6d x7 : ffff800080007370 x6 : 0000000000000003 x5 : ffff0000c687b8c0 x4 : 0000000000000000 x3 : 0000000000000029 x2 : 0000000000000000 x1 : 0000000000ff0000 x0 : 0000000000000001 Call trace: read_pnet include/net/net_namespace.h:383 [inline] dev_net include/linux/netdevice.h:2577 [inline] rt6_is_valid net/ipv6/route.c:1398 [inline] rt6_get_pcpu_route net/ipv6/route.c:1408 [inline] ip6_pol_route+0x518/0x1314 net/ipv6/route.c:2264 ip6_pol_route_input+0x74/0x94 net/ipv6/route.c:2288 pol_lookup_func include/net/ip6_fib.h:616 [inline] fib6_rule_lookup+0x1f8/0x510 net/ipv6/fib6_rules.c:116 ip6_route_input_lookup net/ipv6/route.c:2300 [inline] ip6_route_input+0x6b8/0xb34 net/ipv6/route.c:2596 ip6_rcv_finish_core+0x218/0x3c8 net/ipv6/ip6_input.c:66 ip6_rcv_finish+0x120/0x21c net/ipv6/ip6_input.c:77 NF_HOOK+0x328/0x3d4 include/linux/netfilter.h:314 ipv6_rcv+0x9c/0xbc net/ipv6/ip6_input.c:310 __netif_receive_skb_one_core net/core/dev.c:5625 [inline] __netif_receive_skb+0x18c/0x3c8 net/core/dev.c:5739 process_backlog+0x3e0/0x798 net/core/dev.c:6068 __napi_poll+0xb4/0x3fc net/core/dev.c:6722 napi_poll net/core/dev.c:6791 [inline] net_rx_action+0x604/0xe4c net/core/dev.c:6907 handle_softirqs+0x2e4/0xbfc kernel/softirq.c:554 __do_softirq+0x14/0x20 kernel/softirq.c:588 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 do_softirq+0x90/0xf8 kernel/softirq.c:455 __local_bh_enable_ip+0x288/0x44c kernel/softirq.c:382 local_bh_enable+0x28/0x34 include/linux/bottom_half.h:33 rcu_read_unlock_bh include/linux/rcupdate.h:851 [inline] __dev_queue_xmit+0x184c/0x33f4 net/core/dev.c:4420 dev_queue_xmit include/linux/netdevice.h:3095 [inline] neigh_hh_output include/net/neighbour.h:526 [inline] neigh_output include/net/neighbour.h:540 [inline] ip6_finish_output2+0x1018/0x1ee8 net/ipv6/ip6_output.c:137 ip6_finish_output+0x428/0x7a0 net/ipv6/ip6_output.c:222 NF_HOOK_COND include/linux/netfilter.h:303 [inline] ip6_output+0x274/0x594 net/ipv6/ip6_output.c:243 dst_output include/net/dst.h:450 [inline] NF_HOOK+0x160/0x4f0 include/linux/netfilter.h:314 mld_sendpack+0x7b4/0x10f4 net/ipv6/mcast.c:1818 mld_send_cr net/ipv6/mcast.c:2119 [inline] mld_ifc_work+0x840/0xd0c net/ipv6/mcast.c:2650 process_one_work+0x79c/0x15b8 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x938/0xef4 kernel/workqueue.c:3393 kthread+0x288/0x310 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 Code: f9400328 9104611a 944b8da6 d343ff48 (38736908) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: f9400328 ldr x8, [x25] 4: 9104611a add x26, x8, #0x118 8: 944b8da6 bl 0x12e36a0 c: d343ff48 lsr x8, x26, #3 * 10: 38736908 ldrb w8, [x8, x19] <-- trapping instruction