veth1_macvtap: left promiscuous mode veth0_macvtap: left promiscuous mode veth1_vlan: left promiscuous mode veth0_vlan: left promiscuous mode Oops: general protection fault, probably for non-canonical address 0xdffffc001fffe000: 0000 [#1] SMP KASAN NOPTI KASAN: probably user-memory-access in range [0x00000000ffff0000-0x00000000ffff0007] CPU: 0 UID: 0 PID: 5942 Comm: kworker/u8:8 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/29/2025 Workqueue: netns cleanup_net RIP: 0010:ip6_mc_clear_src+0x89/0x5a0 net/ipv6/mcast.c:2599 Code: 49 bc 00 00 00 00 00 fc ff df 48 8d 45 10 49 89 c5 48 89 04 24 49 c1 ed 03 4d 01 e5 eb 32 e8 3e ec 98 f7 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 80 04 00 00 4c 8b 3b 48 8d 7b 30 48 89 de e8 RSP: 0018:ffffc90004d47418 EFLAGS: 00010216 RAX: 000000001fffe000 RBX: 00000000ffff0000 RCX: ffffffff8a22467b RDX: ffff888036181e00 RSI: ffffffff8a224602 RDI: 0000000000000005 RBP: ffff88805a781400 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: dffffc0000000000 R13: ffffed100b4f0282 R14: ffff88805a781428 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8881249e5000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c2e0ced CR3: 000000000e180000 CR4: 0000000000350ef0 Call Trace: __ipv6_dev_mc_dec+0x2bd/0x3b0 net/ipv6/mcast.c:1021 addrconf_leave_solict net/ipv6/addrconf.c:2254 [inline] __ipv6_ifa_notify+0x3d8/0xd60 net/ipv6/addrconf.c:6299 addrconf_ifdown.isra.0+0xe8b/0x1a90 net/ipv6/addrconf.c:3978 addrconf_notify+0x220/0x19e0 net/ipv6/addrconf.c:3777 notifier_call_chain+0xbc/0x410 kernel/notifier.c:85 call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:2176 call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x319/0x630 net/core/dev.c:1731 unregister_netdevice_many_notify+0x578/0x26f0 net/core/dev.c:11952 unregister_netdevice_many net/core/dev.c:12046 [inline] default_device_exit_batch+0x853/0xaf0 net/core/dev.c:12538 ops_exit_list+0x12b/0x180 net/core/net_namespace.c:177 cleanup_net+0x5c1/0xb30 net/core/net_namespace.c:654 process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3400 kthread+0x3c5/0x780 kernel/kthread.c:464 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:ip6_mc_clear_src+0x89/0x5a0 net/ipv6/mcast.c:2599 Code: 49 bc 00 00 00 00 00 fc ff df 48 8d 45 10 49 89 c5 48 89 04 24 49 c1 ed 03 4d 01 e5 eb 32 e8 3e ec 98 f7 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 80 04 00 00 4c 8b 3b 48 8d 7b 30 48 89 de e8 RSP: 0018:ffffc90004d47418 EFLAGS: 00010216 RAX: 000000001fffe000 RBX: 00000000ffff0000 RCX: ffffffff8a22467b RDX: ffff888036181e00 RSI: ffffffff8a224602 RDI: 0000000000000005 RBP: ffff88805a781400 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: dffffc0000000000 R13: ffffed100b4f0282 R14: ffff88805a781428 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8881249e5000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff87733a440 CR3: 000000000e180000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12 7: fc ff df a: 48 8d 45 10 lea 0x10(%rbp),%rax e: 49 89 c5 mov %rax,%r13 11: 48 89 04 24 mov %rax,(%rsp) 15: 49 c1 ed 03 shr $0x3,%r13 19: 4d 01 e5 add %r12,%r13 1c: eb 32 jmp 0x50 1e: e8 3e ec 98 f7 call 0xf798ec61 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction 2f: 0f 85 80 04 00 00 jne 0x4b5 35: 4c 8b 3b mov (%rbx),%r15 38: 48 8d 7b 30 lea 0x30(%rbx),%rdi 3c: 48 89 de mov %rbx,%rsi 3f: e8 .byte 0xe8