loop4: detected capacity change from 0 to 40427 F2FS-fs (loop4): build fault injection rate: 771 F2FS-fs (loop4): invalid crc value F2FS-fs (loop4): Mounted with checkpoint version = 48b305e5 Unable to handle kernel paging request at virtual address dfff800000000018 KASAN: null-ptr-deref in range [0x00000000000000c0-0x00000000000000c7] Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [dfff800000000018] address between user and kernel address ranges Internal error: Oops: 0000000096000005 [#1] SMP Modules linked in: CPU: 1 UID: 0 PID: 9537 Comm: syz.4.816 Not tainted 6.16.0-rc1-syzkaller-g39dfc971e42d #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __in6_dev_get include/net/addrconf.h:347 [inline] pc : ip6_ignore_linkdown include/net/addrconf.h:443 [inline] pc : find_match+0xa0/0xacc net/ipv6/route.c:781 lr : find_match+0x74/0xacc net/ipv6/route.c:778 sp : ffff80009e3361e0 x29: ffff80009e336200 x28: 1fffe00018a6b5e6 x27: 1fffe00018a6b5e4 x26: 00000000000000c0 x25: ffff0000c535af37 x24: 0000000000000201 x23: 0000000000000002 x22: ffff0000c535af20 x21: 0000000000000000 x20: dfff800000000000 x19: 0000000000000000 x18: 0000000000000000 x17: ffff8000891ee3a0 x16: ffff800080520344 x15: 0000000000000002 x14: 1ffff00013c66c80 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000080000 x10: 0000000000ff0100 x9 : 0000000000000002 x8 : 0000000000000018 x7 : ffff80009e336590 x6 : 0000000000000002 x5 : ffff80009e336590 x4 : ffff80009e336580 x3 : 0000000000000002 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: __in6_dev_get include/net/addrconf.h:347 [inline] (P) ip6_ignore_linkdown include/net/addrconf.h:443 [inline] (P) find_match+0xa0/0xacc net/ipv6/route.c:781 (P) rt6_nh_find_match+0xcc/0x138 net/ipv6/route.c:821 nexthop_for_each_fib6_nh+0x1a8/0x3d0 net/ipv4/nexthop.c:1516 __find_rr_leaf+0x3b8/0x5c8 net/ipv6/route.c:862 find_rr_leaf net/ipv6/route.c:890 [inline] rt6_select net/ipv6/route.c:934 [inline] fib6_table_lookup+0x308/0x8b8 net/ipv6/route.c:2232 ip6_pol_route+0x1f8/0x1014 net/ipv6/route.c:2268 ip6_pol_route_output+0x60/0x94 net/ipv6/route.c:2650 pol_lookup_func include/net/ip6_fib.h:617 [inline] fib6_rule_lookup+0x258/0x45c net/ipv6/fib6_rules.c:125 ip6_route_output_flags_noref net/ipv6/route.c:2683 [inline] ip6_route_output_flags+0x2e4/0x578 net/ipv6/route.c:2695 ip6_route_output include/net/ip6_route.h:93 [inline] icmpv6_rt_has_prefsrc+0x5c/0x3b8 net/ipv6/icmp.c:246 icmp6_send+0xa74/0x14d8 net/ipv6/icmp.c:565 __icmpv6_send include/linux/icmpv6.h:28 [inline] icmpv6_ndo_send+0x134/0x410 net/ipv6/ip6_icmp.c:62 tnl_update_pmtu+0xaa4/0xe3c net/ipv4/ip_tunnel.c:563 ip_tunnel_xmit+0xad8/0x20e8 net/ipv4/ip_tunnel.c:819 __gre_xmit net/ipv4/ip_gre.c:488 [inline] ipgre_xmit+0x6ac/0xa18 net/ipv4/ip_gre.c:692 __netdev_start_xmit include/linux/netdevice.h:5215 [inline] netdev_start_xmit include/linux/netdevice.h:5224 [inline] xmit_one net/core/dev.c:3830 [inline] dev_hard_start_xmit+0x2b0/0x890 net/core/dev.c:3846 __dev_queue_xmit+0x15a4/0x31f0 net/core/dev.c:4713 dev_queue_xmit include/linux/netdevice.h:3355 [inline] __bpf_tx_skb+0x1ac/0x2cc net/core/filter.c:2144 __bpf_redirect+0x5b0/0xb7c net/core/filter.c:-1 ____bpf_clone_redirect net/core/filter.c:2469 [inline] bpf_clone_redirect+0x1f0/0x318 net/core/filter.c:2439 bpf_prog_da1e0ee5f8d5c8f5+0x84/0xb0 bpf_dispatcher_nop_func include/linux/bpf.h:1322 [inline] __bpf_prog_run include/linux/filter.h:718 [inline] bpf_prog_run include/linux/filter.h:725 [inline] bpf_test_run+0x2b8/0x7a8 net/bpf/test_run.c:434 bpf_prog_test_run_skb+0x9b0/0x12ec net/bpf/test_run.c:1099 bpf_prog_test_run+0x2b4/0x33c kernel/bpf/syscall.c:4429 __sys_bpf+0x4b0/0x614 kernel/bpf/syscall.c:5854 __do_sys_bpf kernel/bpf/syscall.c:5943 [inline] __se_sys_bpf kernel/bpf/syscall.c:5941 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5941 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Code: 979284ec f94002c8 9103011a d343ff48 (38746908) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 979284ec bl 0xfffffffffe4a13b0 4: f94002c8 ldr x8, [x22] 8: 9103011a add x26, x8, #0xc0 c: d343ff48 lsr x8, x26, #3 * 10: 38746908 ldrb w8, [x8, x20] <-- trapping instruction