Unable to handle kernel paging request at virtual address dfff800000000016 KASAN: null-ptr-deref in range [0x00000000000000b0-0x00000000000000b7] Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [dfff800000000016] address between user and kernel address ranges Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 603 Comm: kworker/u8:8 Not tainted 6.10.0-rc7-syzkaller-gc912bf709078 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Workqueue: bat_events batadv_bla_periodic_work pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : arp_create+0x5c/0x79c net/ipv4/arp.c:554 lr : arp_create+0x4c/0x79c net/ipv4/arp.c:550 sp : ffff800099707850 x29: ffff800099707880 x28: dfff800000000000 x27: 0000000000000000 x26: 0000000000000000 x25: ffff800099707a80 x24: ffff0000d1e20478 x23: 1ffff000132e0f24 x22: 0000000000000000 x21: ffff800099707940 x20: 0000000000000000 x19: ffff0000e8622000 x18: 1fffe000367b40bf x17: ffff800124d42000 x16: ffff80008054bde8 x15: ffff7000132e0f28 x14: 1ffff000132e0f28 x13: 0000000000000006 x12: ffffffffffffffff x11: ffff7000132e0f28 x10: 0000000000ff0100 x9 : 0000000000000005 x8 : 0000000000000016 x7 : ffff800099707940 x6 : ffff0000d9643228 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000806 x0 : 00000000000000b4 Call trace: arp_create+0x5c/0x79c net/ipv4/arp.c:554 batadv_bla_send_claim+0x130/0xdf4 net/batman-adv/bridge_loop_avoidance.c:361 batadv_bla_send_announce net/batman-adv/bridge_loop_avoidance.c:675 [inline] batadv_bla_periodic_work+0x4dc/0xa30 net/batman-adv/bridge_loop_avoidance.c:1481 process_one_work+0x79c/0x15b8 kernel/workqueue.c:3248 process_scheduled_works kernel/workqueue.c:3329 [inline] worker_thread+0x938/0xecc kernel/workqueue.c:3409 kthread+0x288/0x310 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 Code: 9102d360 d343fc08 12000809 11000529 (38fc6908) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 9102d360 add x0, x27, #0xb4 4: d343fc08 lsr x8, x0, #3 8: 12000809 and w9, w0, #0x7 c: 11000529 add w9, w9, #0x1 * 10: 38fc6908 ldrsb w8, [x8, x28] <-- trapping instruction