kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 410 Comm: kworker/0:5 Not tainted 5.4.274-syzkaller-00016-gdd432c37afcd #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Workqueue: events linkwatch_event
RIP: 0010:set_track mm/kasan/common.c:78 [inline]
RIP: 0010:kasan_set_free_info mm/kasan/common.c:345 [inline]
RIP: 0010:__kasan_slab_free+0x21c/0x270 mm/kasan/common.c:487
Code: fa 0f 92 c2 41 84 c3 75 10 20 d1 75 0c 48 ff c3 48 39 de 75 d2 89 f3 eb 02 ff c3 48 89 e7 89 de ba 00 08 00 00 e8 64 37 b4 00 <43> 89 44 25 0c 49 63 be c4 01 00 00 4c 01 ef 4c 89 f6 e8 ad 24 00
RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010292
RAX: 00000000c480016c RBX: 000000000000003c RCX: 770a010b7af82e00
RDX: 00000000000001e0 RSI: 0000000000000246 RDI: 0000000000000000
RBP: ffff8881f6e09ec8 R08: dffffc0000000000 R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffff9cd0
R13: dffffc0000000000 R14: ffffffff8193fcc5 R15: ffff8881d546f1c0
FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b3322a000 CR3: 00000001e74d9000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830
__do_softirq+0x23b/0x6b7 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:373 [inline]
irq_exit+0x195/0x1c0 kernel/softirq.c:413
exiting_irq arch/x86/include/asm/apic.h:538 [inline]
smp_apic_timer_interrupt+0x11a/0x460 arch/x86/kernel/apic/apic.c:1149
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834
RIP: 0010:native_restore_fl arch/x86/include/asm/irqflags.h:41 [inline]
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/irqflags.h:84 [inline]
RIP: 0010:console_unlock+0xa62/0xfa0 kernel/printk/printk.c:2527
Code: 03 84 db 4c 8d ac 24 00 01 00 00 0f 85 13 05 00 00 e8 52 e5 16 00 e8 5d 5f 00 00 48 8b 44 24 20 48 89 44 24 70 ff 74 24 70 9d 99 f7 ff ff e8 34 e5 16 00 48 c7 05 c9 76 9e 05 00 00 00 00 e9
RSP: 0018:ffff8881d466f740 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: 0000000000000246 RBX: 0000000000000000 RCX: ffff8881f0e0ee40
RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001
RBP: ffff8881d466f8f0 R08: dffffc0000000000 R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: dffffc0000000000
R13: ffff8881d466f840 R14: 0000000000000000 R15: ffffffff812eeb30
vprintk_emit+0x1e0/0x3f0 kernel/printk/printk.c:2032
printk+0xd1/0x111 kernel/printk/printk.c:2092
addrconf_notify+0x943/0xe50 net/ipv6/addrconf.c:3636
notifier_call_chain kernel/notifier.c:98 [inline]
__raw_notifier_call_chain kernel/notifier.c:399 [inline]
raw_notifier_call_chain+0x95/0x110 kernel/notifier.c:406
call_netdevice_notifiers_info net/core/dev.c:1670 [inline]
netdev_state_change+0x146/0x1e0 net/core/dev.c:1273
linkwatch_do_dev+0xfc/0x130 net/core/link_watch.c:159
__linkwatch_run_queue+0x4cc/0x7f0 net/core/link_watch.c:205
linkwatch_event+0x48/0x50 net/core/link_watch.c:244
process_one_work+0x765/0xd20 kernel/workqueue.c:2290
worker_thread+0xaef/0x1470 kernel/workqueue.c:2436
kthread+0x2da/0x360 kernel/kthread.c:288
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:354
Modules linked in:
---[ end trace 2c3d9156bc23c900 ]---
RIP: 0010:set_track mm/kasan/common.c:78 [inline]
RIP: 0010:kasan_set_free_info mm/kasan/common.c:345 [inline]
RIP: 0010:__kasan_slab_free+0x21c/0x270 mm/kasan/common.c:487
Code: fa 0f 92 c2 41 84 c3 75 10 20 d1 75 0c 48 ff c3 48 39 de 75 d2 89 f3 eb 02 ff c3 48 89 e7 89 de ba 00 08 00 00 e8 64 37 b4 00 <43> 89 44 25 0c 49 63 be c4 01 00 00 4c 01 ef 4c 89 f6 e8 ad 24 00
RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010292
RAX: 00000000c480016c RBX: 000000000000003c RCX: 770a010b7af82e00
RDX: 00000000000001e0 RSI: 0000000000000246 RDI: 0000000000000000
RBP: ffff8881f6e09ec8 R08: dffffc0000000000 R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffff9cd0
R13: dffffc0000000000 R14: ffffffff8193fcc5 R15: ffff8881d546f1c0
FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b3322a000 CR3: 00000001e74d9000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
----------------
Code disassembly (best guess):
0: fa cli
1: 0f 92 c2 setb %dl
4: 41 84 c3 test %al,%r11b
7: 75 10 jne 0x19
9: 20 d1 and %dl,%cl
b: 75 0c jne 0x19
d: 48 ff c3 inc %rbx
10: 48 39 de cmp %rbx,%rsi
13: 75 d2 jne 0xffffffe7
15: 89 f3 mov %esi,%ebx
17: eb 02 jmp 0x1b
19: ff c3 inc %ebx
1b: 48 89 e7 mov %rsp,%rdi
1e: 89 de mov %ebx,%esi
20: ba 00 08 00 00 mov $0x800,%edx
25: e8 64 37 b4 00 call 0xb4378e
* 2a: 43 89 44 25 0c mov %eax,0xc(%r13,%r12,1) <-- trapping instruction
2f: 49 63 be c4 01 00 00 movslq 0x1c4(%r14),%rdi
36: 4c 01 ef add %r13,%rdi
39: 4c 89 f6 mov %r14,%rsi
3c: e8 .byte 0xe8
3d: ad lods %ds:(%rsi),%eax
3e: 24 00 and $0x0,%al