kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 410 Comm: kworker/0:5 Not tainted 5.4.274-syzkaller-00016-gdd432c37afcd #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Workqueue: events linkwatch_event RIP: 0010:set_track mm/kasan/common.c:78 [inline] RIP: 0010:kasan_set_free_info mm/kasan/common.c:345 [inline] RIP: 0010:__kasan_slab_free+0x21c/0x270 mm/kasan/common.c:487 Code: fa 0f 92 c2 41 84 c3 75 10 20 d1 75 0c 48 ff c3 48 39 de 75 d2 89 f3 eb 02 ff c3 48 89 e7 89 de ba 00 08 00 00 e8 64 37 b4 00 <43> 89 44 25 0c 49 63 be c4 01 00 00 4c 01 ef 4c 89 f6 e8 ad 24 00 RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010292 RAX: 00000000c480016c RBX: 000000000000003c RCX: 770a010b7af82e00 RDX: 00000000000001e0 RSI: 0000000000000246 RDI: 0000000000000000 RBP: ffff8881f6e09ec8 R08: dffffc0000000000 R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffff9cd0 R13: dffffc0000000000 R14: ffffffff8193fcc5 R15: ffff8881d546f1c0 FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b3322a000 CR3: 00000001e74d9000 CR4: 00000000003406b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830 __do_softirq+0x23b/0x6b7 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x195/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:538 [inline] smp_apic_timer_interrupt+0x11a/0x460 arch/x86/kernel/apic/apic.c:1149 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834 RIP: 0010:native_restore_fl arch/x86/include/asm/irqflags.h:41 [inline] RIP: 0010:arch_local_irq_restore arch/x86/include/asm/irqflags.h:84 [inline] RIP: 0010:console_unlock+0xa62/0xfa0 kernel/printk/printk.c:2527 Code: 03 84 db 4c 8d ac 24 00 01 00 00 0f 85 13 05 00 00 e8 52 e5 16 00 e8 5d 5f 00 00 48 8b 44 24 20 48 89 44 24 70 ff 74 24 70 9d 99 f7 ff ff e8 34 e5 16 00 48 c7 05 c9 76 9e 05 00 00 00 00 e9 RSP: 0018:ffff8881d466f740 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000246 RBX: 0000000000000000 RCX: ffff8881f0e0ee40 RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 RBP: ffff8881d466f8f0 R08: dffffc0000000000 R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: dffffc0000000000 R13: ffff8881d466f840 R14: 0000000000000000 R15: ffffffff812eeb30 vprintk_emit+0x1e0/0x3f0 kernel/printk/printk.c:2032 printk+0xd1/0x111 kernel/printk/printk.c:2092 addrconf_notify+0x943/0xe50 net/ipv6/addrconf.c:3636 notifier_call_chain kernel/notifier.c:98 [inline] __raw_notifier_call_chain kernel/notifier.c:399 [inline] raw_notifier_call_chain+0x95/0x110 kernel/notifier.c:406 call_netdevice_notifiers_info net/core/dev.c:1670 [inline] netdev_state_change+0x146/0x1e0 net/core/dev.c:1273 linkwatch_do_dev+0xfc/0x130 net/core/link_watch.c:159 __linkwatch_run_queue+0x4cc/0x7f0 net/core/link_watch.c:205 linkwatch_event+0x48/0x50 net/core/link_watch.c:244 process_one_work+0x765/0xd20 kernel/workqueue.c:2290 worker_thread+0xaef/0x1470 kernel/workqueue.c:2436 kthread+0x2da/0x360 kernel/kthread.c:288 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:354 Modules linked in: ---[ end trace 2c3d9156bc23c900 ]--- RIP: 0010:set_track mm/kasan/common.c:78 [inline] RIP: 0010:kasan_set_free_info mm/kasan/common.c:345 [inline] RIP: 0010:__kasan_slab_free+0x21c/0x270 mm/kasan/common.c:487 Code: fa 0f 92 c2 41 84 c3 75 10 20 d1 75 0c 48 ff c3 48 39 de 75 d2 89 f3 eb 02 ff c3 48 89 e7 89 de ba 00 08 00 00 e8 64 37 b4 00 <43> 89 44 25 0c 49 63 be c4 01 00 00 4c 01 ef 4c 89 f6 e8 ad 24 00 RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010292 RAX: 00000000c480016c RBX: 000000000000003c RCX: 770a010b7af82e00 RDX: 00000000000001e0 RSI: 0000000000000246 RDI: 0000000000000000 RBP: ffff8881f6e09ec8 R08: dffffc0000000000 R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffff9cd0 R13: dffffc0000000000 R14: ffffffff8193fcc5 R15: ffff8881d546f1c0 FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b3322a000 CR3: 00000001e74d9000 CR4: 00000000003406b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 ---------------- Code disassembly (best guess): 0: fa cli 1: 0f 92 c2 setb %dl 4: 41 84 c3 test %al,%r11b 7: 75 10 jne 0x19 9: 20 d1 and %dl,%cl b: 75 0c jne 0x19 d: 48 ff c3 inc %rbx 10: 48 39 de cmp %rbx,%rsi 13: 75 d2 jne 0xffffffe7 15: 89 f3 mov %esi,%ebx 17: eb 02 jmp 0x1b 19: ff c3 inc %ebx 1b: 48 89 e7 mov %rsp,%rdi 1e: 89 de mov %ebx,%esi 20: ba 00 08 00 00 mov $0x800,%edx 25: e8 64 37 b4 00 call 0xb4378e * 2a: 43 89 44 25 0c mov %eax,0xc(%r13,%r12,1) <-- trapping instruction 2f: 49 63 be c4 01 00 00 movslq 0x1c4(%r14),%rdi 36: 4c 01 ef add %r13,%rdi 39: 4c 89 f6 mov %r14,%rsi 3c: e8 .byte 0xe8 3d: ad lods %ds:(%rsi),%eax 3e: 24 00 and $0x0,%al