Warning: Permanently added '[localhost]:22550' (ED25519) to the list of known hosts. 1970/01/01 00:04:02 ignoring optional flag "sandboxArg"="0" 1970/01/01 00:04:04 parsed 1 programs 1970/01/01 00:04:05 executed programs: 0 [ 248.876358][ T3378] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 248.894773][ T3378] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 250.381910][ T3378] hsr_slave_0: entered promiscuous mode [ 250.422288][ T3378] hsr_slave_1: entered promiscuous mode [ 252.372623][ T3378] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 252.485206][ T3378] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 252.561034][ T3378] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 252.618226][ T3378] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 253.955799][ T3378] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.824828][ T3378] veth0_vlan: entered promiscuous mode [ 258.898652][ T3378] veth1_vlan: entered promiscuous mode [ 259.153276][ T3378] veth0_macvtap: entered promiscuous mode [ 259.201878][ T3378] veth1_macvtap: entered promiscuous mode [ 259.437121][ T3378] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 259.438388][ T3378] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 259.442428][ T3378] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 259.443777][ T3378] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.368062][ T8] ================================================================== [ 260.374897][ T8] BUG: KASAN: invalid-access in __packet_get_status+0xb0/0x12c [ 260.376468][ T8] Read at addr f6ff00000d780a80 by task kworker/0:0/8 [ 260.377093][ T8] Pointer tag: [f6], memory tag: [f0] [ 260.377594][ T8] [ 260.378690][ T8] CPU: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.7.0-syzkaller-g0dd3ee311255 #0 [ 260.379943][ T8] Hardware name: linux,dummy-virt (DT) [ 260.380855][ T8] Workqueue: ipv6_addrconf addrconf_dad_work [ 260.382200][ T8] Call trace: [ 260.382725][ T8] dump_backtrace+0x94/0xec [ 260.383229][ T8] show_stack+0x18/0x24 [ 260.383600][ T8] dump_stack_lvl+0x48/0x60 [ 260.384277][ T8] print_report+0x108/0x618 [ 260.384617][ T8] kasan_report+0x88/0xac [ 260.384909][ T8] __do_kernel_fault+0x17c/0x1e8 [ 260.385215][ T8] do_tag_check_fault+0x78/0x8c [ 260.385522][ T8] do_mem_abort+0x44/0x94 [ 260.385899][ T8] el1_abort+0x40/0x60 [ 260.386313][ T8] el1h_64_sync_handler+0xd8/0xe4 [ 260.386701][ T8] el1h_64_sync+0x64/0x68 [ 260.387107][ T8] __packet_get_status+0xb0/0x12c [ 260.387427][ T8] __packet_rcv_has_room+0xf8/0x188 [ 260.387759][ T8] tpacket_rcv+0x144/0xc04 [ 260.388244][ T8] dev_queue_xmit_nit+0x27c/0x2c0 [ 260.388750][ T8] dev_hard_start_xmit+0x74/0x110 [ 260.389155][ T8] __dev_queue_xmit+0x1c0/0xe54 [ 260.389482][ T8] ip6_finish_output2+0x3a8/0x904 [ 260.389864][ T8] ip6_finish_output+0x228/0x344 [ 260.390320][ T8] ip6_output+0x74/0x1cc [ 260.390679][ T8] NF_HOOK.constprop.0+0x50/0xe0 [ 260.391019][ T8] mld_sendpack+0x204/0x408 [ 260.391451][ T8] mld_send_initial_cr.part.0.isra.0+0x5c/0x70 [ 260.391890][ T8] ipv6_mc_dad_complete+0x5c/0x10c [ 260.392420][ T8] addrconf_dad_completed+0x338/0x3a4 [ 260.392882][ T8] addrconf_dad_work+0x280/0x590 [ 260.393240][ T8] process_one_work+0x148/0x258 [ 260.393628][ T8] worker_thread+0x2b4/0x3cc [ 260.394198][ T8] kthread+0x114/0x118 [ 260.394696][ T8] ret_from_fork+0x10/0x20 [ 260.395378][ T8] [ 260.395758][ T8] The buggy address belongs to the physical page: [ 260.396497][ T8] page:000000009337d281 refcount:9 mapcount:1 mapping:0000000000000000 index:0x0 pfn:0x4d780 [ 260.397349][ T8] head:000000009337d281 order:3 entire_mapcount:0 nr_pages_mapped:8 pincount:0 [ 260.397919][ T8] flags: 0x1ffc24006000040(head|arch_2|arch_3|node=0|zone=0|lastcpupid=0x7ff|kasantag=0x9) [ 260.399153][ T8] page_type: 0x0() [ 260.400686][ T8] raw: 01ffc24006000040 0000000000000000 dead000000000122 0000000000000000 [ 260.401465][ T8] raw: 0000000000000000 0000000000000000 0000000900000000 0000000000000000 [ 260.402745][ T8] page dumped because: kasan: bad access detected [ 260.403506][ T8] [ 260.403905][ T8] Memory state around the buggy address: [ 260.404972][ T8] ffff00000d780800: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 260.405524][ T8] ffff00000d780900: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 260.405983][ T8] >ffff00000d780a00: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 260.406629][ T8] ^ [ 260.407232][ T8] ffff00000d780b00: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 260.407595][ T8] ffff00000d780c00: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 260.408024][ T8] ================================================================== [ 260.409316][ T8] Disabling lock debugging due to kernel taint 1970/01/01 00:04:20 executed programs: 1 1970/01/01 00:04:26 executed programs: 7 1970/01/01 00:04:31 executed programs: 14 1970/01/01 00:04:37 executed programs: 22 1970/01/01 00:04:42 executed programs: 29 1970/01/01 00:04:47 executed programs: 36