Warning: Permanently added '[localhost]:1520' (ED25519) to the list of known hosts. 1970/01/01 00:04:04 ignoring optional flag "sandboxArg"="0" 1970/01/01 00:04:07 parsed 1 programs [ 248.377601][ T3394] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:04:08 executed programs: 0 [ 251.954821][ T3400] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 251.978639][ T3400] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.425985][ T3400] hsr_slave_0: entered promiscuous mode [ 253.464673][ T3400] hsr_slave_1: entered promiscuous mode [ 255.084274][ T3400] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 255.159332][ T3400] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 255.247812][ T3400] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 255.310496][ T3400] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 256.789986][ T3400] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.889633][ T3400] veth0_vlan: entered promiscuous mode [ 261.980070][ T3400] veth1_vlan: entered promiscuous mode [ 262.262802][ T3400] veth0_macvtap: entered promiscuous mode [ 262.315271][ T3400] veth1_macvtap: entered promiscuous mode [ 262.566830][ T3400] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.570041][ T3400] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.573908][ T3400] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.575686][ T3400] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.566771][ T8] ================================================================== [ 263.575206][ T8] BUG: KASAN: invalid-access in __packet_get_status+0xb0/0x12c [ 263.577564][ T8] Read at addr f4ff00000dab8380 by task kworker/0:0/8 [ 263.579110][ T8] Pointer tag: [f4], memory tag: [f0] [ 263.580494][ T8] [ 263.581940][ T8] CPU: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.8.0-rc4-syzkaller-g7e90b5c295ec #0 [ 263.582925][ T8] Hardware name: linux,dummy-virt (DT) [ 263.583928][ T8] Workqueue: mld mld_ifc_work [ 263.585794][ T8] Call trace: [ 263.586582][ T8] dump_backtrace+0x94/0xec [ 263.587542][ T8] show_stack+0x18/0x24 [ 263.588339][ T8] dump_stack_lvl+0x48/0x60 [ 263.588920][ T8] print_report+0x108/0x618 [ 263.589687][ T8] kasan_report+0x88/0xac [ 263.590298][ T8] __do_kernel_fault+0x17c/0x1e8 [ 263.590877][ T8] do_tag_check_fault+0x78/0x8c [ 263.592891][ T8] do_mem_abort+0x44/0x94 [ 263.594585][ T8] el1_abort+0x40/0x60 [ 263.596190][ T8] el1h_64_sync_handler+0xd8/0xe4 [ 263.598046][ T8] el1h_64_sync+0x64/0x68 [ 263.598676][ T8] __packet_get_status+0xb0/0x12c [ 263.599358][ T8] __packet_rcv_has_room+0xf8/0x188 [ 263.599927][ T8] tpacket_rcv+0x158/0xbcc [ 263.600519][ T8] dev_queue_xmit_nit+0x27c/0x2c0 [ 263.601190][ T8] dev_hard_start_xmit+0x74/0x110 [ 263.601862][ T8] __dev_queue_xmit+0x1c0/0xe5c [ 263.602491][ T8] ip6_finish_output2+0x3a8/0x904 [ 263.603125][ T8] ip6_finish_output+0x228/0x344 [ 263.603769][ T8] ip6_output+0x74/0x1cc [ 263.604327][ T8] NF_HOOK.constprop.0+0x50/0xe0 [ 263.605153][ T8] mld_sendpack+0x204/0x408 [ 263.605676][ T8] mld_ifc_work+0x1d4/0x470 [ 263.606362][ T8] process_one_work+0x148/0x258 [ 263.606935][ T8] worker_thread+0x2b4/0x3cc [ 263.607486][ T8] kthread+0x114/0x118 [ 263.607960][ T8] ret_from_fork+0x10/0x20 [ 263.608770][ T8] [ 263.609341][ T8] The buggy address belongs to the physical page: [ 263.610206][ T8] page:0000000087df40ee refcount:9 mapcount:1 mapping:0000000000000000 index:0x0 pfn:0x4dab8 [ 263.611496][ T8] head:0000000087df40ee order:3 entire_mapcount:0 nr_pages_mapped:8 pincount:0 [ 263.612319][ T8] flags: 0x1ffc2c006000040(head|arch_2|arch_3|node=0|zone=0|lastcpupid=0x7ff|kasantag=0xb) [ 263.613606][ T8] page_type: 0x0() [ 263.614847][ T8] raw: 01ffc2c006000040 0000000000000000 dead000000000122 0000000000000000 [ 263.615549][ T8] raw: 0000000000000000 0000000000000000 0000000900000000 0000000000000000 [ 263.616572][ T8] page dumped because: kasan: bad access detected [ 263.617239][ T8] [ 263.617614][ T8] Memory state around the buggy address: [ 263.618375][ T8] ffff00000dab8100: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 263.619582][ T8] ffff00000dab8200: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 263.620307][ T8] >ffff00000dab8300: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 263.621127][ T8] ^ [ 263.621947][ T8] ffff00000dab8400: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 263.622554][ T8] ffff00000dab8500: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 263.623296][ T8] ================================================================== [ 263.624813][ T8] Disabling lock debugging due to kernel taint 1970/01/01 00:04:24 executed programs: 1 1970/01/01 00:04:29 executed programs: 7 1970/01/01 00:04:35 executed programs: 15 1970/01/01 00:04:40 executed programs: 23 1970/01/01 00:04:45 executed programs: 30 1970/01/01 00:04:51 executed programs: 38