Warning: Permanently added '[localhost]:44471' (ED25519) to the list of known hosts. 1970/01/01 00:03:08 ignoring optional flag "sandboxArg"="0" 1970/01/01 00:03:10 parsed 1 programs [ 191.497163][ T3423] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:03:11 executed programs: 0 [ 194.660063][ T3430] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.677204][ T3430] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 196.037276][ T3430] hsr_slave_0: entered promiscuous mode [ 196.093952][ T3430] hsr_slave_1: entered promiscuous mode [ 197.586692][ T3430] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 197.614041][ T3430] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 197.634907][ T3430] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 197.648594][ T3430] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 198.430221][ T3430] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.070490][ T3430] veth0_vlan: entered promiscuous mode [ 202.137114][ T3430] veth1_vlan: entered promiscuous mode [ 202.258891][ T3430] veth0_macvtap: entered promiscuous mode [ 202.297165][ T3430] veth1_macvtap: entered promiscuous mode [ 202.508486][ T3430] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.509820][ T3430] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.520166][ T3430] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.523267][ T3430] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.063368][ T1805] ================================================================== [ 203.069913][ T1805] BUG: KASAN: invalid-access in __packet_get_status+0xb8/0x138 [ 203.071626][ T1805] Read at addr f1f0000006a88000 by task kworker/1:2/1805 [ 203.072472][ T1805] Pointer tag: [f1], memory tag: [f0] [ 203.073149][ T1805] [ 203.074388][ T1805] CPU: 1 PID: 1805 Comm: kworker/1:2 Not tainted 6.9.0-rc5-syzkaller-ge88c4cfcb7b8 #0 [ 203.075327][ T1805] Hardware name: linux,dummy-virt (DT) [ 203.075897][ T1805] Workqueue: mld mld_ifc_work [ 203.076854][ T1805] Call trace: [ 203.077220][ T1805] dump_backtrace+0x94/0xec [ 203.077702][ T1805] show_stack+0x18/0x24 [ 203.078045][ T1805] dump_stack_lvl+0x78/0x90 [ 203.078369][ T1805] print_report+0x108/0x618 [ 203.078684][ T1805] kasan_report+0x88/0xac [ 203.079041][ T1805] __do_kernel_fault+0x1a0/0x1dc [ 203.079408][ T1805] do_tag_check_fault+0x78/0x8c [ 203.079741][ T1805] do_mem_abort+0x44/0x94 [ 203.080055][ T1805] el1_abort+0x40/0x60 [ 203.080358][ T1805] el1h_64_sync_handler+0xd8/0xe4 [ 203.080767][ T1805] el1h_64_sync+0x64/0x68 [ 203.081150][ T1805] __packet_get_status+0xb8/0x138 [ 203.081604][ T1805] tpacket_rcv+0x2b0/0xbd0 [ 203.082017][ T1805] dev_queue_xmit_nit+0x284/0x2c8 [ 203.082361][ T1805] dev_hard_start_xmit+0x7c/0x118 [ 203.082729][ T1805] __dev_queue_xmit+0x1c0/0xeac [ 203.083165][ T1805] ip6_finish_output2+0x3ac/0x914 [ 203.083616][ T1805] ip6_finish_output+0x228/0x344 [ 203.084052][ T1805] ip6_output+0x74/0x1cc [ 203.084683][ T1805] NF_HOOK.constprop.0+0x50/0xe0 [ 203.085069][ T1805] mld_sendpack+0x204/0x408 [ 203.085705][ T1805] mld_ifc_work+0x1d4/0x478 [ 203.086204][ T1805] process_one_work+0x15c/0x2b4 [ 203.086609][ T1805] worker_thread+0x278/0x388 [ 203.087176][ T1805] kthread+0x114/0x118 [ 203.087609][ T1805] ret_from_fork+0x10/0x20 [ 203.088281][ T1805] [ 203.088669][ T1805] The buggy address belongs to the physical page: [ 203.089238][ T1805] page: refcount:9 mapcount:1 mapping:0000000000000000 index:0x0 pfn:0x46a88 [ 203.090132][ T1805] head: order:3 entire_mapcount:0 nr_pages_mapped:8 pincount:0 [ 203.090658][ T1805] flags: 0x1ffe1c006000040(head|arch_2|arch_3|node=0|zone=0|lastcpupid=0xfff|kasantag=0xe) [ 203.091659][ T1805] page_type: 0x0() [ 203.092470][ T1805] raw: 01ffe1c006000040 0000000000000000 dead000000000122 0000000000000000 [ 203.092948][ T1805] raw: 0000000000000000 0000000000000000 0000000900000000 0000000000000000 [ 203.094141][ T1805] head: 01ffe1c006000040 0000000000000000 dead000000000122 0000000000000000 [ 203.094702][ T1805] head: 0000000000000000 0000000000000000 0000000900000000 0000000000000000 [ 203.095518][ T1805] head: 01ffe1c006000003 ffffc1ffc01aa201 dead000000000122 00000008ffffffff [ 203.096053][ T1805] head: 0000000800000000 0000000000000000 0000000000000000 0000000000000000 [ 203.096931][ T1805] page dumped because: kasan: bad access detected [ 203.097395][ T1805] [ 203.097901][ T1805] Memory state around the buggy address: [ 203.098731][ T1805] fff0000006a87e00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 203.100292][ T1805] fff0000006a87f00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 203.102181][ T1805] >fff0000006a88000: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 203.103154][ T1805] ^ [ 203.104029][ T1805] fff0000006a88100: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 203.105047][ T1805] fff0000006a88200: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 203.106012][ T1805] ================================================================== [ 203.107602][ T1805] Disabling lock debugging due to kernel taint 1970/01/01 00:03:23 executed programs: 1 1970/01/01 00:03:28 executed programs: 10 1970/01/01 00:03:34 executed programs: 21 1970/01/01 00:03:39 executed programs: 32 1970/01/01 00:03:45 executed programs: 43 1970/01/01 00:03:50 executed programs: 54