Warning: Permanently added '[localhost]:58760' (ED25519) to the list of known hosts. 1970/01/01 00:04:03 ignoring optional flag "sandboxArg"="0" 1970/01/01 00:04:06 parsed 1 programs [ 260.238794][ T3439] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:04:20 executed programs: 0 [ 264.515597][ T3446] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 264.535299][ T3446] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.444501][ T3446] hsr_slave_0: entered promiscuous mode [ 266.453224][ T3446] hsr_slave_1: entered promiscuous mode [ 268.026856][ T3446] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 268.059591][ T3446] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 268.091762][ T3446] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 268.123315][ T3446] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 269.240695][ T3446] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.435817][ T3446] veth0_vlan: entered promiscuous mode [ 274.486708][ T3446] veth1_vlan: entered promiscuous mode [ 274.592242][ T3446] veth0_macvtap: entered promiscuous mode [ 274.611997][ T3446] veth1_macvtap: entered promiscuous mode [ 274.817879][ T3446] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.819341][ T3446] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.820562][ T3446] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.821708][ T3446] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.306042][ T8] ================================================================== [ 275.311146][ T8] BUG: KASAN: invalid-access in __packet_get_status+0xb8/0x138 [ 275.312402][ T8] Read at addr fcf0000014480000 by task kworker/0:0/8 [ 275.312925][ T8] Pointer tag: [fc], memory tag: [f0] [ 275.313245][ T8] [ 275.314176][ T8] CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-rc7-syzkaller-g77f587896757 #0 [ 275.314825][ T8] Hardware name: linux,dummy-virt (DT) [ 275.316281][ T8] Workqueue: mld mld_ifc_work [ 275.317782][ T8] Call trace: [ 275.318167][ T8] dump_backtrace+0x94/0xec [ 275.318675][ T8] show_stack+0x18/0x24 [ 275.319114][ T8] dump_stack_lvl+0x78/0x90 [ 275.319470][ T8] print_report+0x108/0x618 [ 275.319784][ T8] kasan_report+0x88/0xac [ 275.320093][ T8] __do_kernel_fault+0x170/0x1c8 [ 275.320426][ T8] do_tag_check_fault+0x78/0x8c [ 275.320782][ T8] do_mem_abort+0x44/0x94 [ 275.321091][ T8] el1_abort+0x40/0x60 [ 275.321396][ T8] el1h_64_sync_handler+0xd8/0xe4 [ 275.321721][ T8] el1h_64_sync+0x64/0x68 [ 275.322036][ T8] __packet_get_status+0xb8/0x138 [ 275.322364][ T8] tpacket_rcv+0x2b8/0xc58 [ 275.322670][ T8] dev_queue_xmit_nit+0x284/0x2cc [ 275.323015][ T8] dev_hard_start_xmit+0x78/0x114 [ 275.323350][ T8] __dev_queue_xmit+0x1b4/0xf48 [ 275.323797][ T8] ip6_finish_output2+0x3b4/0x904 [ 275.324198][ T8] ip6_finish_output+0x22c/0x34c [ 275.324525][ T8] ip6_output+0x78/0x1cc [ 275.324842][ T8] NF_HOOK.constprop.0+0x50/0xe0 [ 275.325171][ T8] mld_sendpack+0x204/0x40c [ 275.325483][ T8] mld_ifc_work+0x1d4/0x47c [ 275.325794][ T8] process_one_work+0x15c/0x29c [ 275.326119][ T8] worker_thread+0x248/0x350 [ 275.326498][ T8] kthread+0x114/0x118 [ 275.326799][ T8] ret_from_fork+0x10/0x20 [ 275.327324][ T8] [ 275.327700][ T8] The buggy address belongs to the physical page: [ 275.328209][ T8] page: refcount:9 mapcount:1 mapping:0000000000000000 index:0x0 pfn:0x54480 [ 275.328895][ T8] head: order:3 mapcount:8 entire_mapcount:0 nr_pages_mapped:8 pincount:0 [ 275.329486][ T8] flags: 0x1ffc0c003000040(head|arch_2|arch_3|node=0|zone=0|lastcpupid=0x7ff|kasantag=0x3) [ 275.330703][ T8] raw: 01ffc0c003000040 0000000000000000 dead000000000122 0000000000000000 [ 275.331239][ T8] raw: 0000000000000000 0000000000000000 0000000900000000 0000000000000000 [ 275.331722][ T8] head: 01ffc0c003000040 0000000000000000 dead000000000122 0000000000000000 [ 275.332153][ T8] head: 0000000000000000 0000000000000000 0000000900000000 0000000000000000 [ 275.332579][ T8] head: 01ffc0c003000003 ffffc1ffc0512001 ffffffff00000007 0000000000000008 [ 275.332998][ T8] head: 0000000000000008 0000000000000000 0000000000000000 0000000000000000 [ 275.333441][ T8] page dumped because: kasan: bad access detected [ 275.333967][ T8] [ 275.334211][ T8] Memory state around the buggy address: [ 275.334753][ T8] fff000001447fe00: f1 f1 f1 f1 f1 f1 f1 f1 f1 f1 f1 f1 f1 f1 f1 f1 [ 275.335488][ T8] fff000001447ff00: f1 f1 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 275.336237][ T8] >fff0000014480000: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 275.337460][ T8] ^ [ 275.338219][ T8] fff0000014480100: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 275.339067][ T8] fff0000014480200: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 [ 275.340006][ T8] ================================================================== [ 275.341394][ T8] Disabling lock debugging due to kernel taint 1970/01/01 00:04:35 executed programs: 1 1970/01/01 00:04:40 executed programs: 8 1970/01/01 00:04:45 executed programs: 19 1970/01/01 00:04:51 executed programs: 29 1970/01/01 00:04:56 executed programs: 40 1970/01/01 00:05:01 executed programs: 52