tipc: Enabled bearer , priority 10 tipc: Enabling of bearer rejected, already enabled Unable to handle kernel paging request at virtual address ffffffffffffffc8 KASAN: maybe wild-memory-access in range [0x0003fffffffffe40-0x0003fffffffffe47] Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001aef6b000 [ffffffffffffffc8] pgd=0000000000000000, p4d=0000000000000000 Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 6558 Comm: syz-executor.0 Not tainted 6.8.0-rc2-syzkaller-g41bccc98fb79 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : memcmp lib/string.c:666 [inline] pc : bcmp+0x7c/0x1c8 lib/string.c:698 lr : tipc_udp_is_known_peer+0xc8/0x1a8 net/tipc/udp_media.c:292 sp : ffff800096f16f60 x29: ffff800096f16f70 x28: ffff700012de2e60 x27: ffff800096f173d0 x26: ffff0000d934d420 x25: ffff800096f17000 x24: dfff800000000000 x23: ffffffffffffffc8 x22: ffff800096f170c0 x21: ffffffffffffffc8 x20: ffff800096f170c0 x19: 0000000000000014 x18: 0000000000000000 x17: 00000000ffff0000 x16: ffff80008052a264 x15: 000000000000000e x14: 0000000000000000 x13: 000000000000000a x12: ffff0000c707bc00 x11: 00000000000000e0 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : 1ffff00012de2e18 x7 : 0000000000000000 x6 : 020000e000000002 x5 : ffff800096f17030 x4 : 0000000000000000 x3 : 0000000000000030 x2 : 0000000000000014 x1 : ffff800096f170c0 x0 : ffffffffffffffcf Call trace: memcmp lib/string.c:666 [inline] bcmp+0x7c/0x1c8 lib/string.c:698 tipc_udp_is_known_peer+0xc8/0x1a8 net/tipc/udp_media.c:292 tipc_udp_nl_bearer_add+0x308/0x48c net/tipc/udp_media.c:646 tipc_nl_bearer_add+0x23c/0x2fc net/tipc/bearer.c:1089 genl_family_rcv_msg_doit net/netlink/genetlink.c:1113 [inline] genl_family_rcv_msg net/netlink/genetlink.c:1193 [inline] genl_rcv_msg+0x874/0xb6c net/netlink/genetlink.c:1208 netlink_rcv_skb+0x214/0x3c4 net/netlink/af_netlink.c:2543 genl_rcv+0x38/0x50 net/netlink/genetlink.c:1217 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline] netlink_unicast+0x65c/0x898 net/netlink/af_netlink.c:1367 netlink_sendmsg+0x83c/0xb20 net/netlink/af_netlink.c:1908 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] ____sys_sendmsg+0x56c/0x840 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [inline] __sys_sendmsg+0x26c/0x33c net/socket.c:2667 __do_sys_sendmsg net/socket.c:2676 [inline] __se_sys_sendmsg net/socket.c:2674 [inline] __arm64_sys_sendmsg+0x80/0x94 net/socket.c:2674 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 Code: 7a481128 5400052a d343fec8 38f86909 (f94002a8) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 7a481128 ccmp w9, w8, #0x8, ne // ne = any 4: 5400052a b.ge 0xa8 // b.tcont 8: d343fec8 lsr x8, x22, #3 c: 38f86909 ldrsb w9, [x8, x24] * 10: f94002a8 ldr x8, [x21] <-- trapping instruction