IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
BUG: unable to handle page fault for address: ffff8881d878c498
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 7001067 P4D 7001067 PUD 1e1cd8063 PMD 1ea14f063 PTE 7e597e069b5c1200
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 9 Comm: kworker/u4:1 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Workqueue: events_unbound linkwatch_event
RIP: 0010:fib6_ifup+0xad/0x190 net/ipv6/route.c:4648
Code: 1c 24 74 37 4c 8d a3 98 00 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 4c 89 e7 e8 93 82 da fd <49> 83 3c 24 00 74 14 e8 57 88 ac fd e9 98 00 00 00 e8 4d 88 ac fd
RSP: 0018:ffff8881f5dcf688 EFLAGS: 00010246
RAX: 1ffff1103b0f1893 RBX: ffff8881d878c400 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffff8881f5dcfa20 RDI: ffff8881d878c400
RBP: ffff8881f5dcf6b0 R08: ffff8881f5dc1f80 R09: 0000000000000003
R10: 00000000ffffffff R11: 0000000000000000 R12: ffff8881d878c498
R13: ffff8881f2ae2000 R14: ffff8881f5dcfa20 R15: ffff8881d725b600
FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff8881d878c498 CR3: 00000001d25de000 CR4: 00000000003406a0
DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
fib6_clean_node+0x244/0x520 net/ipv6/ip6_fib.c:2085
fib6_walk_continue+0x4fc/0x700 net/ipv6/ip6_fib.c:2010
fib6_walk+0x151/0x280 net/ipv6/ip6_fib.c:2058
fib6_clean_tree net/ipv6/ip6_fib.c:2138 [inline]
__fib6_clean_all net/ipv6/ip6_fib.c:2154 [inline]
fib6_clean_all+0x174/0x230 net/ipv6/ip6_fib.c:2165
rt6_sync_up+0x11d/0x150 net/ipv6/route.c:4670
addrconf_notify+0xa5c/0xeb0 net/ipv6/addrconf.c:3669
notifier_call_chain kernel/notifier.c:98 [inline]
__raw_notifier_call_chain kernel/notifier.c:399 [inline]
raw_notifier_call_chain+0xa0/0x120 kernel/notifier.c:406
call_netdevice_notifiers_info net/core/dev.c:1670 [inline]
netdev_state_change+0x102/0x1a0 net/core/dev.c:1273
linkwatch_do_dev+0x102/0x140 net/core/link_watch.c:159
__linkwatch_run_queue+0x412/0x7e0 net/core/link_watch.c:205
linkwatch_event+0x4c/0x60 net/core/link_watch.c:244
process_one_work+0x73b/0xcc0 kernel/workqueue.c:2290
worker_thread+0xa5c/0x13b0 kernel/workqueue.c:2436
kthread+0x31e/0x3a0 kernel/kthread.c:288
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:354
Modules linked in:
CR2: ffff8881d878c498
---[ end trace 0e94b777d048db8c ]---
RIP: 0010:fib6_ifup+0xad/0x190 net/ipv6/route.c:4648
Code: 1c 24 74 37 4c 8d a3 98 00 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 4c 89 e7 e8 93 82 da fd <49> 83 3c 24 00 74 14 e8 57 88 ac fd e9 98 00 00 00 e8 4d 88 ac fd
RSP: 0018:ffff8881f5dcf688 EFLAGS: 00010246
RAX: 1ffff1103b0f1893 RBX: ffff8881d878c400 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffff8881f5dcfa20 RDI: ffff8881d878c400
RBP: ffff8881f5dcf6b0 R08: ffff8881f5dc1f80 R09: 0000000000000003
R10: 00000000ffffffff R11: 0000000000000000 R12: ffff8881d878c498
R13: ffff8881f2ae2000 R14: ffff8881f5dcfa20 R15: ffff8881d725b600
FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff8881d878c498 CR3: 00000001d25de000 CR4: 00000000003406a0
DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
----------------
Code disassembly (best guess):
0: 1c 24 sbb $0x24,%al
2: 74 37 je 0x3b
4: 4c 8d a3 98 00 00 00 lea 0x98(%rbx),%r12
b: 4c 89 e0 mov %r12,%rax
e: 48 c1 e8 03 shr $0x3,%rax
12: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx
19: fc ff df
1c: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1)
20: 74 08 je 0x2a
22: 4c 89 e7 mov %r12,%rdi
25: e8 93 82 da fd call 0xfdda82bd
* 2a: 49 83 3c 24 00 cmpq $0x0,(%r12) <-- trapping instruction
2f: 74 14 je 0x45
31: e8 57 88 ac fd call 0xfdac888d
36: e9 98 00 00 00 jmp 0xd3
3b: e8 4d 88 ac fd call 0xfdac888d