Unable to handle kernel paging request at virtual address dfff800000000013 KASAN: null-ptr-deref in range [0x0000000000000098-0x000000000000009f] Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [dfff800000000013] address between user and kernel address ranges Internal error: Oops: 0000000096000005 [#1] SMP Modules linked in: CPU: 0 UID: 0 PID: 252 Comm: kworker/u8:5 Not tainted 6.15.0-rc2-syzkaller-gc72692105976 #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: ipv6_addrconf addrconf_dad_work pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : rt6_get_pcpu_route net/ipv6/route.c:1445 [inline] pc : ip6_pol_route+0x4d8/0x1314 net/ipv6/route.c:2298 lr : rt6_get_pcpu_route net/ipv6/route.c:1445 [inline] lr : ip6_pol_route+0x4cc/0x1314 net/ipv6/route.c:2298 sp : ffff800080007360 x29: ffff800080007480 x28: ffff800080007430 x27: 1ffff00010000e86 x26: 0000000100000301 x25: 0000000000000001 x24: 0000000000000099 x23: ffff8000800073f8 x22: ffff8000800073f0 x21: ffff700010000e78 x20: 0000000000000000 x19: dfff800000000000 x18: ffff0000e517dbc1 x17: ffff800123873000 x16: ffff8000806ad03c x15: 0000000000000005 x14: 1ffff00010000e18 x13: 0000000000000000 x12: ffff700010000e10 x11: ffff80008a66fa94 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : 0000000000000013 x7 : ffff8000800072d0 x6 : 0000000000000003 x5 : ffff0000e517db40 x4 : 0000000000000000 x3 : 000000000000000f x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000 Call trace: rt6_get_pcpu_route net/ipv6/route.c:1445 [inline] (P) ip6_pol_route+0x4d8/0x1314 net/ipv6/route.c:2298 (P) ip6_pol_route_input+0x74/0x94 net/ipv6/route.c:2322 pol_lookup_func include/net/ip6_fib.h:616 [inline] fib6_rule_lookup+0x1f8/0x510 net/ipv6/fib6_rules.c:120 ip6_route_input_lookup net/ipv6/route.c:2334 [inline] ip6_route_input+0x6b8/0xb34 net/ipv6/route.c:2630 ip6_rcv_finish_core+0x218/0x3c8 net/ipv6/ip6_input.c:66 ip6_rcv_finish+0x120/0x21c net/ipv6/ip6_input.c:77 NF_HOOK+0x328/0x3d4 include/linux/netfilter.h:314 ipv6_rcv+0x9c/0xbc net/ipv6/ip6_input.c:309 __netif_receive_skb_one_core net/core/dev.c:5885 [inline] __netif_receive_skb+0x18c/0x3c8 net/core/dev.c:5998 process_backlog+0x640/0x123c net/core/dev.c:6350 __napi_poll+0xb4/0x3fc net/core/dev.c:7322 napi_poll net/core/dev.c:7386 [inline] net_rx_action+0x6a8/0xf4c net/core/dev.c:7508 handle_softirqs+0x320/0xd34 kernel/softirq.c:579 __do_softirq+0x14/0x20 kernel/softirq.c:613 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:891 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 do_softirq+0x90/0xf8 kernel/softirq.c:480 __local_bh_enable_ip+0x288/0x44c kernel/softirq.c:407 local_bh_enable+0x28/0x34 include/linux/bottom_half.h:33 rcu_read_unlock_bh include/linux/rcupdate.h:910 [inline] __dev_queue_xmit+0x1860/0x35b8 net/core/dev.c:4654 dev_queue_xmit include/linux/netdevice.h:3350 [inline] neigh_hh_output include/net/neighbour.h:523 [inline] neigh_output include/net/neighbour.h:537 [inline] ip6_finish_output2+0x10d4/0x20ac net/ipv6/ip6_output.c:141 __ip6_finish_output net/ipv6/ip6_output.c:-1 [inline] ip6_finish_output+0x428/0x7c4 net/ipv6/ip6_output.c:226 NF_HOOK_COND include/linux/netfilter.h:303 [inline] ip6_output+0x274/0x598 net/ipv6/ip6_output.c:247 dst_output include/net/dst.h:459 [inline] NF_HOOK+0x160/0x4f0 include/linux/netfilter.h:314 mld_sendpack+0x7b8/0x10f8 net/ipv6/mcast.c:1868 mld_send_initial_cr+0x308/0x4b4 net/ipv6/mcast.c:2285 ipv6_mc_dad_complete+0x78/0x460 net/ipv6/mcast.c:2293 addrconf_dad_completed+0x5f0/0xb9c net/ipv6/addrconf.c:4341 addrconf_dad_work+0x9e4/0x1210 net/ipv6/addrconf.c:-1 process_one_work+0x810/0x1638 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x97c/0xf08 kernel/workqueue.c:3400 kthread+0x674/0x7dc kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 Code: 976a51f9 b40009f9 91026338 d343ff08 (38f36908) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 976a51f9 bl 0xfffffffffda947e4 4: b40009f9 cbz x25, 0x140 8: 91026338 add x24, x25, #0x98 c: d343ff08 lsr x8, x24, #3 * 10: 38f36908 ldrsb w8, [x8, x19] <-- trapping instruction