Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp7227928rwr; Wed, 10 May 2023 05:48:34 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4A42GMEHhRllSqVUNiWRFQAdr+hqLY+39pR0TcGdVfv8MLQssmeN0FF/53zQxJaAzjZ0SD X-Received: by 2002:a05:6a00:16ca:b0:643:4d69:efb8 with SMTP id l10-20020a056a0016ca00b006434d69efb8mr27313611pfc.6.1683722914226; Wed, 10 May 2023 05:48:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683722914; cv=none; d=google.com; s=arc-20160816; b=pVk8EycRoL6jGP5wKHuPeuqviNRzWiX8yjKZaJ53xYZEEsYzAq1ey2ofNCS8FUc7A5 PTYukVY54DV9XaibmZwyF37bOZGRobAS9dfIsQ+UbgzXGotgzU61G8hFes8CedG+3/2t PX5u6qYCiHeLoNU8thw8yltc2oGOa0kqABQH2YpwezJeQKhwVTCwcs72LNonpzWrhINJ 8P3cz2ZkXUtAV9KLCrNB2V+RPI8a7Ds564T9qm2auxZrk6DsURC9hBNtU6Lgg/kFmzJB D+uQc41RSR0eDVkmWop8/o051Pe2jSSB0Ry8PvOD+DKKGP22P8gQ8WxUDJ4jypbHw49e c62Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:from:subject:message-id:date:mime-version; bh=PtyEHgMICM4fpwcH4FzG9uK+8/49FVxPeU/+8ghuGA8=; b=VNLjR3rpUPE9S1jdZZS1hVfQ6btWXTtC6Ey9HIn36ONfH/1JF+Ddks6xCUG7OkLYIh MqQlKRvrLaRdFvqxcZLESKZoaUooM15SbmnQn00dIGSGKmnO+iRkfPNzXg/02jq6zC2p HkJB65p+H5JhGFViZZ+vGdnc/2FRpi3y6doYdVTdR6JWJB47/7HD3MXpmOXGBi6ULZbO 1BmtpWhbvbUCf8fol65FXWh0aLEEaNGaqerNbGLkC7DyTp3IuNBH/ijFIUp/LAJuvu0D Y2gpI5mhhaulYNH3OhwiBDOLXBhRA04gAVwUQinC06tVl3RaDd8w39kFZ+8No+5vAxDT Dhgw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v1-20020a637a01000000b0053028c29b4dsi4173691pgc.92.2023.05.10.05.48.22; Wed, 10 May 2023 05:48:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236887AbjEJM3F (ORCPT + 99 others); Wed, 10 May 2023 08:29:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33476 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232073AbjEJM3E (ORCPT ); Wed, 10 May 2023 08:29:04 -0400 Received: from mail-io1-f69.google.com (mail-io1-f69.google.com [209.85.166.69]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C878149CE for ; Wed, 10 May 2023 05:29:01 -0700 (PDT) Received: by mail-io1-f69.google.com with SMTP id ca18e2360f4ac-76371bc5167so1051926239f.1 for ; Wed, 10 May 2023 05:29:01 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683721741; x=1686313741; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=PtyEHgMICM4fpwcH4FzG9uK+8/49FVxPeU/+8ghuGA8=; b=WH0Zy3Z5uXPmW549Th65NdF/Dil/hBmI+TPlQUfVDzH1ABNlZZhaEvJf/poAm0Lhu+ x4usEFWl4Nts/ZB+2hLa2tqwMXS73//JkEYVFcNLFn8rNDX0JrR9V7La5Su145BXshUG gPBlZQctk69nt0zxwJXaiMpGtfNAUL/WWJHBq/IpU+ayNLxPc6ZO2xZAINea27M+A+/4 CPqWP9eZc9UALSVXgj0X3qzx7KeGMJxwe9C64hTvWjhkfkRPd4YJuwK2heQyUKNVflYS Kp3IqNE1waz2hTf8dMoLyyBMI7w3SHe37rvkICILHOh/lHxm3oWTohyig9kF+5mtvq3k aghQ== X-Gm-Message-State: AC+VfDzzhdSxPyf7Biu4+U+JUMK79U+SS5FK4VIEptXfeoEUx9S1l1fw IkBFA932nDSK2AqvZFybOK7AkU+48hr+BlAqhsnO94/GIZvi MIME-Version: 1.0 X-Received: by 2002:a02:860e:0:b0:40f:7382:e4aa with SMTP id e14-20020a02860e000000b0040f7382e4aamr3101580jai.2.1683721741181; Wed, 10 May 2023 05:29:01 -0700 (PDT) Date: Wed, 10 May 2023 05:29:01 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <00000000000048abb105fb5604c1@google.com> Subject: [syzbot] [bpf?] [net?] kernel BUG in pskb_expand_head (2) From: syzbot To: andrii@kernel.org, ast@kernel.org, bpf@vger.kernel.org, daniel@iogearbox.net, davem@davemloft.net, edumazet@google.com, haoluo@google.com, hawk@kernel.org, john.fastabend@gmail.com, jolsa@kernel.org, kpsingh@kernel.org, kuba@kernel.org, linux-kernel@vger.kernel.org, martin.lau@linux.dev, netdev@vger.kernel.org, pabeni@redhat.com, sdf@google.com, song@kernel.org, syzkaller-bugs@googlegroups.com, yhs@fb.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=0.8 required=5.0 tests=BAYES_00,FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2, SORTED_RECIPS,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: ed23734c23d2 Merge tag 'net-6.4-rc1' of git://git.kernel.o.. git tree: net console output: https://syzkaller.appspot.com/x/log.txt?x=10ecc3b0280000 kernel config: https://syzkaller.appspot.com/x/.config?x=87f9126139666d37 dashboard link: https://syzkaller.appspot.com/bug?extid=78bac731178aabdb6307 compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 Unfortunately, I don't have any reproducer for this issue yet. Downloadable assets: disk image: https://storage.googleapis.com/syzbot-assets/d103acfdbd1d/disk-ed23734c.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/4448a632b1df/vmlinux-ed23734c.xz kernel image: https://storage.googleapis.com/syzbot-assets/758a66ebff4f/bzImage-ed23734c.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+78bac731178aabdb6307@syzkaller.appspotmail.com ------------[ cut here ]------------ kernel BUG at net/core/skbuff.c:2047! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 16973 Comm: syz-executor.5 Not tainted 6.3.0-syzkaller-13379-ged23734c23d2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 RIP: 0010:pskb_expand_head+0xc4a/0x1170 net/core/skbuff.c:2047 Code: 8d 75 ff e9 0f fe ff ff e8 b3 20 7c f9 48 c7 c6 40 cb 5d 8b 4c 89 f7 e8 14 a4 b7 f9 0f 0b e8 9d 20 7c f9 0f 0b e8 96 20 7c f9 <0f> 0b e8 8f 20 7c f9 48 89 df e8 87 50 ff ff e9 75 f5 ff ff e8 7d RSP: 0018:ffffc90003797818 EFLAGS: 00010216 RAX: 0000000000001b49 RBX: ffff888015b06870 RCX: ffffc900056ba000 RDX: 0000000000040000 RSI: ffffffff8808244a RDI: 0000000000000005 RBP: 0000000000000002 R08: 0000000000000005 R09: 0000000000000001 R10: 0000000000000002 R11: 1ffff110040ad08a R12: 0000000000000820 R13: dffffc0000000000 R14: ffff888015b06940 R15: 0000000000000000 FS: 00007f4a686bb700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2e124000 CR3: 000000007314b000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: skb_ensure_writable net/core/skbuff.c:6001 [inline] skb_ensure_writable+0x2cb/0x450 net/core/skbuff.c:5993 __bpf_try_make_writable net/core/filter.c:1658 [inline] sk_skb_try_make_writable net/core/filter.c:1881 [inline] ____sk_skb_pull_data net/core/filter.c:1895 [inline] sk_skb_pull_data+0x8b/0xa0 net/core/filter.c:1884 bpf_prog_53daab6e9cefb4fc+0x1a/0x1c bpf_dispatcher_nop_func include/linux/bpf.h:1168 [inline] __bpf_prog_run include/linux/filter.h:600 [inline] bpf_prog_run include/linux/filter.h:607 [inline] bpf_prog_run_pin_on_cpu include/linux/filter.h:624 [inline] sk_psock_verdict_recv+0x36d/0x7a0 net/core/skmsg.c:1201 tcp_read_skb+0x177/0x670 net/ipv4/tcp.c:1773 sk_psock_verdict_data_ready+0xad/0xd0 net/core/skmsg.c:1220 tcp_data_ready+0x10a/0x520 net/ipv4/tcp_input.c:5006 tcp_rcv_established+0x194f/0x1f90 net/ipv4/tcp_input.c:5986 tcp_v4_do_rcv+0x65a/0x9c0 net/ipv4/tcp_ipv4.c:1721 sk_backlog_rcv include/net/sock.h:1113 [inline] __release_sock+0x133/0x3b0 net/core/sock.c:2917 release_sock+0x58/0x1b0 net/core/sock.c:3484 tcp_sendmsg+0x3a/0x50 net/ipv4/tcp.c:1486 inet_sendmsg+0x9d/0xe0 net/ipv4/af_inet.c:825 sock_sendmsg_nosec net/socket.c:724 [inline] sock_sendmsg+0xde/0x190 net/socket.c:747 __sys_sendto+0x23a/0x340 net/socket.c:2144 __do_sys_sendto net/socket.c:2156 [inline] __se_sys_sendto net/socket.c:2152 [inline] __x64_sys_sendto+0xe1/0x1b0 net/socket.c:2152 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f4a6788c169 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f4a686bb168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f4a679abf80 RCX: 00007f4a6788c169 RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 RBP: 00007f4a678e7ca1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff06f0778f R14: 00007f4a686bb300 R15: 0000000000022000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:pskb_expand_head+0xc4a/0x1170 net/core/skbuff.c:2047 Code: 8d 75 ff e9 0f fe ff ff e8 b3 20 7c f9 48 c7 c6 40 cb 5d 8b 4c 89 f7 e8 14 a4 b7 f9 0f 0b e8 9d 20 7c f9 0f 0b e8 96 20 7c f9 <0f> 0b e8 8f 20 7c f9 48 89 df e8 87 50 ff ff e9 75 f5 ff ff e8 7d RSP: 0018:ffffc90003797818 EFLAGS: 00010216 RAX: 0000000000001b49 RBX: ffff888015b06870 RCX: ffffc900056ba000 RDX: 0000000000040000 RSI: ffffffff8808244a RDI: 0000000000000005 RBP: 0000000000000002 R08: 0000000000000005 R09: 0000000000000001 R10: 0000000000000002 R11: 1ffff110040ad08a R12: 0000000000000820 R13: dffffc0000000000 R14: ffff888015b06940 R15: 0000000000000000 FS: 00007f4a686bb700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007feddbf47100 CR3: 000000007314b000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. If the bug is already fixed, let syzbot know by replying with: #syz fix: exact-commit-title If you want to change bug's subsystems, reply with: #syz set subsystems: new-subsystem (See the list of subsystem names on the web dashboard) If the bug is a duplicate of another bug, reply with: #syz dup: exact-subject-of-another-report If you want to undo deduplication, reply with: #syz undup