------------[ cut here ]------------ WARNING: CPU: 1 PID: 8739 at include/linux/skbuff.h:2641 pskb_may_pull include/linux/skbuff.h:2641 [inline] WARNING: CPU: 1 PID: 8739 at include/linux/skbuff.h:2641 skb_ensure_writable+0x26c/0x3a8 net/core/skbuff.c:5768 Modules linked in: CPU: 1 PID: 8739 Comm: syz-executor.0 Not tainted 6.1.89-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 pstate: 80401005 (Nzcv daif +PAN -UAO -TCO -DIT +SSBS BTYPE=--) pc : pskb_may_pull include/linux/skbuff.h:2641 [inline] pc : skb_ensure_writable+0x26c/0x3a8 net/core/skbuff.c:5768 lr : pskb_may_pull include/linux/skbuff.h:2641 [inline] lr : skb_ensure_writable+0x26c/0x3a8 net/core/skbuff.c:5768 sp : ffff80001eff76c0 x29: ffff80001eff76c0 x28: 0000000000000001 x27: ffff80001eff7768 x26: 0000000000000000 x25: ffff80001eff7770 x24: 1ffff00003c06e06 x23: 1ffff00003dfef1c x22: dfff800000000000 x21: dfff800000000000 x20: 0000000080000000 x19: ffff0000ec3dba00 x18: 0000000000000000 x17: 0000000000000000 x16: ffff8000084fae94 x15: 0000000000000002 x14: 1ffff00002b0a0b0 x13: dfff800000000000 x12: 0000000000040000 x11: 000000000000077d x10: ffff80001e049000 x9 : ffff80001040a4d0 x8 : 000000000000077e x7 : ffff80000840677c x6 : 0000000000000000 x5 : 0000000000000080 x4 : 0000000000000001 x3 : 0000000000000000 x2 : ffff80001eff75e0 x1 : 0000000080000000 x0 : 0000000000000000 Call trace: pskb_may_pull include/linux/skbuff.h:2641 [inline] skb_ensure_writable+0x26c/0x3a8 net/core/skbuff.c:5768 __bpf_try_make_writable net/core/filter.c:1658 [inline] bpf_try_make_writable net/core/filter.c:1664 [inline] ____bpf_skb_pull_data net/core/filter.c:1844 [inline] bpf_skb_pull_data+0x80/0x210 net/core/filter.c:1833 bpf_prog_ae7213afad14896d+0x54/0xc0 bpf_dispatcher_nop_func include/linux/bpf.h:989 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] bpf_test_run+0x370/0x870 net/bpf/test_run.c:402 bpf_prog_test_run_skb+0x8d8/0x1094 net/bpf/test_run.c:1180 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:3670 __sys_bpf+0x390/0x654 kernel/bpf/syscall.c:5023 __do_sys_bpf kernel/bpf/syscall.c:5109 [inline] __se_sys_bpf kernel/bpf/syscall.c:5107 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5107 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 irq event stamp: 1160 hardirqs last enabled at (1159): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:84 [inline] hardirqs last enabled at (1159): [] exit_to_kernel_mode+0xe8/0x118 arch/arm64/kernel/entry-common.c:94 hardirqs last disabled at (1160): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 softirqs last enabled at (1158): [] softirq_handle_end kernel/softirq.c:414 [inline] softirqs last enabled at (1158): [] __do_softirq+0xc1c/0xe38 kernel/softirq.c:600 softirqs last disabled at (1101): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80 ---[ end trace 0000000000000000 ]---