skbuff: skb_over_panic: text:ffffffff843292a3 len:76 put:20 head:ffff88814f4b4000 data:ffff88814f4b4040 tail:0x8c end:0x80 dev:ip6gretap0 ------------[ cut here ]------------ kernel BUG at net/core/skbuff.c:110! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 7376 Comm: syz-executor.4 Tainted: G W 5.10.149-syzkaller-01350-g0118fb827bc7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:skb_panic+0x14c/0x150 net/core/skbuff.c:106 Code: c7 00 2d 79 85 48 8b 75 c0 48 8b 55 b8 8b 4d d4 44 8b 45 d0 4c 8b 4d c8 31 c0 53 41 56 41 55 41 54 e8 35 06 d1 00 48 83 c4 20 <0f> 0b 66 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 78 4c RSP: 0018:ffffc90000160b08 EFLAGS: 00010282 RAX: 0000000000000089 RBX: ffff88814eea6000 RCX: 802bbaa95a8c9400 RDX: 0000000000000503 RSI: 0000000000000503 RDI: 0000000000000000 RBP: ffffc90000160b50 R08: ffffffff8153d2f8 R09: ffffed103ee2a5e8 R10: ffffed103ee2a5e8 R11: 1ffff1103ee2a5e7 R12: ffff88814f4b4040 R13: 000000000000008c R14: 0000000000000080 R15: dffffc0000000000 FS: 00007f74e4da2700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2ef22000 CR3: 0000000119c2d000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: skb_over_panic net/core/skbuff.c:115 [inline] skb_put+0x153/0x210 net/core/skbuff.c:1877 add_grhead net/ipv6/mcast.c:1711 [inline] add_grec+0xf73/0x13d0 net/ipv6/mcast.c:1838 mld_send_cr net/ipv6/mcast.c:1964 [inline] mld_ifc_timer_expire+0x781/0xc50 net/ipv6/mcast.c:2471 call_timer_fn+0x35/0x270 kernel/time/timer.c:1420 expire_timers+0x21b/0x3a0 kernel/time/timer.c:1465 __run_timers+0x598/0x6f0 kernel/time/timer.c:1759 run_timer_softirq+0x69/0xf0 kernel/time/timer.c:1772 __do_softirq+0x27e/0x596 kernel/softirq.c:305 asm_call_irq_on_stack+0xf/0x20 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline] do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:402 [inline] __irq_exit_rcu+0x128/0x150 kernel/softirq.c:432 irq_exit_rcu+0x9/0x10 kernel/softirq.c:444 sysvec_apic_timer_interrupt+0xbf/0xe0 arch/x86/kernel/apic/apic.c:1095 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:635 RIP: 0010:__sanitizer_cov_trace_pc+0x46/0x60 kernel/kcov.c:202 Code: ff 00 74 11 f7 c2 00 01 00 00 74 35 83 b9 ac 0a 00 00 00 74 2c 8b 91 88 0a 00 00 83 fa 02 75 21 48 8b 91 90 0a 00 00 48 8b 32 <48> 8d 7e 01 8b 89 8c 0a 00 00 48 39 cf 73 08 48 89 44 f2 08 48 89 RSP: 0018:ffffc90002d27670 EFLAGS: 00000246 RAX: ffffffff818f70bd RBX: 0000000000000004 RCX: ffff88814a780000 RDX: ffffc90003d01000 RSI: 000000000003ffff RDI: 0000000000000040 RBP: ffffc90002d27670 R08: ffffffff818f70af R09: ffffed10208abce1 R10: ffffed10208abce1 R11: 1ffff110208abce0 R12: 1ffff920005a4eea R13: 1ffff920005a4ee9 R14: ffff888165994580 R15: 0000000000000005 xa_entry include/linux/xarray.h:1180 [inline] xas_next_entry include/linux/xarray.h:1639 [inline] next_map_page mm/filemap.c:2956 [inline] filemap_map_pages+0x87d/0xd60 mm/filemap.c:3032 do_fault_around mm/memory.c:4312 [inline] do_read_fault mm/memory.c:4327 [inline] do_fault+0x6b8/0x1030 mm/memory.c:4461 handle_pte_fault+0x4f2/0x9d0 mm/memory.c:4729 __handle_mm_fault mm/memory.c:4884 [inline] handle_mm_fault+0xf22/0x19f0 mm/memory.c:5248 faultin_page mm/gup.c:910 [inline] __get_user_pages+0xb2a/0x11b0 mm/gup.c:1129 populate_vma_page_range mm/gup.c:1462 [inline] __mm_populate+0x374/0x510 mm/gup.c:1510 mm_populate include/linux/mm.h:2762 [inline] vm_mmap_pgoff+0x2a9/0x370 mm/util.c:548 ksys_mmap_pgoff+0xf8/0x1f0 mm/mmap.c:1700 __do_sys_mmap arch/x86/kernel/sys_x86_64.c:95 [inline] __se_sys_mmap arch/x86/kernel/sys_x86_64.c:86 [inline] __x64_sys_mmap+0x103/0x120 arch/x86/kernel/sys_x86_64.c:86 do_syscall_64+0x34/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xc6 RIP: 0033:0x7f74e602e5a9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f74e4da2168 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f74e614ef80 RCX: 00007f74e602e5a9 RDX: 000000000100000b RSI: 0000000000b36000 RDI: 0000000020000000 RBP: 00007f74e60897b0 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000008031 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffed640ed4f R14: 00007f74e4da2300 R15: 0000000000022000 Modules linked in: ---[ end trace 9d2d55ea073633f1 ]--- RIP: 0010:skb_panic+0x14c/0x150 net/core/skbuff.c:106 Code: c7 00 2d 79 85 48 8b 75 c0 48 8b 55 b8 8b 4d d4 44 8b 45 d0 4c 8b 4d c8 31 c0 53 41 56 41 55 41 54 e8 35 06 d1 00 48 83 c4 20 <0f> 0b 66 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 78 4c RSP: 0018:ffffc90000160b08 EFLAGS: 00010282 RAX: 0000000000000089 RBX: ffff88814eea6000 RCX: 802bbaa95a8c9400 RDX: 0000000000000503 RSI: 0000000000000503 RDI: 0000000000000000 RBP: ffffc90000160b50 R08: ffffffff8153d2f8 R09: ffffed103ee2a5e8 R10: ffffed103ee2a5e8 R11: 1ffff1103ee2a5e7 R12: ffff88814f4b4040 R13: 000000000000008c R14: 0000000000000080 R15: dffffc0000000000 FS: 00007f74e4da2700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2ef22000 CR3: 0000000119c2d000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: ff 00 incl (%rax) 2: 74 11 je 0x15 4: f7 c2 00 01 00 00 test $0x100,%edx a: 74 35 je 0x41 c: 83 b9 ac 0a 00 00 00 cmpl $0x0,0xaac(%rcx) 13: 74 2c je 0x41 15: 8b 91 88 0a 00 00 mov 0xa88(%rcx),%edx 1b: 83 fa 02 cmp $0x2,%edx 1e: 75 21 jne 0x41 20: 48 8b 91 90 0a 00 00 mov 0xa90(%rcx),%rdx 27: 48 8b 32 mov (%rdx),%rsi * 2a: 48 8d 7e 01 lea 0x1(%rsi),%rdi <-- trapping instruction 2e: 8b 89 8c 0a 00 00 mov 0xa8c(%rcx),%ecx 34: 48 39 cf cmp %rcx,%rdi 37: 73 08 jae 0x41 39: 48 89 44 f2 08 mov %rax,0x8(%rdx,%rsi,8) 3e: 48 rex.W 3f: 89 .byte 0x89