skbuff: skb_over_panic: text:ffffffff843b7b13 len:56 put:8 head:ffff88815ab3a400 data:ffff88815ab3a450 tail:0x88 end:0x80 dev:ip6gretap1 ------------[ cut here ]------------ kernel BUG at net/core/skbuff.c:110! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 5672 Comm: syz-executor.0 Not tainted 5.10.76-syzkaller-01178-g4944ec82ebb9 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:skb_panic+0x14f/0x160 syzkaller/managers/android-5-10/kernel/net/core/skbuff.c:106 Code: 87 85 48 8b 75 c0 48 8b 55 b8 8b 4d d4 44 8b 45 d0 4c 8b 4d c8 b8 00 00 00 00 53 41 56 41 55 41 54 e8 3c 5d 89 fd 48 83 c4 20 <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 55 48 89 e5 41 RSP: 0018:ffffc900000079d0 EFLAGS: 00010282 RAX: 0000000000000088 RBX: ffff8881132a0000 RCX: 33ac6154fa299900 RDX: 0000000000000502 RSI: 0000000000000502 RDI: 0000000000000000 RBP: ffffc90000007a18 R08: ffffffff81545288 R09: ffffed103ee095d8 R10: ffffed103ee095d8 R11: 0000000000000000 R12: ffff88815ab3a450 R13: 0000000000000088 R14: 0000000000000080 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f6696de2ff8 CR3: 000000000640f000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: skb_over_panic+0x2c/0x30 syzkaller/managers/android-5-10/kernel/net/core/skbuff.c:115 skb_put+0x205/0x210 syzkaller/managers/android-5-10/kernel/net/core/skbuff.c:1877 mld_newpack+0x653/0x9c0 syzkaller/managers/android-5-10/kernel/net/ipv6/mcast.c:1626 add_grhead syzkaller/managers/android-5-10/kernel/net/ipv6/mcast.c:1707 [inline] add_grec+0xf40/0x1370 syzkaller/managers/android-5-10/kernel/net/ipv6/mcast.c:1838 mld_send_cr syzkaller/managers/android-5-10/kernel/net/ipv6/mcast.c:1964 [inline] mld_ifc_timer_expire+0x781/0xc50 syzkaller/managers/android-5-10/kernel/net/ipv6/mcast.c:2471 call_timer_fn+0x35/0x280 syzkaller/managers/android-5-10/kernel/kernel/time/timer.c:1420 expire_timers+0x21f/0x3b0 syzkaller/managers/android-5-10/kernel/kernel/time/timer.c:1465 __run_timers+0x548/0x680 syzkaller/managers/android-5-10/kernel/kernel/time/timer.c:1756 run_timer_softirq+0x69/0xf0 syzkaller/managers/android-5-10/kernel/kernel/time/timer.c:1769 __do_softirq+0x27e/0x598 syzkaller/managers/android-5-10/kernel/kernel/softirq.c:305 asm_call_irq_on_stack+0xf/0x20 __run_on_irqstack syzkaller/managers/android-5-10/kernel/./arch/x86/include/asm/irq_stack.h:26 [inline] run_on_irqstack_cond syzkaller/managers/android-5-10/kernel/./arch/x86/include/asm/irq_stack.h:77 [inline] do_softirq_own_stack+0x60/0x80 syzkaller/managers/android-5-10/kernel/arch/x86/kernel/irq_64.c:77 invoke_softirq syzkaller/managers/android-5-10/kernel/kernel/softirq.c:402 [inline] __irq_exit_rcu+0x128/0x150 syzkaller/managers/android-5-10/kernel/kernel/softirq.c:432 irq_exit_rcu+0x9/0x10 syzkaller/managers/android-5-10/kernel/kernel/softirq.c:444 sysvec_apic_timer_interrupt+0xbf/0xe0 syzkaller/managers/android-5-10/kernel/arch/x86/kernel/apic/apic.c:1095 asm_sysvec_apic_timer_interrupt+0x12/0x20 syzkaller/managers/android-5-10/kernel/./arch/x86/include/asm/idtentry.h:635 RIP: 0010:arch_atomic_dec_and_test syzkaller/managers/android-5-10/kernel/./arch/x86/include/asm/atomic.h:123 [inline] RIP: 0010:atomic_dec_and_test syzkaller/managers/android-5-10/kernel/./include/asm-generic/atomic-instrumented.h:749 [inline] RIP: 0010:page_ref_dec_and_test syzkaller/managers/android-5-10/kernel/./include/linux/page_ref.h:148 [inline] RIP: 0010:put_page_testzero syzkaller/managers/android-5-10/kernel/./include/linux/mm.h:762 [inline] RIP: 0010:release_pages+0x1fd/0xaa0 syzkaller/managers/android-5-10/kernel/mm/swap.c:1043 Code: 78 d9 bf 86 e8 34 e4 13 00 48 8b 05 15 f3 2c 05 4c 39 f0 74 48 49 8d 7e 34 be 04 00 00 00 e8 2a e6 13 00 31 db f0 41 ff 4e 34 <41> 0f 94 c4 e9 f7 07 00 00 44 88 e3 31 ff 89 de e8 7e 14 da ff 84 RSP: 0018:ffffc90002fa7240 EFLAGS: 00000202 RAX: ffffea0004810001 RBX: 0000000000000000 RCX: ffffffff8192e676 RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffea00053ee5f4 RBP: ffffc90002fa7340 R08: dffffc0000000000 R09: fffff94000a7dcbf R10: fffff94000a7dcbf R11: 0000000000000000 R12: dffffc0000000000 R13: ffff888113407f28 R14: ffffea00053ee5c0 R15: 0000000000000000 free_pages_and_swap_cache+0x88/0xa0 syzkaller/managers/android-5-10/kernel/mm/swap_state.c:356 tlb_batch_pages_flush syzkaller/managers/android-5-10/kernel/mm/mmu_gather.c:49 [inline] tlb_flush_mmu_free syzkaller/managers/android-5-10/kernel/mm/mmu_gather.c:242 [inline] tlb_flush_mmu+0x860/0xa00 syzkaller/managers/android-5-10/kernel/mm/mmu_gather.c:249 zap_pte_range syzkaller/managers/android-5-10/kernel/mm/memory.c:1370 [inline] zap_pmd_range syzkaller/managers/android-5-10/kernel/mm/memory.c:1419 [inline] zap_pud_range syzkaller/managers/android-5-10/kernel/mm/memory.c:1448 [inline] zap_p4d_range syzkaller/managers/android-5-10/kernel/mm/memory.c:1469 [inline] unmap_page_range+0x1cf3/0x1f70 syzkaller/managers/android-5-10/kernel/mm/memory.c:1491 unmap_single_vma syzkaller/managers/android-5-10/kernel/mm/memory.c:1537 [inline] unmap_vmas+0x3a4/0x520 syzkaller/managers/android-5-10/kernel/mm/memory.c:1569 exit_mmap+0x2c8/0x570 syzkaller/managers/android-5-10/kernel/mm/mmap.c:3324 __mmput+0x95/0x2c0 syzkaller/managers/android-5-10/kernel/kernel/fork.c:1128 mmput+0x4b/0x50 syzkaller/managers/android-5-10/kernel/kernel/fork.c:1149 exit_mm+0x615/0x7e0 syzkaller/managers/android-5-10/kernel/kernel/exit.c:489 do_exit+0x6c4/0x23a0 syzkaller/managers/android-5-10/kernel/kernel/exit.c:800 do_group_exit+0x16a/0x2d0 syzkaller/managers/android-5-10/kernel/kernel/exit.c:910 get_signal+0x133e/0x1f80 syzkaller/managers/android-5-10/kernel/kernel/signal.c:2790 arch_do_signal+0x8d/0x620 syzkaller/managers/android-5-10/kernel/arch/x86/kernel/signal.c:805 exit_to_user_mode_loop syzkaller/managers/android-5-10/kernel/kernel/entry/common.c:161 [inline] exit_to_user_mode_prepare+0xaa/0xe0 syzkaller/managers/android-5-10/kernel/kernel/entry/common.c:191 syscall_exit_to_user_mode+0x24/0x40 syzkaller/managers/android-5-10/kernel/kernel/entry/common.c:266 do_syscall_64+0x3d/0x70 syzkaller/managers/android-5-10/kernel/arch/x86/entry/common.c:56 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fc53c18da39 Code: Unable to access opcode bytes at RIP 0x7fc53c18da0f. RSP: 002b:00007fc539f04218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007fc53c2a0f68 RCX: 00007fc53c18da39 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fc53c2a0f68 RBP: 00007fc53c2a0f60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc53c2a0f6c R13: 00007ffeb6b78c4f R14: 00007fc539f04300 R15: 0000000000022000 Modules linked in: ---[ end trace 29a5d8cfd06b0feb ]--- RIP: 0010:skb_panic+0x14f/0x160 syzkaller/managers/android-5-10/kernel/net/core/skbuff.c:106 Code: 87 85 48 8b 75 c0 48 8b 55 b8 8b 4d d4 44 8b 45 d0 4c 8b 4d c8 b8 00 00 00 00 53 41 56 41 55 41 54 e8 3c 5d 89 fd 48 83 c4 20 <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 55 48 89 e5 41 RSP: 0018:ffffc900000079d0 EFLAGS: 00010282 RAX: 0000000000000088 RBX: ffff8881132a0000 RCX: 33ac6154fa299900 RDX: 0000000000000502 RSI: 0000000000000502 RDI: 0000000000000000 RBP: ffffc90000007a18 R08: ffffffff81545288 R09: ffffed103ee095d8 R10: ffffed103ee095d8 R11: 0000000000000000 R12: ffff88815ab3a450 R13: 0000000000000088 R14: 0000000000000080 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f6696de2ff8 CR3: 000000000640f000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 78 d9 js 0xffffffdb 2: bf 86 e8 34 e4 mov $0xe434e886,%edi 7: 13 00 adc (%rax),%eax 9: 48 8b 05 15 f3 2c 05 mov 0x52cf315(%rip),%rax # 0x52cf325 10: 4c 39 f0 cmp %r14,%rax 13: 74 48 je 0x5d 15: 49 8d 7e 34 lea 0x34(%r14),%rdi 19: be 04 00 00 00 mov $0x4,%esi 1e: e8 2a e6 13 00 callq 0x13e64d 23: 31 db xor %ebx,%ebx 25: f0 41 ff 4e 34 lock decl 0x34(%r14) * 2a: 41 0f 94 c4 sete %r12b <-- trapping instruction 2e: e9 f7 07 00 00 jmpq 0x82a 33: 44 88 e3 mov %r12b,%bl 36: 31 ff xor %edi,%edi 38: 89 de mov %ebx,%esi 3a: e8 7e 14 da ff callq 0xffda14bd 3f: 84 .byte 0x84