kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 8871 Comm: syz-executor1 Not tainted 4.19.0-rc4-next-20180918+ #74 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:dev_net include/linux/netdevice.h:2165 [inline] RIP: 0010:__skb_flow_dissect+0x3b5/0x5980 net/core/flow_dissector.c:758 Code: 48 c1 ea 03 80 3c 02 00 0f 85 a6 4d 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 77 10 49 8d be 80 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5c 4d 00 00 4d 8b b6 80 05 00 00 48 b8 00 00 00 RSP: 0018:ffff8801bffc6d90 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffff8801bffc7160 RCX: ffffc90002248000 RDX: 00000000000000b0 RSI: ffffffff861227d8 RDI: 0000000000000580 RBP: ffff8801bffc74f0 R08: ffff8801d23843c0 R09: ffffed003b5a5b57 R10: ffffed003b5a5b57 R11: ffff8801dad2dabb R12: ffffffff8a5202a4 R13: ffffffff8a5202a6 R14: 0000000000000000 R15: ffff8801d3025440 FS: 00007f066246f700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b3012b000 CR3: 00000001ba5c8000 CR4: 00000000001406f0 DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: skb_flow_dissect_flow_keys_basic include/linux/skbuff.h:1232 [inline] skb_get_poff+0x9b/0x1c0 net/core/flow_dissector.c:1486 ____bpf_skb_get_pay_offset net/core/filter.c:126 [inline] bpf_skb_get_pay_offset+0x15/0x20 net/core/filter.c:124 Modules linked in: kobject: 'loop3' (000000001a76e08e): kobject_uevent_env kobject: 'loop3' (000000001a76e08e): fill_kobj_path: path = '/devices/virtual/block/loop3' ---[ end trace 9dd97e7dabe0f847 ]--- RIP: 0010:dev_net include/linux/netdevice.h:2165 [inline] RIP: 0010:__skb_flow_dissect+0x3b5/0x5980 net/core/flow_dissector.c:758 kobject: 'loop4' (000000004edf4d9c): kobject_uevent_env Code: 48 c1 ea 03 80 3c 02 00 0f 85 a6 4d 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 77 10 49 8d be 80 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5c 4d 00 00 4d 8b b6 80 05 00 00 48 b8 00 00 00 kobject: 'loop4' (000000004edf4d9c): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (00000000a530a7ac): kobject_uevent_env RSP: 0018:ffff8801bffc6d90 EFLAGS: 00010202 kobject: 'loop2' (00000000a530a7ac): fill_kobj_path: path = '/devices/virtual/block/loop2' RAX: dffffc0000000000 RBX: ffff8801bffc7160 RCX: ffffc90002248000 RDX: 00000000000000b0 RSI: ffffffff861227d8 RDI: 0000000000000580 kobject: 'loop0' (00000000c4c94ee8): kobject_uevent_env syz-executor5 uses obsolete (PF_INET,SOCK_PACKET) kobject: 'loop0' (00000000c4c94ee8): fill_kobj_path: path = '/devices/virtual/block/loop0' kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access kobject: 'loop5' (000000003706c68d): kobject_uevent_env kobject: 'loop5' (000000003706c68d): fill_kobj_path: path = '/devices/virtual/block/loop5' RBP: ffff8801bffc74f0 R08: ffff8801d23843c0 R09: ffffed003b5a5b57 general protection fault: 0000 [#2] PREEMPT SMP KASAN CPU: 1 PID: 8885 Comm: syz-executor1 Tainted: G D 4.19.0-rc4-next-20180918+ #74 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:dev_net include/linux/netdevice.h:2165 [inline] RIP: 0010:__skb_flow_dissect+0x3b5/0x5980 net/core/flow_dissector.c:758 Code: 48 c1 ea 03 80 3c 02 00 0f 85 a6 4d 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 77 10 49 8d be 80 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5c 4d 00 00 4d 8b b6 80 05 00 00 48 b8 00 00 00 RSP: 0018:ffff8801685fed90 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffff8801685ff160 RCX: ffffc90003250000 RDX: 00000000000000b0 RSI: ffffffff861227d8 RDI: 0000000000000580 RBP: ffff8801685ff4f0 R08: ffff880167d44340 R09: 0000000000000000 R10: ffff8801685ff508 R11: 0000000000000000 R12: ffffffff8a5202a4 R13: ffffffff8a5202a6 R14: 0000000000000000 R15: ffff8801d7555180 FS: 00007f066242d700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000001fd57d0 CR3: 00000001ba5c8000 CR4: 00000000001406e0 DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: skb_flow_dissect_flow_keys_basic include/linux/skbuff.h:1232 [inline] skb_get_poff+0x9b/0x1c0 net/core/flow_dissector.c:1486 ____bpf_skb_get_pay_offset net/core/filter.c:126 [inline] bpf_skb_get_pay_offset+0x15/0x20 net/core/filter.c:124 kobject: 'loop3' (000000001a76e08e): kobject_uevent_env kobject: 'loop3' (000000001a76e08e): fill_kobj_path: path = '/devices/virtual/block/loop3' Modules linked in: R10: ffffed003b5a5b57 R11: ffff8801dad2dabb R12: ffffffff8a5202a4 R13: ffffffff8a5202a6 R14: 0000000000000000 R15: ffff8801d3025440 FS: 00007f066246f700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 kobject: 'loop4' (000000004edf4d9c): kobject_uevent_env CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 kobject: 'loop4' (000000004edf4d9c): fill_kobj_path: path = '/devices/virtual/block/loop4' CR2: 00007fefa2261518 CR3: 00000001ba5c8000 CR4: 00000000001406f0 kobject: 'loop0' (00000000c4c94ee8): kobject_uevent_env kobject: 'loop0' (00000000c4c94ee8): fill_kobj_path: path = '/devices/virtual/block/loop0' DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400