kernel BUG in __skb_gso_segment

21 views
Skip to first unread message

syzbot

unread,
Dec 14, 2022, 4:43:37 PM12/14/22
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: a76dfbc99260 BACKPORT: Kconfig.debug: provide a little ext..
git tree: android12-5.4
console+strace: https://syzkaller.appspot.com/x/log.txt?x=131c099d880000
kernel config: https://syzkaller.appspot.com/x/.config?x=c29947a309dbd4d3
dashboard link: https://syzkaller.appspot.com/bug?extid=175ad8c5fd8cde4ddba2
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=14a7ded0480000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=17462ab7880000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/29de6b788caa/disk-a76dfbc9.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/caad57ca2155/vmlinux-a76dfbc9.xz
kernel image: https://storage.googleapis.com/syzbot-assets/be050c385fa6/bzImage-a76dfbc9.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+175ad8...@syzkaller.appspotmail.com

------------[ cut here ]------------
kernel BUG at include/linux/skbuff.h:2309!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 305 Comm: syz-executor185 Not tainted 5.4.219-syzkaller-00097-ga76dfbc99260 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:__skb_pull include/linux/skbuff.h:2309 [inline]
RIP: 0010:skb_mac_gso_segment+0x48a/0x490 net/core/dev.c:2961
Code: 4c 24 08 80 e1 07 80 c1 03 38 c1 0f 8c d3 fe ff ff 48 8b 7c 24 08 e8 55 de 1d fe e9 c4 fe ff ff e8 4b 52 c6 fd e8 16 78 ef fd <0f> 0b 0f 1f 40 00 55 41 57 41 56 41 55 41 54 53 48 83 ec 28 89 d3
RSP: 0018:ffff8881dcfb7520 EFLAGS: 00010293
RAX: ffffffff8375d30a RBX: 0000000000000012 RCX: ffff8881de590fc0
RDX: 0000000000000000 RSI: 000000000000fcd3 RDI: 000000000000fccf
RBP: ffff8881dcfb75f0 R08: ffffffff8375cfc0 R09: ffffffff8375cc05
R10: ffff8881de590fc0 R11: 0000000000000002 R12: dffffc0000000000
R13: 000000000000b9c6 R14: 000000000000fccf R15: 000000000000fcd3
FS: 0000555556e8e300(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002000f000 CR3: 00000001dcc57000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__skb_gso_segment+0x303/0x4a0 net/core/dev.c:3039
skb_gso_segment include/linux/netdevice.h:4469 [inline]
validate_xmit_skb+0x2eb/0xc80 net/core/dev.c:3279
__dev_queue_xmit+0x1182/0x2a20 net/core/dev.c:3782
packet_snd net/packet/af_packet.c:2995 [inline]
packet_sendmsg+0x4cef/0x67d0 net/packet/af_packet.c:3024
sock_sendmsg_nosec net/socket.c:638 [inline]
sock_sendmsg net/socket.c:658 [inline]
__sys_sendto+0x4f1/0x6c0 net/socket.c:1942
__do_sys_sendto net/socket.c:1954 [inline]
__se_sys_sendto net/socket.c:1950 [inline]
__x64_sys_sendto+0xda/0xf0 net/socket.c:1950
do_syscall_64+0xcb/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
Modules linked in:
---[ end trace 23640b0c0c5386e2 ]---
RIP: 0010:__skb_pull include/linux/skbuff.h:2309 [inline]
RIP: 0010:skb_mac_gso_segment+0x48a/0x490 net/core/dev.c:2961
Code: 4c 24 08 80 e1 07 80 c1 03 38 c1 0f 8c d3 fe ff ff 48 8b 7c 24 08 e8 55 de 1d fe e9 c4 fe ff ff e8 4b 52 c6 fd e8 16 78 ef fd <0f> 0b 0f 1f 40 00 55 41 57 41 56 41 55 41 54 53 48 83 ec 28 89 d3
RSP: 0018:ffff8881dcfb7520 EFLAGS: 00010293
RAX: ffffffff8375d30a RBX: 0000000000000012 RCX: ffff8881de590fc0
RDX: 0000000000000000 RSI: 000000000000fcd3 RDI: 000000000000fccf
RBP: ffff8881dcfb75f0 R08: ffffffff8375cfc0 R09: ffffffff8375cc05
R10: ffff8881de590fc0 R11: 0000000000000002 R12: dffffc0000000000
R13: 000000000000b9c6 R14: 000000000000fccf R15: 000000000000fcd3
FS: 0000555556e8e300(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002000f000 CR3: 00000001dcc57000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches

syzbot

unread,
Dec 14, 2022, 5:03:35 PM12/14/22
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: d31626cbea61 ANDROID: usb: gadget: uvc: remove duplicate c..
git tree: android12-5.10-lts
console+strace: https://syzkaller.appspot.com/x/log.txt?x=14e02800480000
kernel config: https://syzkaller.appspot.com/x/.config?x=afe70ec5cca1502e
dashboard link: https://syzkaller.appspot.com/bug?extid=02d69c48ffd9bdd1734a
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=14e3533b880000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=10dec23f880000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/85a7b7e05e7d/disk-d31626cb.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/e205f2b9d901/vmlinux-d31626cb.xz
kernel image: https://storage.googleapis.com/syzbot-assets/d336cf771acd/bzImage-d31626cb.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+02d69c...@syzkaller.appspotmail.com

------------[ cut here ]------------
kernel BUG at include/linux/skbuff.h:2343!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 384 Comm: syz-executor393 Not tainted 5.10.158-syzkaller-01202-gd31626cbea61 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:__skb_pull include/linux/skbuff.h:2343 [inline]
RIP: 0010:skb_mac_gso_segment+0x498/0x4a0 net/core/dev.c:3345
Code: 4c 24 10 80 e1 07 80 c1 03 38 c1 0f 8c c6 fe ff ff 48 8b 7c 24 10 e8 87 29 e2 fd e9 b7 fe ff ff e8 3d 42 ce 00 e8 68 28 a8 fd <0f> 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48
RSP: 0018:ffffc900009bf520 EFLAGS: 00010293
RAX: ffffffff83c4f928 RBX: 000000000000fcd3 RCX: ffff8881067f62c0
RDX: 0000000000000000 RSI: 000000000000fcd3 RDI: 000000000000fccf
RBP: ffffc900009bf5e8 R08: ffffffff83c4f5d8 R09: ffffffff83c4f215
R10: 0000000000000002 R11: ffff8881067f62c0 R12: ffff88810c3d96b4
R13: 000000000000b9c6 R14: 0000000000000012 R15: 000000000000fccf
FS: 0000555555d96300(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002000f000 CR3: 00000001047bc000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__skb_gso_segment+0x31b/0x4b0 net/core/dev.c:3423
skb_gso_segment include/linux/netdevice.h:4789 [inline]
validate_xmit_skb+0x2eb/0xc80 net/core/dev.c:3663
__dev_queue_xmit+0x1231/0x2a20 net/core/dev.c:4167
dev_queue_xmit+0x17/0x20 net/core/dev.c:4209
packet_snd net/packet/af_packet.c:3021 [inline]
packet_sendmsg+0x4d32/0x6860 net/packet/af_packet.c:3053
sock_sendmsg_nosec net/socket.c:652 [inline]
sock_sendmsg net/socket.c:672 [inline]
__sys_sendto+0x541/0x700 net/socket.c:1982
__do_sys_sendto net/socket.c:1994 [inline]
__se_sys_sendto net/socket.c:1990 [inline]
__x64_sys_sendto+0xe5/0x100 net/socket.c:1990
do_syscall_64+0x34/0x70 arch/x86/entry/common.c:46
entry_SYSCALL_64_after_hwframe+0x61/0xc6
RIP: 0033:0x7f870df56569
Code: 28 c3 e8 4a 15 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff8935f0a8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007fff8935f0c8 RCX: 00007f870df56569
RDX: 000000000000fceb RSI: 0000000020000080 RDI: 0000000000000003
RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8935f0d0
R13: 00007fff8935f0f0 R14: 0000000000000000 R15: 0000000000000000
Modules linked in:
---[ end trace 02963efa2cd58fa2 ]---
RIP: 0010:__skb_pull include/linux/skbuff.h:2343 [inline]
RIP: 0010:skb_mac_gso_segment+0x498/0x4a0 net/core/dev.c:3345
Code: 4c 24 10 80 e1 07 80 c1 03 38 c1 0f 8c c6 fe ff ff 48 8b 7c 24 10 e8 87 29 e2 fd e9 b7 fe ff ff e8 3d 42 ce 00 e8 68 28 a8 fd <0f> 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48
RSP: 0018:ffffc900009bf520 EFLAGS: 00010293
RAX: ffffffff83c4f928 RBX: 000000000000fcd3 RCX: ffff8881067f62c0
RDX: 0000000000000000 RSI: 000000000000fcd3 RDI: 000000000000fccf
RBP: ffffc900009bf5e8 R08: ffffffff83c4f5d8 R09: ffffffff83c4f215
R10: 0000000000000002 R11: ffff8881067f62c0 R12: ffff88810c3d96b4
R13: 000000000000b9c6 R14: 0000000000000012 R15: 000000000000fccf
FS: 0000555555d96300(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002000f000 CR3: 00000001047bc000 CR4: 00000000003506a0

syzbot

unread,
Dec 14, 2022, 6:10:40 PM12/14/22
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: c73b4619ad86 ANDROID: abi preservation for fscrypt change ..
git tree: android13-5.15-lts
console+strace: https://syzkaller.appspot.com/x/log.txt?x=17d46c9f880000
kernel config: https://syzkaller.appspot.com/x/.config?x=d7c9bd3bb9661aad
dashboard link: https://syzkaller.appspot.com/bug?extid=3d91b8dbbcf515400e92
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1613533b880000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=16cd39e0480000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/d4a785f6c196/disk-c73b4619.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/e2fba875c9ab/vmlinux-c73b4619.xz
kernel image: https://storage.googleapis.com/syzbot-assets/a870e2543ec9/bzImage-c73b4619.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+3d91b8...@syzkaller.appspotmail.com

------------[ cut here ]------------
kernel BUG at include/linux/skbuff.h:2456!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 412 Comm: syz-executor220 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:__skb_pull include/linux/skbuff.h:2456 [inline]
RIP: 0010:skb_mac_gso_segment+0x498/0x4a0 net/core/dev.c:3341
Code: 4c 24 10 80 e1 07 80 c1 03 38 c1 0f 8c c6 fe ff ff 48 8b 7c 24 10 e8 47 d4 ca fd e9 b7 fe ff ff e8 bd 2b da 00 e8 88 6f 88 fd <0f> 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48
RSP: 0018:ffffc900002ff520 EFLAGS: 00010293
RAX: ffffffff83e93008 RBX: 000000000000fcd3 RCX: ffff8881183f93c0
RDX: 0000000000000000 RSI: 000000000000fcd3 RDI: 000000000000fccf
RBP: ffffc900002ff5e8 R08: ffffffff83e92cb8 R09: ffffffff83e92879
R10: 0000000000000002 R11: ffff8881183f93c0 R12: ffff88810cf7e1b4
R13: 000000000000b9c6 R14: 0000000000000012 R15: 000000000000fccf
FS: 0000555556fc7300(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002000f000 CR3: 000000011effd000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
__skb_gso_segment+0x31b/0x4b0 net/core/dev.c:3419
skb_gso_segment include/linux/netdevice.h:5007 [inline]
validate_xmit_skb+0x2eb/0xd20 net/core/dev.c:3678
__dev_queue_xmit+0xb67/0x1b50 net/core/dev.c:4219
dev_queue_xmit+0x17/0x20 net/core/dev.c:4261
packet_snd net/packet/af_packet.c:3025 [inline]
packet_sendmsg+0x4d93/0x69a0 net/packet/af_packet.c:3056
sock_sendmsg_nosec net/socket.c:704 [inline]
sock_sendmsg net/socket.c:724 [inline]
__sys_sendto+0x560/0x720 net/socket.c:2039
__do_sys_sendto net/socket.c:2051 [inline]
__se_sys_sendto net/socket.c:2047 [inline]
__x64_sys_sendto+0xe5/0x100 net/socket.c:2047
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7fe134757569
Code: 28 c3 e8 4a 15 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffeb8fc0108 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007ffeb8fc0128 RCX: 00007fe134757569
RDX: 000000000000fceb RSI: 0000000020000080 RDI: 0000000000000003
RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffeb8fc0130
R13: 00007ffeb8fc0150 R14: 0000000000000000 R15: 0000000000000000
</TASK>
Modules linked in:
---[ end trace 0d682b3e69c4c22a ]---
RIP: 0010:__skb_pull include/linux/skbuff.h:2456 [inline]
RIP: 0010:skb_mac_gso_segment+0x498/0x4a0 net/core/dev.c:3341
Code: 4c 24 10 80 e1 07 80 c1 03 38 c1 0f 8c c6 fe ff ff 48 8b 7c 24 10 e8 47 d4 ca fd e9 b7 fe ff ff e8 bd 2b da 00 e8 88 6f 88 fd <0f> 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48
RSP: 0018:ffffc900002ff520 EFLAGS: 00010293
RAX: ffffffff83e93008 RBX: 000000000000fcd3 RCX: ffff8881183f93c0
RDX: 0000000000000000 RSI: 000000000000fcd3 RDI: 000000000000fccf
RBP: ffffc900002ff5e8 R08: ffffffff83e92cb8 R09: ffffffff83e92879
R10: 0000000000000002 R11: ffff8881183f93c0 R12: ffff88810cf7e1b4
R13: 000000000000b9c6 R14: 0000000000000012 R15: 000000000000fccf
FS: 0000555556fc7300(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002000f000 CR3: 000000011effd000 CR4: 00000000003506b0

Tudor Ambarus

unread,
Dec 15, 2022, 8:42:19 AM12/15/22
to syzbot+3d91b8...@syzkaller.appspotmail.com, jone...@google.com, syzkaller-a...@googlegroups.com

Tudor Ambarus

unread,
Dec 15, 2022, 8:42:50 AM12/15/22
to syzbot+3d91b8...@syzkaller.appspotmail.com, jone...@google.com, syzkaller-a...@googlegroups.com

syzbot

unread,
Dec 15, 2022, 3:59:20 PM12/15/22
to jone...@google.com, syzkaller-a...@googlegroups.com, tudor....@linaro.org
Hello,

syzbot has tested the proposed patch and the reproducer did not trigger any issue:

Reported-and-tested-by: syzbot+3d91b8...@syzkaller.appspotmail.com

Tested on:

commit: 8fa590bf Merge tag 'for-linus' of git://git.kernel.org..
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
console output: https://syzkaller.appspot.com/x/log.txt?x=11976c53880000
kernel config: https://syzkaller.appspot.com/x/.config?x=7da220a1bfd9fb8e
dashboard link: https://syzkaller.appspot.com/bug?extid=3d91b8dbbcf515400e92
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2

Note: no patches were applied.
Note: testing is done by a robot and is best-effort only.

syzbot

unread,
Dec 15, 2022, 4:11:18 PM12/15/22
to jone...@google.com, syzkaller-a...@googlegroups.com, tudor....@linaro.org
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
kernel BUG in __skb_gso_segment

------------[ cut here ]------------
kernel BUG at include/linux/skbuff.h:2440!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 473 Comm: syz-executor.0 Not tainted 5.15.83-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:__skb_pull include/linux/skbuff.h:2440 [inline]
RIP: 0010:skb_mac_gso_segment+0x498/0x4a0 net/core/dev.c:3334
Code: 4c 24 10 80 e1 07 80 c1 03 38 c1 0f 8c c6 fe ff ff 48 8b 7c 24 10 e8 17 ac dd fd e9 b7 fe ff ff e8 5d 3c d8 00 e8 f8 ba 9d fd <0f> 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48
RSP: 0018:ffffc900009cf520 EFLAGS: 00010293
RAX: ffffffff83d2e6a8 RBX: 000000000000fcd3 RCX: ffff88810afe4000
RDX: 0000000000000000 RSI: 000000000000fcd3 RDI: 000000000000fccf
RBP: ffffc900009cf5e8 R08: ffffffff83d2e358 R09: ffffffff83d2df19
R10: 0000000000000002 R11: ffff88810afe4000 R12: ffff888119983434
R13: 000000000000b9c6 R14: 0000000000000012 R15: 000000000000fccf
FS: 00007f94ab37b700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002000f000 CR3: 000000011bb36000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
__skb_gso_segment+0x31b/0x4b0 net/core/dev.c:3412
skb_gso_segment include/linux/netdevice.h:4960 [inline]
validate_xmit_skb+0x304/0xdc0 net/core/dev.c:3671
__dev_queue_xmit+0xb9e/0x1bd0 net/core/dev.c:4212
dev_queue_xmit+0x17/0x20 net/core/dev.c:4254
packet_snd net/packet/af_packet.c:3024 [inline]
packet_sendmsg+0x4d97/0x69a0 net/packet/af_packet.c:3055
sock_sendmsg_nosec net/socket.c:704 [inline]
sock_sendmsg net/socket.c:724 [inline]
__sys_sendto+0x560/0x720 net/socket.c:2039
__do_sys_sendto net/socket.c:2051 [inline]
__se_sys_sendto net/socket.c:2047 [inline]
__x64_sys_sendto+0xe5/0x100 net/socket.c:2047
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f94ab8080d9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f94ab37b168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007f94ab927f80 RCX: 00007f94ab8080d9
RDX: 000000000000fceb RSI: 0000000020000080 RDI: 0000000000000003
RBP: 00007f94ab863ae9 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fff91a40e9f R14: 00007f94ab37b300 R15: 0000000000022000
</TASK>
Modules linked in:
---[ end trace 5c656a874218530f ]---
RIP: 0010:__skb_pull include/linux/skbuff.h:2440 [inline]
RIP: 0010:skb_mac_gso_segment+0x498/0x4a0 net/core/dev.c:3334
Code: 4c 24 10 80 e1 07 80 c1 03 38 c1 0f 8c c6 fe ff ff 48 8b 7c 24 10 e8 17 ac dd fd e9 b7 fe ff ff e8 5d 3c d8 00 e8 f8 ba 9d fd <0f> 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48
RSP: 0018:ffffc900009cf520 EFLAGS: 00010293
RAX: ffffffff83d2e6a8 RBX: 000000000000fcd3 RCX: ffff88810afe4000
RDX: 0000000000000000 RSI: 000000000000fcd3 RDI: 000000000000fccf
RBP: ffffc900009cf5e8 R08: ffffffff83d2e358 R09: ffffffff83d2df19
R10: 0000000000000002 R11: ffff88810afe4000 R12: ffff888119983434
R13: 000000000000b9c6 R14: 0000000000000012 R15: 000000000000fccf
FS: 00007f94ab37b700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002000f000 CR3: 000000011bb36000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


Tested on:

commit: fd6d6684 Linux 5.15.83
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git linux-5.15.y
console output: https://syzkaller.appspot.com/x/log.txt?x=11e990b3880000
kernel config: https://syzkaller.appspot.com/x/.config?x=b94c9bedb5f5c75

Tudor Ambarus

unread,
Dec 21, 2022, 5:05:15 AM12/21/22
to syzbot+3d91b8...@syzkaller.appspotmail.com, jone...@google.com, syzkaller-a...@googlegroups.com
#syz test https://github.com/ambarus/linux.git
linux-5.15.y-id=ce5575575f074c33ff80d104f5baee26f22e95f5-__skb_gso_segment

syzbot

unread,
Dec 21, 2022, 5:05:16 AM12/21/22
to tudor....@linaro.org, jone...@google.com, syzkaller-a...@googlegroups.com, tudor....@linaro.org
> #syz test https://github.com/ambarus/linux.git

"linux-5.15.y-id=ce5575575f074c33ff80d104f5baee26f22e95f5-__skb_gso_segment" does not look like a valid git branch or commit.

Tudor Ambarus

unread,
Jan 18, 2023, 7:04:15 AM1/18/23
to syzbot, syzkaller-a...@googlegroups.com, syzkaller...@googlegroups.com, Lee Jones
#syz fix: net/af_packet: make sure to pull mac header

Tudor Ambarus

unread,
Jan 18, 2023, 7:07:16 AM1/18/23
to syzbot+02d69c...@syzkaller.appspotmail.com, syzbot+175ad8...@syzkaller.appspotmail.com, syzkaller...@googlegroups.com, Lee Jones, syzkaller-a...@googlegroups.com

Tudor Ambarus

unread,
Jan 18, 2023, 7:28:16 AM1/18/23
to syzbot+175ad8...@syzkaller.appspotmail.com, syzkaller...@googlegroups.com, Lee Jones, syzkaller-a...@googlegroups.com

syzbot

unread,
Apr 18, 2023, 8:07:31 AM4/18/23
to jone...@google.com, syzkaller-a...@googlegroups.com, syzkaller...@googlegroups.com, tudor....@linaro.org
This bug is marked as fixed by commit:
net/af_packet: make sure to pull mac header

But I can't find it in the tested trees[1] for more than 90 days.
Is it a correct commit? Please update it by replying:

#syz fix: exact-commit-title

Until then the bug is still considered open and new crashes with
the same signature are ignored.

Kernel: Android 5.10
Dashboard link: https://syzkaller.appspot.com/bug?extid=02d69c48ffd9bdd1734a

---
[1] I expect the commit to be present in:

1. android12-5.10-lts branch of
https://android.googlesource.com/kernel/common

syzbot

unread,
May 2, 2023, 8:08:39 AM5/2/23
to jone...@google.com, syzkaller-a...@googlegroups.com, syzkaller...@googlegroups.com, tudor....@linaro.org
Reply all
Reply to author
Forward
0 new messages