Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@xxxxxxxxxx>: On Thu, 3 Feb 2022 11:17:27 -0800 you wrote: > syzbot reported a btf decl_tag bug with stack trace below: > > general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN > KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] > CPU: 0 PID: 3592 Comm: syz-executor914 Not tainted 5.16.0-syzkaller-11424-gb7892f7d5cb2 #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 > RIP: 0010:btf_type_vlen include/linux/btf.h:231 [inline] > RIP: 0010:btf_decl_tag_resolve+0x83e/0xaa0 kernel/bpf/btf.c:3910 > ... > Call Trace: > <TASK> > btf_resolve+0x251/0x1020 kernel/bpf/btf.c:4198 > btf_check_all_types kernel/bpf/btf.c:4239 [inline] > btf_parse_type_sec kernel/bpf/btf.c:4280 [inline] > btf_parse kernel/bpf/btf.c:4513 [inline] > btf_new_fd+0x19fe/0x2370 kernel/bpf/btf.c:6047 > bpf_btf_load kernel/bpf/syscall.c:4039 [inline] > __sys_bpf+0x1cbb/0x5970 kernel/bpf/syscall.c:4679 > __do_sys_bpf kernel/bpf/syscall.c:4738 [inline] > __se_sys_bpf kernel/bpf/syscall.c:4736 [inline] > __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:4736 > do_syscall_x64 arch/x86/entry/common.c:50 [inline] > do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 > entry_SYSCALL_64_after_hwframe+0x44/0xae > > [...] Here is the summary with links: - [bpf,1/2] bpf: fix a btf decl_tag bug when tagging a function https://git.kernel.org/bpf/bpf-next/c/d7e7b42f4f95 - [bpf,2/2] selftests/bpf: add a selftest for invalid func btf with btf decl_tag https://git.kernel.org/bpf/bpf-next/c/cf1a4cbce63b You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html