================================================================== BUG: KASAN: use-after-free in pskb_may_pull include/linux/skbuff.h:2108 [inline] BUG: KASAN: use-after-free in skb_ensure_writable+0x554/0x620 net/core/skbuff.c:5118 Read of size 4 at addr ffff880198206f40 by task syz-executor4/6036 CPU: 0 PID: 6036 Comm: syz-executor4 Not tainted 4.17.0-rc6+ #34 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 print_address_description+0x6c/0x20b mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report.cold.7+0x242/0x2fe mm/kasan/report.c:412 __asan_report_load4_noabort+0x14/0x20 mm/kasan/report.c:432 pskb_may_pull include/linux/skbuff.h:2108 [inline] skb_ensure_writable+0x554/0x620 net/core/skbuff.c:5118 __bpf_try_make_writable net/core/filter.c:1606 [inline] bpf_try_make_writable net/core/filter.c:1612 [inline] ____bpf_l3_csum_replace net/core/filter.c:1774 [inline] bpf_l3_csum_replace+0x8c/0x4d0 net/core/filter.c:1765 The buggy address belongs to the page: page:ffffea0006608180 count:0 mapcount:-127 mapping:0000000000000000 index:0x0 flags: 0x2fffc0000000000() raw: 02fffc0000000000 0000000000000000 0000000000000000 00000000ffffff80 raw: ffffea0006c20220 ffffea0006b1eb60 0000000000000000 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff880198206e00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff880198206e80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff880198206f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff880198206f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff880198207000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ==================================================================