================================================================== BUG: KASAN: use-after-free in deliver_ptype_list_skb net/core/dev.c:1878 [inline] BUG: KASAN: use-after-free in __netif_receive_skb_core+0x2fa3/0x3230 net/core/dev.c:4281 Read of size 2 at addr ffff8801c9e655c0 by task syzkaller414559/8569 CPU: 1 PID: 8569 Comm: syzkaller414559 Not tainted 4.13.0-rc7+ #64 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 print_address_description+0x73/0x250 mm/kasan/report.c:252 kasan_report_error mm/kasan/report.c:351 [inline] kasan_report+0x24e/0x340 mm/kasan/report.c:409 __asan_report_load2_noabort+0x14/0x20 mm/kasan/report.c:428 deliver_ptype_list_skb net/core/dev.c:1878 [inline] __netif_receive_skb_core+0x2fa3/0x3230 net/core/dev.c:4281 __netif_receive_skb+0x2c/0x1b0 net/core/dev.c:4336 netif_receive_skb_internal+0x16a/0x1a50 net/core/dev.c:4497 napi_skb_finish net/core/dev.c:4858 [inline] napi_gro_receive+0x3d0/0x500 net/core/dev.c:4889 receive_buf+0xaef/0x5690 drivers/net/virtio_net.c:781 virtnet_receive drivers/net/virtio_net.c:1022 [inline] virtnet_poll+0x50b/0xab0 drivers/net/virtio_net.c:1103 napi_poll net/core/dev.c:5500 [inline] net_rx_action+0x792/0x1910 net/core/dev.c:5566 __do_softirq+0x2f5/0xba3 kernel/softirq.c:284 invoke_softirq kernel/softirq.c:364 [inline] irq_exit+0x1cc/0x200 kernel/softirq.c:405 exiting_irq arch/x86/include/asm/apic.h:638 [inline] do_IRQ+0xf6/0x190 arch/x86/kernel/irq.c:256 common_interrupt+0x93/0x93 arch/x86/entry/entry_64.S:513 RIP: 0010:page_add_file_rmap+0x95/0xa90 mm/rmap.c:1174 RSP: 0000:ffff8801c9e37330 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff1e RAX: ffffed00393c6e68 RBX: dffffc0000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea00073d6f40 RBP: ffff8801c9e37588 R08: 0000000000000001 R09: 1ffff100393c6e41 R10: ffff8801c9e37140 R11: 0000000000000003 R12: 0000000000000000 R13: 0000000000000000 R14: ffffea00073d6f40 R15: ffff8801c9e37560 alloc_set_pte+0x89a/0x18b0 mm/memory.c:3236 filemap_map_pages+0x1080/0x15d0 mm/filemap.c:2520 do_fault_around mm/memory.c:3382 [inline] do_read_fault mm/memory.c:3416 [inline] do_fault mm/memory.c:3521 [inline] handle_pte_fault mm/memory.c:3751 [inline] __handle_mm_fault+0x1e36/0x3860 mm/memory.c:3869 handle_mm_fault+0x3bb/0x860 mm/memory.c:3906 __do_page_fault+0x4f6/0xb60 arch/x86/mm/fault.c:1445 do_page_fault+0x54/0x70 arch/x86/mm/fault.c:1508 page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1007 RIP: 0033:0x4ae990 RSP: 002b:00007f33bf5e5dd0 EFLAGS: 00010287 RAX: 0000000000000000 RBX: 00000000004ccdf0 RCX: 00000000004462b9 RDX: 0000000000000003 RSI: 0000000000fff000 RDI: 0000000020000000 RBP: 0000000000000000 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000032 R11: 0000000000000212 R12: 0000000000000000 R13: 00007ffd44ce312f R14: 00007f33bf5e69c0 R15: 0000000000000000 Allocated by task 8513: save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59 save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:551 kmem_cache_alloc_trace+0x12f/0x740 mm/slab.c:3627