================================================================== BUG: KASAN: slab-out-of-bounds in ip6_dst_idev include/net/ip6_fib.h:141 [inline] BUG: KASAN: slab-out-of-bounds in ip6_xmit+0x177c/0x1a00 net/ipv6/ip6_output.c:237 Read of size 8 at addr ffff8800b5210dd8 by task syz-executor4/5921 CPU: 0 PID: 5921 Comm: syz-executor4 Not tainted 4.4.152-ge5c5f1f #89 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 980142c234788434 ffff8800a156f5c8 ffffffff81e15fed ffffea0002d48400 ffff8800b5210dd8 0000000000000000 ffff8800b5210dd8 0000000000001200 ffff8800a156f600 ffffffff8151b489 ffff8800b5210dd8 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] print_address_description+0x6c/0x216 mm/kasan/report.c:252 [] kasan_report_error mm/kasan/report.c:351 [inline] [] kasan_report.cold.7+0x175/0x2f7 mm/kasan/report.c:408 [] __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:429 [] ip6_dst_idev include/net/ip6_fib.h:141 [inline] [] ip6_xmit+0x177c/0x1a00 net/ipv6/ip6_output.c:237 [] inet6_csk_xmit+0x245/0x490 net/ipv6/inet6_connection_sock.c:176 sg_read: process 260 (syz-executor1) changed security contexts after opening file descriptor, this is not allowed. [] l2tp_xmit_core net/l2tp/l2tp_core.c:1084 [inline] [] l2tp_xmit_skb+0xb9c/0xe80 net/l2tp/l2tp_core.c:1179 [] pppol2tp_sendmsg+0x4e0/0x7d0 net/l2tp/l2tp_ppp.c:355 [] sock_sendmsg_nosec net/socket.c:638 [inline] [] sock_sendmsg+0xcc/0x110 net/socket.c:648 [] ___sys_sendmsg+0x441/0x880 net/socket.c:1975 [] __sys_sendmmsg+0x12e/0x2e0 net/socket.c:2060 [] SYSC_sendmmsg net/socket.c:2090 [inline] [] SyS_sendmmsg+0x35/0x60 net/socket.c:2085 [] entry_SYSCALL_64_fastpath+0x22/0x9e Allocated by task 0: (stack is not available) Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff8800b5210dc0 which belongs to the cache ip_dst_cache of size 208 The buggy address is located 24 bytes inside of 208-byte region [ffff8800b5210dc0, ffff8800b5210e90) The buggy address belongs to the page: BUG: unable to handle kernel paging request at fffffffba1f6d980 IP: [] cpuacct_charge+0x155/0x380 kernel/sched/cpuacct.c:247 PGD 440f067 PUD 0 Oops: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 2151 Comm: udevd Not tainted 4.4.152-ge5c5f1f #89 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8800b4b83000 task.stack: ffff8800b4bf0000 RIP: 0010:[] [] cpuacct_charge+0x155/0x380 kernel/sched/cpuacct.c:247 RSP: 0018:ffff8800b4bf7c28 EFLAGS: 00010046 RAX: 1ffffffff089521f RBX: 00000000000185a8 RCX: ffffffff84a16680 RDX: fffffbff743edb30 RSI: fffffffba1f6d980 RDI: ffffffff844a90f8 RBP: ffff8800b4bf7c68 R08: ffff8800b4b83950 R09: 0000000000000001 R10: 0000000000000001 R11: ffff8800b4b83000 R12: ffffffff844a9020 R13: dffffc0000000000 R14: 000000001f2306d6 R15: ffffffff83aaae60 FS: 00007fbe5ec5c7a0(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffba1f6d980 CR3: 00000000b4bc8000 CR4: 00000000001606f0 Stack: ffffffff81227c90 0000000000000046 0000000000000003 ffff8801d3c4c860 ffff8801d3c4c800 000000001f2306d6 ffff8801d3c4c8b0 0000000000000000 ffff8800b4bf7cb0 ffffffff811dc309 0000000000000020 ffff8801d26f8000 Call Trace: [] update_curr+0x2c9/0x6d0 kernel/sched/fair.c:882 [] enqueue_entity kernel/sched/fair.c:3512 [inline] [] enqueue_task_fair+0x2fa/0x2790 kernel/sched/fair.c:4695 [] enqueue_task kernel/sched/core.c:858 [inline] [] activate_task+0x14d/0x280 kernel/sched/core.c:874 [] wake_up_new_task+0x647/0xe30 kernel/sched/core.c:2491 [] _do_fork+0x2a9/0xe20 kernel/fork.c:1814 [] SYSC_clone kernel/fork.c:1899 [inline] [] SyS_clone+0x37/0x50 kernel/fork.c:1893 [] entry_SYSCALL_64_fastpath+0x22/0x9e Code: 49 8d bc 24 d8 00 00 00 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 c4 01 00 00 49 8b 9c 24 d8 00 00 00 80 3a 00 0f 85 8f 01 00 00 <4a> 03 1c f9 48 89 d8 48 c1 e8 03 42 80 3c 28 00 0f 85 be 01 00 RIP [] cpuacct_charge+0x155/0x380 kernel/sched/cpuacct.c:247 RSP CR2: fffffffba1f6d980 ---[ end trace d8516f358702b6a2 ]---