================================================================== netlink: 'syz-executor0': attribute type 1 has an invalid length. BUG: KASAN: slab-out-of-bounds in erspan_xmit+0x22d4/0x2430 net/ipv4/ip_gre.c:735 Read of size 2 at addr ffff8801c30b878b by task syz-executor5/22593 CPU: 1 PID: 22593 Comm: syz-executor5 Not tainted 4.15.0-rc8+ #203 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 print_address_description+0x73/0x250 mm/kasan/report.c:252 kasan_report_error mm/kasan/report.c:351 [inline] kasan_report+0x25b/0x340 mm/kasan/report.c:409 __asan_report_load_n_noabort+0xf/0x20 mm/kasan/report.c:440 erspan_xmit+0x22d4/0x2430 net/ipv4/ip_gre.c:735 __netdev_start_xmit include/linux/netdevice.h:4053 [inline] netdev_start_xmit include/linux/netdevice.h:4062 [inline] packet_direct_xmit+0x3ad/0x790 net/packet/af_packet.c:267 packet_snd net/packet/af_packet.c:2944 [inline] packet_sendmsg+0x3aed/0x60b0 net/packet/af_packet.c:2969 sock_sendmsg_nosec net/socket.c:630 [inline] sock_sendmsg+0xca/0x110 net/socket.c:640 SYSC_sendto+0x361/0x5c0 net/socket.c:1721 SyS_sendto+0x40/0x50 net/socket.c:1689 entry_SYSCALL_64_fastpath+0x29/0xa0 RIP: 0033:0x452ef9 RSP: 002b:00007fd57a67cc58 EFLAGS: 00000212 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ef9 RDX: 0000000000000000 RSI: 0000000020011000 RDI: 0000000000000013 RBP: 000000000000059c R08: 0000000020008000 R09: 000000000000001c R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f7740 R13: 00000000ffffffff R14: 00007fd57a67d6d4 R15: 0000000000000000 Allocated by task 22278: save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:551 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:489 kmem_cache_alloc+0x12e/0x760 mm/slab.c:3544 kmem_cache_zalloc include/linux/slab.h:678 [inline] get_empty_filp+0xfb/0x4f0 fs/file_table.c:123 path_openat+0xed/0x3530 fs/namei.c:3496 do_filp_open+0x25b/0x3b0 fs/namei.c:3554 do_sys_open+0x502/0x6d0 fs/open.c:1059 SYSC_open fs/open.c:1077 [inline] SyS_open+0x2d/0x40 fs/open.c:1072 entry_SYSCALL_64_fastpath+0x29/0xa0 Freed by task 7: save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_slab_free+0x71/0xc0 mm/kasan/kasan.c:524 __cache_free mm/slab.c:3488 [inline] kmem_cache_free+0x83/0x2a0 mm/slab.c:3746 file_free_rcu+0x5c/0x70 fs/file_table.c:50 __rcu_reclaim kernel/rcu/rcu.h:195 [inline] rcu_do_batch kernel/rcu/tree.c:2758 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:3012 [inline] __rcu_process_callbacks kernel/rcu/tree.c:2979 [inline] rcu_process_callbacks+0xd6c/0x17f0 kernel/rcu/tree.c:2996 __do_softirq+0x2d7/0xb85 kernel/softirq.c:285 The buggy address belongs to the object at ffff8801c30b8580 which belongs to the cache filp of size 456 The buggy address is located 67 bytes to the right of 456-byte region [ffff8801c30b8580, ffff8801c30b8748) The buggy address belongs to the page: page:ffffea00070c2e00 count:1 mapcount:0 mapping:ffff8801c30b8080 index:0xffff8801c30b8800 flags: 0x2fffc0000000100(slab) raw: 02fffc0000000100 ffff8801c30b8080 ffff8801c30b8800 0000000100000005 raw: ffffea00074881e0 ffffea000758f6e0 ffff8801dae2c180 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801c30b8680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8801c30b8700: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc >ffff8801c30b8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff8801c30b8800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8801c30b8880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================