================================================================== BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:447 [inline] BUG: KASAN: slab-out-of-bounds in packet_recvmsg+0x56c/0x1150 net/packet/af_packet.c:3443 Read of size 208 at addr ffff8880262afb68 by task syz-executor.1/27646 CPU: 1 PID: 27646 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x107/0x163 lib/dump_stack.c:120 print_address_description.constprop.0.cold+0x5b/0x2f8 mm/kasan/report.c:230 __kasan_report mm/kasan/report.c:396 [inline] kasan_report.cold+0x79/0xd5 mm/kasan/report.c:413 check_memory_region_inline mm/kasan/generic.c:179 [inline] check_memory_region+0x13d/0x180 mm/kasan/generic.c:185 memcpy+0x20/0x60 mm/kasan/shadow.c:64 memcpy include/linux/string.h:447 [inline] packet_recvmsg+0x56c/0x1150 net/packet/af_packet.c:3443 sock_recvmsg_nosec net/socket.c:886 [inline] sock_recvmsg net/socket.c:904 [inline] sock_recvmsg net/socket.c:900 [inline] ____sys_recvmsg+0x2c4/0x600 net/socket.c:2568 ___sys_recvmsg+0x127/0x200 net/socket.c:2610 do_recvmmsg+0x24d/0x6c0 net/socket.c:2710 __sys_recvmmsg net/socket.c:2791 [inline] __do_sys_recvmmsg net/socket.c:2812 [inline] __se_sys_recvmmsg net/socket.c:2805 [inline] __x64_sys_recvmmsg+0x17d/0x260 net/socket.c:2805 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x465b09 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f95282e5188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000465b09 RDX: 0000000000000008 RSI: 00000000200041c0 RDI: 0000000000000003 RBP: 00000000004b069f R08: 0000000020004400 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 000000000056c008 R13: 00007fffdd6eb1bf R14: 00007f95282e5300 R15: 0000000000022000 Allocated by task 8451: kasan_save_stack+0x1b/0x40 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:401 [inline] ____kasan_kmalloc.constprop.0+0x82/0xa0 mm/kasan/common.c:429 kasan_slab_alloc include/linux/kasan.h:209 [inline] slab_post_alloc_hook mm/slab.h:512 [inline] slab_alloc_node mm/slub.c:2892 [inline] slab_alloc mm/slub.c:2900 [inline] kmem_cache_alloc+0x1c6/0x440 mm/slub.c:2905 skb_clone+0x170/0x3c0 net/core/skbuff.c:1456 dev_queue_xmit_nit+0x3a5/0xa90 net/core/dev.c:2336 xmit_one net/core/dev.c:3569 [inline] dev_hard_start_xmit+0xad/0x920 net/core/dev.c:3590 sch_direct_xmit+0x2e1/0xbd0 net/sched/sch_generic.c:313 qdisc_restart net/sched/sch_generic.c:376 [inline] __qdisc_run+0x4ba/0x15f0 net/sched/sch_generic.c:384 __dev_xmit_skb net/core/dev.c:3824 [inline] __dev_queue_xmit+0x1a60/0x2e00 net/core/dev.c:4131 neigh_resolve_output net/core/neighbour.c:1491 [inline] neigh_resolve_output+0x4d8/0x7e0 net/core/neighbour.c:1471 neigh_output include/net/neighbour.h:510 [inline] ip6_finish_output2+0x6b8/0x16c0 net/ipv6/ip6_output.c:117 __ip6_finish_output net/ipv6/ip6_output.c:182 [inline] __ip6_finish_output+0x4c1/0xe10 net/ipv6/ip6_output.c:161 ip6_finish_output+0x35/0x200 net/ipv6/ip6_output.c:192 NF_HOOK_COND include/linux/netfilter.h:290 [inline] ip6_output+0x1e4/0x530 net/ipv6/ip6_output.c:215 dst_output include/net/dst.h:441 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ndisc_send_skb+0xa99/0x1750 net/ipv6/ndisc.c:508 ndisc_send_rs+0x12e/0x6f0 net/ipv6/ndisc.c:702 addrconf_rs_timer+0x3f2/0x820 net/ipv6/addrconf.c:3877 call_timer_fn+0x1a5/0x6b0 kernel/time/timer.c:1417 expire_timers kernel/time/timer.c:1462 [inline] __run_timers.part.0+0x67c/0xa50 kernel/time/timer.c:1731 __run_timers kernel/time/timer.c:1712 [inline] run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1744 __do_softirq+0x29b/0x9f6 kernel/softirq.c:343 The buggy address belongs to the object at ffff8880262afb40 which belongs to the cache skbuff_head_cache of size 232 The buggy address is located 40 bytes inside of 232-byte region [ffff8880262afb40, ffff8880262afc28) The buggy address belongs to the page: page:000000006eb22c21 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x262af flags: 0xfff00000000200(slab) raw: 00fff00000000200 dead000000000100 dead000000000122 ffff8881406f7c80 raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8880262afb00: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 ffff8880262afb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8880262afc00: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc ^ ffff8880262afc80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8880262afd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc ==================================================================