================================================================== BUG: KASAN: slab-out-of-bounds in decode_session6+0x10e1/0x1950 net/xfrm/xfrm_policy.c:3460 Read of size 1 at addr ffff88802abcf464 by task syz-executor.1/17561 CPU: 0 PID: 17561 Comm: syz-executor.1 Not tainted 6.5.0-rc5-syzkaller-00182-g25aa0bebba72 #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:364 [inline] print_report+0xc4/0x620 mm/kasan/report.c:475 kasan_report+0xda/0x110 mm/kasan/report.c:588 decode_session6+0x10e1/0x1950 net/xfrm/xfrm_policy.c:3460 __xfrm_decode_session+0x54/0xb0 net/xfrm/xfrm_policy.c:3566 xfrm_decode_session_reverse include/net/xfrm.h:1223 [inline] icmpv6_route_lookup+0x397/0x550 net/ipv6/icmp.c:388 icmp6_send+0x11c1/0x2720 net/ipv6/icmp.c:595 __icmpv6_send include/linux/icmpv6.h:28 [inline] icmpv6_send include/linux/icmpv6.h:49 [inline] ip6_link_failure+0x31/0x5a0 net/ipv6/route.c:2785 dst_link_failure include/net/dst.h:437 [inline] ip6_tnl_xmit+0x4f9/0x3960 net/ipv6/ip6_tunnel.c:1268 ipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1384 [inline] ip6_tnl_start_xmit+0x6ef/0x1750 net/ipv6/ip6_tunnel.c:1432 __netdev_start_xmit include/linux/netdevice.h:4910 [inline] netdev_start_xmit include/linux/netdevice.h:4924 [inline] xmit_one net/core/dev.c:3537 [inline] dev_hard_start_xmit+0x13d/0x6c0 net/core/dev.c:3553 sch_direct_xmit+0x1ac/0xc20 net/sched/sch_generic.c:342 qdisc_restart net/sched/sch_generic.c:407 [inline] __qdisc_run+0x540/0x19d0 net/sched/sch_generic.c:415 __dev_xmit_skb net/core/dev.c:3827 [inline] __dev_queue_xmit+0x26ab/0x3f20 net/core/dev.c:4169 dev_queue_xmit include/linux/netdevice.h:3088 [inline] neigh_connected_output+0x42c/0x5d0 net/core/neighbour.c:1581 neigh_output include/net/neighbour.h:544 [inline] ip6_finish_output2+0x5d0/0x1b20 net/ipv6/ip6_output.c:135 ip6_fragment+0xbf4/0x2a40 net/ipv6/ip6_output.c:1008 __ip6_finish_output net/ipv6/ip6_output.c:194 [inline] ip6_finish_output+0x7a8/0x11d0 net/ipv6/ip6_output.c:207 NF_HOOK_COND include/linux/netfilter.h:292 [inline] ip6_output+0x243/0x890 net/ipv6/ip6_output.c:228 dst_output include/net/dst.h:458 [inline] NF_HOOK include/linux/netfilter.h:303 [inline] NF_HOOK include/linux/netfilter.h:297 [inline] ip6_xmit+0xe1d/0x1fe0 net/ipv6/ip6_output.c:344 sctp_v6_xmit+0xc16/0x1110 net/sctp/ipv6.c:250 sctp_packet_transmit+0x22e1/0x3010 net/sctp/output.c:653 sctp_packet_singleton+0x19f/0x370 net/sctp/outqueue.c:783 sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline] sctp_outq_flush+0x54c/0x3340 net/sctp/outqueue.c:1212 sctp_cmd_interpreter net/sctp/sm_sideeffect.c:1818 [inline] sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline] sctp_do_sm+0x1786/0x5c40 net/sctp/sm_sideeffect.c:1169 sctp_primitive_ASSOCIATE+0x9c/0xc0 net/sctp/primitive.c:73 __sctp_connect+0x7b9/0xc30 net/sctp/socket.c:1233 __sctp_setsockopt_connectx+0x102/0x170 net/sctp/socket.c:1335 sctp_setsockopt_connectx net/sctp/socket.c:1362 [inline] sctp_setsockopt+0x3dca/0xb7c0 net/sctp/socket.c:4613 __sys_setsockopt+0x2ca/0x5b0 net/socket.c:2263 __do_sys_setsockopt net/socket.c:2274 [inline] __se_sys_setsockopt net/socket.c:2271 [inline] __x64_sys_setsockopt+0xbd/0x150 net/socket.c:2271 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f592387cae9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f592465b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f592399bf80 RCX: 00007f592387cae9 RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 RBP: 00007f59238c847a R08: 000000000000001c R09: 0000000000000000 R10: 0000000020000240 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f592399bf80 R15: 00007ffc68357768 Allocated by task 17107: kasan_save_stack+0x33/0x50 mm/kasan/common.c:45 kasan_set_track+0x25/0x30 mm/kasan/common.c:52 __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:328 kasan_slab_alloc include/linux/kasan.h:186 [inline] slab_post_alloc_hook mm/slab.h:762 [inline] slab_alloc_node mm/slab.c:3237 [inline] kmem_cache_alloc_node+0x179/0x540 mm/slab.c:3509 __alloc_skb+0x287/0x330 net/core/skbuff.c:634 alloc_skb include/linux/skbuff.h:1289 [inline] alloc_skb_with_frags+0x9d/0x700 net/core/skbuff.c:6233 sock_alloc_send_pskb+0x7c8/0x950 net/core/sock.c:2793 sock_alloc_send_skb include/net/sock.h:1871 [inline] __ip_append_data+0x1e17/0x3d20 net/ipv4/ip_output.c:1120 ip_make_skb+0x27a/0x2f0 net/ipv4/ip_output.c:1552 udp_sendmsg+0x1da7/0x2a50 net/ipv4/udp.c:1260 udpv6_sendmsg+0x1ac6/0x2f80 net/ipv6/udp.c:1407 inet6_sendmsg+0x9d/0xe0 net/ipv6/af_inet6.c:651 sock_sendmsg_nosec net/socket.c:725 [inline] sock_sendmsg+0xd9/0x180 net/socket.c:748 ____sys_sendmsg+0x2ac/0x940 net/socket.c:2494 ___sys_sendmsg+0x135/0x1d0 net/socket.c:2548 __sys_sendmmsg+0x1a1/0x450 net/socket.c:2634 __do_sys_sendmmsg net/socket.c:2663 [inline] __se_sys_sendmmsg net/socket.c:2660 [inline] __x64_sys_sendmmsg+0x9c/0x100 net/socket.c:2660 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd Freed by task 17107: kasan_save_stack+0x33/0x50 mm/kasan/common.c:45 kasan_set_track+0x25/0x30 mm/kasan/common.c:52 kasan_save_free_info+0x28/0x40 mm/kasan/generic.c:522 ____kasan_slab_free mm/kasan/common.c:236 [inline] ____kasan_slab_free+0x13f/0x190 mm/kasan/common.c:200 kasan_slab_free include/linux/kasan.h:162 [inline] __cache_free mm/slab.c:3370 [inline] __do_kmem_cache_free mm/slab.c:3557 [inline] kmem_cache_free+0x104/0x380 mm/slab.c:3582 kfree_skbmem+0xef/0x1b0 net/core/skbuff.c:959 __kfree_skb net/core/skbuff.c:1017 [inline] kfree_skb_reason+0x10e/0x210 net/core/skbuff.c:1052 kfree_skb include/linux/skbuff.h:1237 [inline] ip_tunnel_xmit+0x72e/0x3350 net/ipv4/ip_tunnel.c:841 ipip_tunnel_xmit+0x3cc/0x4e0 net/ipv4/ipip.c:308 __netdev_start_xmit include/linux/netdevice.h:4910 [inline] netdev_start_xmit include/linux/netdevice.h:4924 [inline] xmit_one net/core/dev.c:3537 [inline] dev_hard_start_xmit+0x13d/0x6c0 net/core/dev.c:3553 __dev_queue_xmit+0xa55/0x3f20 net/core/dev.c:4203 dev_queue_xmit include/linux/netdevice.h:3088 [inline] neigh_connected_output+0x42c/0x5d0 net/core/neighbour.c:1581 neigh_output include/net/neighbour.h:544 [inline] ip_finish_output2+0x70a/0x24b0 net/ipv4/ip_output.c:230 __ip_finish_output net/ipv4/ip_output.c:308 [inline] __ip_finish_output+0x38b/0x640 net/ipv4/ip_output.c:290 ip_finish_output+0x31/0x280 net/ipv4/ip_output.c:318 NF_HOOK_COND include/linux/netfilter.h:292 [inline] ip_output+0x198/0x310 net/ipv4/ip_output.c:432 dst_output include/net/dst.h:458 [inline] ip_local_out net/ipv4/ip_output.c:127 [inline] ip_send_skb+0xd3/0x250 net/ipv4/ip_output.c:1486 udp_send_skb+0x731/0x1470 net/ipv4/udp.c:983 udp_sendmsg+0x1de3/0x2a50 net/ipv4/udp.c:1265 udpv6_sendmsg+0x1ac6/0x2f80 net/ipv6/udp.c:1407 inet6_sendmsg+0x9d/0xe0 net/ipv6/af_inet6.c:651 sock_sendmsg_nosec net/socket.c:725 [inline] sock_sendmsg+0xd9/0x180 net/socket.c:748 ____sys_sendmsg+0x2ac/0x940 net/socket.c:2494 ___sys_sendmsg+0x135/0x1d0 net/socket.c:2548 __sys_sendmmsg+0x1a1/0x450 net/socket.c:2634 __do_sys_sendmmsg net/socket.c:2663 [inline] __se_sys_sendmmsg net/socket.c:2660 [inline] __x64_sys_sendmmsg+0x9c/0x100 net/socket.c:2660 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd The buggy address belongs to the object at ffff88802abcf340 which belongs to the cache skbuff_head_cache of size 240 The buggy address is located 52 bytes to the right of allocated 240-byte region [ffff88802abcf340, ffff88802abcf430) The buggy address belongs to the physical page: page:ffffea0000aaf3c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88802abcf0c0 pfn:0x2abcf memcg:ffff88801e96ec01 flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) page_type: 0x4() raw: 00fff00000000200 ffff88801372de00 ffffea0000ba7810 ffffea00013ab010 raw: ffff88802abcf0c0 ffff88802abcf0c0 0000000100000004 ffff88801e96ec01 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2420c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_COMP|__GFP_THISNODE), pid 15161, tgid 15158 (syz-executor.1), ts 1262445155952, free_ts 1258714741787 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x2d2/0x350 mm/page_alloc.c:1570 prep_new_page mm/page_alloc.c:1577 [inline] get_page_from_freelist+0x10a9/0x31e0 mm/page_alloc.c:3221 __alloc_pages_slowpath.constprop.0+0x2dd/0x2360 mm/page_alloc.c:4011 __alloc_pages+0x411/0x4a0 mm/page_alloc.c:4490 __alloc_pages_node include/linux/gfp.h:237 [inline] kmem_getpages mm/slab.c:1356 [inline] cache_grow_begin+0x99/0x3a0 mm/slab.c:2550 cache_alloc_refill+0x294/0x3a0 mm/slab.c:2923 ____cache_alloc mm/slab.c:2999 [inline] ____cache_alloc mm/slab.c:2982 [inline] __do_cache_alloc mm/slab.c:3182 [inline] slab_alloc_node mm/slab.c:3230 [inline] kmem_cache_alloc_node+0x487/0x540 mm/slab.c:3509 __alloc_skb+0x287/0x330 net/core/skbuff.c:634 alloc_skb include/linux/skbuff.h:1289 [inline] alloc_skb_with_frags+0x9d/0x700 net/core/skbuff.c:6233 sock_alloc_send_pskb+0x7c8/0x950 net/core/sock.c:2793 sock_alloc_send_skb include/net/sock.h:1871 [inline] __ip6_append_data.isra.0+0x26f5/0x45a0 net/ipv6/ip6_output.c:1701 ip6_make_skb+0x304/0x5a0 net/ipv6/ip6_output.c:2087 udpv6_sendmsg+0x2473/0x2f80 net/ipv6/udp.c:1590 inet6_sendmsg+0x9d/0xe0 net/ipv6/af_inet6.c:651 sock_sendmsg_nosec net/socket.c:725 [inline] sock_sendmsg+0xd9/0x180 net/socket.c:748 ____sys_sendmsg+0x2ac/0x940 net/socket.c:2494 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1161 [inline] free_unref_page_prepare+0x508/0xb90 mm/page_alloc.c:2348 free_unref_page+0x33/0x3b0 mm/page_alloc.c:2443 slab_destroy mm/slab.c:1608 [inline] slabs_destroy+0x85/0xc0 mm/slab.c:1628 cache_flusharray mm/slab.c:3341 [inline] ___cache_free+0x2b6/0x420 mm/slab.c:3404 qlink_free mm/kasan/quarantine.c:166 [inline] qlist_free_all+0x4c/0x1b0 mm/kasan/quarantine.c:185 kasan_quarantine_reduce+0x18b/0x1d0 mm/kasan/quarantine.c:292 __kasan_slab_alloc+0x65/0x90 mm/kasan/common.c:305 kasan_slab_alloc include/linux/kasan.h:186 [inline] slab_post_alloc_hook mm/slab.h:762 [inline] slab_alloc_node mm/slab.c:3237 [inline] __kmem_cache_alloc_node+0x167/0x470 mm/slab.c:3521 __do_kmalloc_node mm/slab_common.c:984 [inline] __kmalloc+0x4c/0x100 mm/slab_common.c:998 kmalloc include/linux/slab.h:586 [inline] kzalloc include/linux/slab.h:703 [inline] tomoyo_encode2+0x100/0x3d0 security/tomoyo/realpath.c:45 tomoyo_encode+0x29/0x50 security/tomoyo/realpath.c:80 tomoyo_path_perm+0x3a4/0x450 security/tomoyo/file.c:831 tomoyo_path_symlink+0x98/0xe0 security/tomoyo/tomoyo.c:211 security_path_symlink+0x101/0x160 security/security.c:1747 do_symlinkat+0x120/0x310 fs/namei.c:4501 __do_sys_symlinkat fs/namei.c:4519 [inline] __se_sys_symlinkat fs/namei.c:4516 [inline] __x64_sys_symlinkat+0x97/0xc0 fs/namei.c:4516 Memory state around the buggy address: ffff88802abcf300: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb ffff88802abcf380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff88802abcf400: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc ^ ffff88802abcf480: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88802abcf500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc ==================================================================