bridge0: port 1(bridge_slave_0) entered disabled state bridge0: port 1(bridge_slave_0) entered blocking state bridge0: port 1(bridge_slave_0) entered forwarding state ================================================================== BUG: KASAN: slab-out-of-bounds in _decode_session6+0xd50/0x13a0 net/ipv6/xfrm6_policy.c:137 Read of size 1 at addr ffff8880459b3f54 by task syz-executor.4/27518 CPU: 1 PID: 27518 Comm: syz-executor.4 Not tainted 4.19.108-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x188/0x20d lib/dump_stack.c:118 print_address_description.cold+0x7c/0x212 mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report mm/kasan/report.c:412 [inline] kasan_report.cold+0x88/0x2b9 mm/kasan/report.c:396 _decode_session6+0xd50/0x13a0 net/ipv6/xfrm6_policy.c:137 __xfrm_decode_session+0x5a/0x130 net/xfrm/xfrm_policy.c:2302 xfrm_decode_session include/net/xfrm.h:1237 [inline] vti_tunnel_xmit+0x268/0x170b net/ipv4/ip_vti.c:299 __netdev_start_xmit include/linux/netdevice.h:4314 [inline] netdev_start_xmit include/linux/netdevice.h:4323 [inline] xmit_one net/core/dev.c:3258 [inline] dev_hard_start_xmit+0x1a4/0x950 net/core/dev.c:3274 sch_direct_xmit+0x345/0xfc0 net/sched/sch_generic.c:332 qdisc_restart net/sched/sch_generic.c:395 [inline] __qdisc_run+0x4df/0x1720 net/sched/sch_generic.c:403 __dev_xmit_skb net/core/dev.c:3502 [inline] __dev_queue_xmit+0x167f/0x3040 net/core/dev.c:3812 neigh_output include/net/neighbour.h:501 [inline] ip6_finish_output2+0xb7f/0x2540 net/ipv6/ip6_output.c:120 ip6_finish_output+0x571/0xbe0 net/ipv6/ip6_output.c:154 NF_HOOK_COND include/linux/netfilter.h:278 [inline] ip6_output+0x209/0x760 net/ipv6/ip6_output.c:171 dst_output include/net/dst.h:447 [inline] NF_HOOK include/linux/netfilter.h:289 [inline] ndisc_send_skb+0xf5c/0x1470 net/ipv6/ndisc.c:491 ndisc_send_rs+0x131/0x690 net/ipv6/ndisc.c:685 addrconf_rs_timer+0x30f/0x680 net/ipv6/addrconf.c:3825 call_timer_fn+0x177/0x700 kernel/time/timer.c:1326 expire_timers kernel/time/timer.c:1363 [inline] __run_timers kernel/time/timer.c:1684 [inline] __run_timers kernel/time/timer.c:1652 [inline] run_timer_softirq+0x5d0/0x1540 kernel/time/timer.c:1697 __do_softirq+0x26c/0x93c kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x17b/0x1c0 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:544 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1094 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893 RIP: 0010:deref_stack_regs arch/x86/kernel/unwind_orc.c:349 [inline] RIP: 0010:unwind_next_frame+0xe88/0x18a0 arch/x86/kernel/unwind_orc.c:489 Code: e2 07 38 d0 7f 08 84 c0 0f 85 fb 05 00 00 41 c6 47 35 01 e9 b2 f5 ff ff 48 8b 74 24 60 ba a8 00 00 00 4c 89 ff 4c 89 44 24 28 <48> 89 4c 24 20 48 89 74 24 18 e8 69 ed ff ff 84 c0 0f 84 0b 03 00 RSP: 0018:ffff888046eef5c0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000001 RBX: 1ffff11008dddec0 RCX: ffffffff8a5d6980 RDX: 00000000000000a8 RSI: ffff888046eeff58 RDI: ffff888046eef698 RBP: 0000000000000001 R08: ffffffff8a5d6984 R09: 0000000000000001 R10: 00000000001385a7 R11: 0000000000064071 R12: ffff888046eef6e0 R13: ffff888046eef6cd R14: ffff888046eef6d0 R15: ffff888046eef698 __save_stack_trace+0x7a/0xf0 arch/x86/kernel/stacktrace.c:44 save_stack+0x32/0xa0 mm/kasan/kasan.c:448 set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc mm/kasan/kasan.c:553 [inline] kasan_kmalloc+0xbf/0xe0 mm/kasan/kasan.c:531 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc mm/slab.c:3397 [inline] kmem_cache_alloc_trace+0x137/0x7a0 mm/slab.c:3623 kmalloc include/linux/slab.h:515 [inline] kzalloc include/linux/slab.h:709 [inline] inetdev_init+0x66/0x460 net/ipv4/devinet.c:252 inetdev_event+0xe95/0x1290 net/ipv4/devinet.c:1471 notifier_call_chain+0xc0/0x230 kernel/notifier.c:93 call_netdevice_notifiers net/core/dev.c:1766 [inline] register_netdevice+0x9b0/0xf50 net/core/dev.c:8738 register_netdev+0x2d/0x50 net/core/dev.c:8829 ip6_tnl_init_net+0x52d/0x830 net/ipv6/ip6_tunnel.c:2247 ops_init+0xaf/0x410 net/core/net_namespace.c:129 setup_net+0x2c2/0x6f0 net/core/net_namespace.c:315 copy_net_ns+0x1d9/0x331 net/core/net_namespace.c:438 create_new_namespaces+0x3fb/0x7c0 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xbd/0x1f0 kernel/nsproxy.c:206 ksys_unshare+0x439/0x8d0 kernel/fork.c:2530 __do_sys_unshare kernel/fork.c:2598 [inline] __se_sys_unshare kernel/fork.c:2596 [inline] __x64_sys_unshare+0x2d/0x40 kernel/fork.c:2596 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45c4a9 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f69a70f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 00007f69a70fa6d4 RCX: 000000000045c4a9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 0000000000000c3e R14: 00000000004ce282 R15: 000000000076bf2c Allocated by task 21249: set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc mm/kasan/kasan.c:553 [inline] kasan_kmalloc+0xbf/0xe0 mm/kasan/kasan.c:531 kmem_cache_alloc+0x127/0x710 mm/slab.c:3559 getname_kernel+0x4e/0x370 fs/namei.c:220 open_exec+0x13/0x70 fs/exec.c:881 load_elf_binary+0x815/0x4e60 fs/binfmt_elf.c:780 search_binary_handler fs/exec.c:1653 [inline] search_binary_handler+0x177/0x570 fs/exec.c:1631 exec_binprm fs/exec.c:1695 [inline] __do_execve_file.isra.0+0x11fa/0x2110 fs/exec.c:1819 do_execveat_common fs/exec.c:1866 [inline] do_execve fs/exec.c:1883 [inline] __do_sys_execve fs/exec.c:1964 [inline] __se_sys_execve fs/exec.c:1959 [inline] __x64_sys_execve+0x8a/0xb0 fs/exec.c:1959 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe Freed by task 21249: set_track mm/kasan/kasan.c:460 [inline] __kasan_slab_free+0xf7/0x140 mm/kasan/kasan.c:521 __cache_free mm/slab.c:3503 [inline] kmem_cache_free+0x7f/0x260 mm/slab.c:3765 putname+0xe1/0x120 fs/namei.c:261 open_exec+0x4d/0x70 fs/exec.c:886 load_elf_binary+0x815/0x4e60 fs/binfmt_elf.c:780 search_binary_handler fs/exec.c:1653 [inline] search_binary_handler+0x177/0x570 fs/exec.c:1631 exec_binprm fs/exec.c:1695 [inline] __do_execve_file.isra.0+0x11fa/0x2110 fs/exec.c:1819 do_execveat_common fs/exec.c:1866 [inline] do_execve fs/exec.c:1883 [inline] __do_sys_execve fs/exec.c:1964 [inline] __se_sys_execve fs/exec.c:1959 [inline] __x64_sys_execve+0x8a/0xb0 fs/exec.c:1959 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe The buggy address belongs to the object at ffff8880459b2bc0 which belongs to the cache names_cache of size 4096 The buggy address is located 916 bytes to the right of 4096-byte region [ffff8880459b2bc0, ffff8880459b3bc0) The buggy address belongs to the page: page:ffffea0001166c80 count:1 mapcount:0 mapping:ffff88821bc46800 index:0x0 compound_mapcount: 0 flags: 0xfffe0000008100(slab|head) raw: 00fffe0000008100 ffffea0001042c88 ffffea000257ba08 ffff88821bc46800 raw: 0000000000000000 ffff8880459b2bc0 0000000100000001 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8880459b3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8880459b3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff8880459b3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff8880459b3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8880459b4000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ==================================================================