netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. ================================================================== BUG: KASAN: use-after-free in ifname_compare_aligned include/linux/netfilter/x_tables.h:369 [inline] BUG: KASAN: use-after-free in ip6_packet_match net/ipv6/netfilter/ip6_tables.c:89 [inline] BUG: KASAN: use-after-free in ip6t_do_table+0x14e2/0x17e0 net/ipv6/netfilter/ip6_tables.c:333 Read of size 8 at addr ffff88017c820000 by task syz-executor.2/19242 CPU: 0 PID: 19242 Comm: syz-executor.2 Not tainted 4.9.141+ #1 ffff8801caa5f080 ffffffff81b42e79 ffffea0005f20800 ffff88017c820000 0000000000000000 ffff88017c820000 dffffc0000000000 ffff8801caa5f0b8 ffffffff815009b8 ffff88017c820000 0000000000000008 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_address_description+0x6c/0x234 mm/kasan/report.c:256 [] kasan_report_error mm/kasan/report.c:355 [inline] [] kasan_report.cold.6+0x242/0x2fe mm/kasan/report.c:412 [] __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:433 [] ifname_compare_aligned include/linux/netfilter/x_tables.h:369 [inline] [] ip6_packet_match net/ipv6/netfilter/ip6_tables.c:89 [inline] [] ip6t_do_table+0x14e2/0x17e0 net/ipv6/netfilter/ip6_tables.c:333 [] ip6table_raw_hook+0x65/0x80 net/ipv6/netfilter/ip6table_raw.c:28 [] nf_iterate+0x126/0x310 net/netfilter/core.c:324 [] nf_hook_slow+0x114/0x1e0 net/netfilter/core.c:355 [] nf_hook_thresh include/linux/netfilter.h:191 [inline] [] nf_hook include/linux/netfilter.h:203 [inline] [] __ip6_local_out+0x484/0x620 net/ipv6/output_core.c:164 [] ip6_local_out+0x29/0x180 net/ipv6/output_core.c:174 [] ip6_send_skb+0xa1/0x340 net/ipv6/ip6_output.c:1751 [] udp_v6_send_skb+0x429/0xe70 net/ipv6/udp.c:974 [] udp_v6_push_pending_frames+0x22d/0x340 net/ipv6/udp.c:1007 [] udpv6_sendmsg+0x1dc1/0x2430 net/ipv6/udp.c:1273 [] inet_sendmsg+0x203/0x4d0 net/ipv4/af_inet.c:770 [] sock_sendmsg_nosec net/socket.c:648 [inline] [] sock_sendmsg+0xbb/0x110 net/socket.c:658 [] ___sys_sendmsg+0x47a/0x840 net/socket.c:1982 [] __sys_sendmmsg+0x161/0x3d0 net/socket.c:2072 [] SYSC_sendmmsg net/socket.c:2103 [inline] [] SyS_sendmmsg+0x35/0x60 net/socket.c:2098 [] do_syscall_64+0x19f/0x550 arch/x86/entry/common.c:285 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb The buggy address belongs to the page: page:ffffea0005f20800 count:0 mapcount:-127 mapping: (null) index:0x0 flags: 0x4000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88017c81ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff88017c81ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff88017c820000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88017c820080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88017c820100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================