================================================================== BUG: KASAN: global-out-of-bounds in fib6_clean_node+0x35d/0x590 net/ipv6/ip6_fib.c:2198 Read of size 8 at addr ffffffff99d14828 by task syz.1.3097/16604 CPU: 1 UID: 0 PID: 16604 Comm: syz.1.3097 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/29/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xb4/0x290 mm/kasan/report.c:521 kasan_report+0x118/0x150 mm/kasan/report.c:634 fib6_clean_node+0x35d/0x590 net/ipv6/ip6_fib.c:2198 fib6_walk_continue+0x678/0x910 net/ipv6/ip6_fib.c:2124 fib6_walk+0x149/0x290 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x234/0x380 net/ipv6/ip6_fib.c:2268 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x120/0x720 net/ipv6/route.c:4956 addrconf_ifdown+0x15d/0x1880 net/ipv6/addrconf.c:3854 addrconf_notify+0x1bc/0x1010 net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b3/0x3e0 kernel/notifier.c:85 call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] unregister_netdevice_many_notify+0x15d4/0x2330 net/core/dev.c:11982 unregister_netdevice_many net/core/dev.c:12046 [inline] unregister_netdevice_queue+0x33c/0x380 net/core/dev.c:11889 unregister_netdevice include/linux/netdevice.h:3374 [inline] ppp_release+0xed/0x1f0 drivers/net/ppp/ppp_generic.c:422 __fput+0x449/0xa70 fs/file_table.c:465 task_work_run+0x1d1/0x260 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0x8d6/0x2550 kernel/exit.c:953 do_group_exit+0x21c/0x2d0 kernel/exit.c:1102 get_signal+0x125e/0x1310 kernel/signal.c:3034 arch_do_signal_or_restart+0x95/0x780 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x8b/0x120 kernel/entry/common.c:218 __do_fast_syscall_32+0xc1/0x110 arch/x86/entry/syscall_32.c:309 do_fast_syscall_32+0x34/0x80 arch/x86/entry/syscall_32.c:331 entry_SYSENTER_compat_after_hwframe+0x84/0x8e RIP: 0023:0xf704e539 Code: Unable to access opcode bytes at 0xf704e50f. RSP: 002b:00000000f503e60c EFLAGS: 00000206 ORIG_RAX: 00000000000000f0 RAX: fffffffffffffe00 RBX: 00000000f73e4f88 RCX: 0000000000000080 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000f73e4f8c RBP: 0000000000000081 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 The buggy address belongs to the variable: binder_devices+0x8/0x20 The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x19d14 flags: 0xfff00000002000(reserved|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000002000 ffffea0000674508 ffffea0000674508 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?) Memory state around the buggy address: ffffffff99d14700: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 ffffffff99d14780: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 >ffffffff99d14800: f9 f9 f9 f9 00 f9 f9 f9 00 00 f9 f9 00 00 00 00 ^ ffffffff99d14880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffffff99d14900: 00 00 00 00 00 00 00 00 00 00 04 f9 f9 f9 f9 f9 ==================================================================