================================================================== BUG: KASAN: slab-out-of-bounds in read_pnet include/net/net_namespace.h:414 [inline] BUG: KASAN: slab-out-of-bounds in dev_net include/linux/netdevice.h:2738 [inline] BUG: KASAN: slab-out-of-bounds in nf_hook_entry_head+0x2fe/0x310 net/netfilter/core.c:319 Read of size 8 at addr ffff888054150108 by task kworker/u32:8/1160 CPU: 1 UID: 0 PID: 1160 Comm: kworker/u32:8 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: netns cleanup_net Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xcd/0x630 mm/kasan/report.c:482 kasan_report+0xe0/0x110 mm/kasan/report.c:595 read_pnet include/net/net_namespace.h:414 [inline] dev_net include/linux/netdevice.h:2738 [inline] nf_hook_entry_head+0x2fe/0x310 net/netfilter/core.c:319 __nf_unregister_net_hook+0x7e/0x660 net/netfilter/core.c:491 nf_unregister_net_hook+0xd5/0x110 net/netfilter/core.c:536 nft_unregister_flowtable_ops net/netfilter/nf_tables_api.c:9038 [inline] __nft_unregister_flowtable_net_hooks+0xfc/0x3f0 net/netfilter/nf_tables_api.c:9053 __nft_release_hook+0x26e/0x350 net/netfilter/nf_tables_api.c:12035 __nft_release_hooks net/netfilter/nf_tables_api.c:12049 [inline] nf_tables_pre_exit_net+0xc5/0x120 net/netfilter/nf_tables_api.c:12200 ops_pre_exit_list net/core/net_namespace.c:161 [inline] ops_undo_list+0x187/0xab0 net/core/net_namespace.c:234 cleanup_net+0x41b/0x830 net/core/net_namespace.c:696 process_one_work+0x9ba/0x1b20 kernel/workqueue.c:3257 process_scheduled_works kernel/workqueue.c:3340 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3421 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x983/0xb10 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 Allocated by task 33: kasan_save_stack+0x33/0x60 mm/kasan/common.c:57 kasan_save_track+0x14/0x30 mm/kasan/common.c:78 unpoison_slab_object mm/kasan/common.c:340 [inline] __kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:366 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4953 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_node_noprof+0x298/0x800 mm/slub.c:5315 __alloc_skb+0x156/0x410 net/core/skbuff.c:679 alloc_skb include/linux/skbuff.h:1383 [inline] synproxy_send_client_synack_ipv6+0x1af/0x7e0 net/netfilter/nf_synproxy_core.c:873 nft_synproxy_eval_v6 net/netfilter/nft_synproxy.c:90 [inline] nft_synproxy_do_eval+0x93b/0xd80 net/netfilter/nft_synproxy.c:145 expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline] nft_do_chain+0x2e9/0x1920 net/netfilter/nf_tables_core.c:285 nft_do_chain_inet+0x18a/0x340 net/netfilter/nft_chain_filter.c:161 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_slow+0xbe/0x200 net/netfilter/core.c:623 nf_hook.constprop.0+0x424/0x750 include/linux/netfilter.h:273 NF_HOOK include/linux/netfilter.h:316 [inline] ip6_input+0xe0/0x2f0 net/ipv6/ip6_input.c:500 dst_input include/net/dst.h:474 [inline] ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline] NF_HOOK include/linux/netfilter.h:318 [inline] NF_HOOK include/linux/netfilter.h:312 [inline] ipv6_rcv+0x264/0x650 net/ipv6/ip6_input.c:311 __netif_receive_skb_one_core+0x12d/0x1e0 net/core/dev.c:6139 __netif_receive_skb+0x1d/0x160 net/core/dev.c:6252 process_backlog+0x4a2/0x1650 net/core/dev.c:6604 __napi_poll.constprop.0+0xb3/0x540 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x9f9/0xfa0 net/core/dev.c:7883 handle_softirqs+0x219/0x950 kernel/softirq.c:622 run_ksoftirqd kernel/softirq.c:1063 [inline] run_ksoftirqd+0x3a/0x60 kernel/softirq.c:1055 smpboot_thread_fn+0x3f7/0xae0 kernel/smpboot.c:160 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x983/0xb10 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 Freed by task 33: kasan_save_stack+0x33/0x60 mm/kasan/common.c:57 kasan_save_track+0x14/0x30 mm/kasan/common.c:78 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:584 poison_slab_object mm/kasan/common.c:253 [inline] __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:285 kasan_slab_free include/linux/kasan.h:235 [inline] slab_free_hook mm/slub.c:2540 [inline] slab_free mm/slub.c:6670 [inline] kmem_cache_free+0x2d8/0x770 mm/slub.c:6781 kfree_skbmem+0x1a4/0x1f0 net/core/skbuff.c:1130 __kfree_skb net/core/skbuff.c:1197 [inline] consume_skb net/core/skbuff.c:1428 [inline] consume_skb+0xcc/0x100 net/core/skbuff.c:1422 nft_synproxy_eval_v6 net/netfilter/nft_synproxy.c:91 [inline] nft_synproxy_do_eval+0x943/0xd80 net/netfilter/nft_synproxy.c:145 expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline] nft_do_chain+0x2e9/0x1920 net/netfilter/nf_tables_core.c:285 nft_do_chain_inet+0x18a/0x340 net/netfilter/nft_chain_filter.c:161 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_slow+0xbe/0x200 net/netfilter/core.c:623 nf_hook.constprop.0+0x424/0x750 include/linux/netfilter.h:273 NF_HOOK include/linux/netfilter.h:316 [inline] ip6_input+0xe0/0x2f0 net/ipv6/ip6_input.c:500 dst_input include/net/dst.h:474 [inline] ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline] NF_HOOK include/linux/netfilter.h:318 [inline] NF_HOOK include/linux/netfilter.h:312 [inline] ipv6_rcv+0x264/0x650 net/ipv6/ip6_input.c:311 __netif_receive_skb_one_core+0x12d/0x1e0 net/core/dev.c:6139 __netif_receive_skb+0x1d/0x160 net/core/dev.c:6252 process_backlog+0x4a2/0x1650 net/core/dev.c:6604 __napi_poll.constprop.0+0xb3/0x540 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x9f9/0xfa0 net/core/dev.c:7883 handle_softirqs+0x219/0x950 kernel/softirq.c:622 run_ksoftirqd kernel/softirq.c:1063 [inline] run_ksoftirqd+0x3a/0x60 kernel/softirq.c:1055 smpboot_thread_fn+0x3f7/0xae0 kernel/smpboot.c:160 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x983/0xb10 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 The buggy address belongs to the object at ffff888054150000 which belongs to the cache skbuff_head_cache of size 240 The buggy address is located 24 bytes to the right of allocated 240-byte region [ffff888054150000, ffff8880541500f0) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x54150 head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) page_type: f5(slab) raw: 00fff00000000040 ffff8881016de8c0 ffffea0000f35480 dead000000000002 raw: 0000000000000000 0000000000190019 00000000f5000000 0000000000000000 head: 00fff00000000040 ffff8881016de8c0 ffffea0000f35480 dead000000000002 head: 0000000000000000 0000000000190019 00000000f5000000 0000000000000000 head: 00fff00000000001 ffffea0001505401 00000000ffffffff 00000000ffffffff head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 1, migratetype Unmovable, gfp_mask 0x52820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 15, tgid 15 (ksoftirqd/0), ts 94517735489, free_ts 94494086931 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1af/0x220 mm/page_alloc.c:1857 prep_new_page mm/page_alloc.c:1865 [inline] get_page_from_freelist+0xd0b/0x31a0 mm/page_alloc.c:3915 __alloc_frozen_pages_noprof+0x25f/0x2430 mm/page_alloc.c:5210 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2486 alloc_slab_page mm/slub.c:3075 [inline] allocate_slab mm/slub.c:3248 [inline] new_slab+0x2c3/0x430 mm/slub.c:3302 ___slab_alloc+0xe18/0x1c90 mm/slub.c:4656 __slab_alloc.constprop.0+0x63/0x110 mm/slub.c:4779 __slab_alloc_node mm/slub.c:4855 [inline] slab_alloc_node mm/slub.c:5251 [inline] kmem_cache_alloc_noprof+0x44d/0x770 mm/slub.c:5270 skb_clone+0x190/0x3f0 net/core/skbuff.c:2087 packet_rcv+0x610/0x17a0 net/packet/af_packet.c:2164 deliver_skb+0x1ae/0x260 net/core/dev.c:2473 dev_queue_xmit_nit+0x5ea/0xac0 net/core/dev.c:2549 xmit_one net/core/dev.c:3849 [inline] dev_hard_start_xmit+0x56b/0x6e0 net/core/dev.c:3869 __dev_queue_xmit+0x6d7/0x46b0 net/core/dev.c:4819 dev_queue_xmit include/linux/netdevice.h:3381 [inline] neigh_hh_output include/net/neighbour.h:540 [inline] neigh_output include/net/neighbour.h:554 [inline] ip_finish_output2+0xc38/0x21a0 net/ipv4/ip_output.c:237 __ip_finish_output.part.0+0x1b4/0x350 net/ipv4/ip_output.c:315 page last free pid 7548 tgid 7546 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1406 [inline] __free_frozen_pages+0x7df/0x1170 mm/page_alloc.c:2943 discard_slab mm/slub.c:3346 [inline] __put_partials+0x130/0x170 mm/slub.c:3886 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x4c/0xf0 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x195/0x1e0 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:350 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4953 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_noprof+0x25e/0x770 mm/slub.c:5270 getname_flags.part.0+0x4c/0x550 fs/namei.c:146 getname_flags+0x93/0xf0 include/linux/audit.h:345 getname include/linux/fs.h:2498 [inline] do_sys_openat2+0xb9/0x290 fs/open.c:1426 do_sys_open fs/open.c:1436 [inline] __do_sys_openat fs/open.c:1452 [inline] __se_sys_openat fs/open.c:1447 [inline] __x64_sys_openat+0x174/0x210 fs/open.c:1447 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Memory state around the buggy address: ffff888054150000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff888054150080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc >ffff888054150100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb ^ ffff888054150180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff888054150200: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc ==================================================================