================================================================== BUG: KASAN: global-out-of-bounds in fib6_clean_node+0x35d/0x590 net/ipv6/ip6_fib.c:2198 Read of size 8 at addr ffffffff99d14828 by task syz.3.6130/26885 CPU: 1 UID: 0 PID: 26885 Comm: syz.3.6130 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/29/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xb4/0x290 mm/kasan/report.c:521 kasan_report+0x118/0x150 mm/kasan/report.c:634 fib6_clean_node+0x35d/0x590 net/ipv6/ip6_fib.c:2198 fib6_walk_continue+0x678/0x910 net/ipv6/ip6_fib.c:2124 fib6_walk+0x149/0x290 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x234/0x380 net/ipv6/ip6_fib.c:2268 rt6_sync_up+0x128/0x160 net/ipv6/route.c:4837 addrconf_notify+0xd55/0x1010 net/ipv6/addrconf.c:3729 notifier_call_chain+0x1b3/0x3e0 kernel/notifier.c:85 netif_state_change+0x284/0x3a0 net/core/dev.c:1530 netdev_state_change+0x10a/0x220 net/core/dev_api.c:342 ip6_tnl0_update net/ipv6/ip6_tunnel.c:1569 [inline] ip6_tnl_siocdevprivate+0x85f/0xad0 net/ipv6/ip6_tunnel.c:1683 dev_siocdevprivate net/core/dev_ioctl.c:521 [inline] dev_ifsioc+0xb54/0xf00 net/core/dev_ioctl.c:631 dev_ioctl+0x84c/0x1150 net/core/dev_ioctl.c:848 sock_ioctl+0x719/0x790 net/socket.c:1236 compat_sock_ioctl_trans net/socket.c:-1 [inline] compat_sock_ioctl+0x285/0xc80 net/socket.c:3507 __do_compat_sys_ioctl fs/ioctl.c:1004 [inline] __se_compat_sys_ioctl fs/ioctl.c:947 [inline] __ia32_compat_sys_ioctl+0x551/0x840 fs/ioctl.c:947 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0xb4/0x110 arch/x86/entry/syscall_32.c:306 do_fast_syscall_32+0x34/0x80 arch/x86/entry/syscall_32.c:331 entry_SYSENTER_compat_after_hwframe+0x84/0x8e RIP: 0023:0xf70ae539 Code: 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 002b:00000000f505c55c EFLAGS: 00000206 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00000000000089f3 RDX: 0000000080000140 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 The buggy address belongs to the variable: binder_devices+0x8/0x20 The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x19d14 flags: 0xfff00000002000(reserved|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000002000 ffffea0000674508 ffffea0000674508 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?) Memory state around the buggy address: ffffffff99d14700: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 ffffffff99d14780: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 >ffffffff99d14800: f9 f9 f9 f9 00 f9 f9 f9 00 00 f9 f9 00 00 00 00 ^ ffffffff99d14880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffffff99d14900: 00 00 00 00 00 00 00 00 00 00 04 f9 f9 f9 f9 f9 ================================================================== ---------------- Code disassembly (best guess): 0: 03 74 b4 01 add 0x1(%rsp,%rsi,4),%esi 4: 10 07 adc %al,(%rdi) 6: 03 74 b0 01 add 0x1(%rax,%rsi,4),%esi a: 10 08 adc %cl,(%rax) c: 03 74 d8 01 add 0x1(%rax,%rbx,8),%esi 20: 00 51 52 add %dl,0x52(%rcx) 23: 55 push %rbp 24: 89 e5 mov %esp,%ebp 26: 0f 34 sysenter 28: cd 80 int $0x80 * 2a: 5d pop %rbp <-- trapping instruction 2b: 5a pop %rdx 2c: 59 pop %rcx 2d: c3 ret 2e: 90 nop 2f: 90 nop 30: 90 nop 31: 90 nop 32: 90 nop 33: 90 nop 34: 90 nop 35: 90 nop 36: 90 nop 37: 90 nop 38: 90 nop 39: 90 nop 3a: 90 nop 3b: 90 nop 3c: 90 nop 3d: 90 nop 3e: 90 nop 3f: 90 nop