==================================================================
BUG: KASAN: slab-out-of-bounds in __ethtool_get_link_ksettings+0x5e/0x170
Read of size 8 at addr ffff88816aecc2f0 by task syz.1.7127/418

CPU: 1 UID: 0 PID: 418 Comm: syz.1.7127 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0xe8/0x150
 print_report+0xba/0x230
 kasan_report+0x117/0x150
 __ethtool_get_link_ksettings+0x5e/0x170
 ib_get_eth_speed+0x180/0x7f0
 rxe_query_port+0x93/0x3d0
 ib_query_port+0x170/0x830
 ib_setup_port_attrs+0x294/0x2380
 add_one_compat_dev+0x448/0x650
 rdma_dev_init_net+0x243/0x2f0
 ops_init+0x35c/0x5c0
 setup_net+0x118/0x340
 copy_net_ns+0x50e/0x730
 create_new_namespaces+0x3e7/0x6a0
 unshare_nsproxy_namespaces+0x11a/0x160
 ksys_unshare+0x51d/0x930
 __x64_sys_unshare+0x38/0x50
 do_syscall_64+0x14d/0xf80
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb27c99c799
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fb27d81f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007fb27cc15fa0 RCX: 00007fb27c99c799
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000062040200
RBP: 00007fb27ca32bd9 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fb27cc16038 R14: 00007fb27cc15fa0 R15: 00007ffdcbf3d4e8
 </TASK>

Allocated by task 418:
 kasan_save_track+0x3e/0x80
 __kasan_kmalloc+0x93/0xb0
 __kmalloc_cache_noprof+0x31c/0x660
 device_add+0xbe/0xb70
 add_one_compat_dev+0x41d/0x650
 rdma_dev_init_net+0x243/0x2f0
 ops_init+0x35c/0x5c0
 setup_net+0x118/0x340
 copy_net_ns+0x50e/0x730
 create_new_namespaces+0x3e7/0x6a0
 unshare_nsproxy_namespaces+0x11a/0x160
 ksys_unshare+0x51d/0x930
 __x64_sys_unshare+0x38/0x50
 do_syscall_64+0x14d/0xf80
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The buggy address belongs to the object at ffff88816aecc000
 which belongs to the cache kmalloc-512 of size 512
The buggy address is located 480 bytes to the right of
 allocated 272-byte region [ffff88816aecc000, ffff88816aecc110)

The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff88816aecc800 pfn:0x16aecc
head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
flags: 0x57ff00000000240(workingset|head|node=1|zone=2|lastcpupid=0x7ff)
page_type: f5(slab)
raw: 057ff00000000240 ffff888100041c80 ffff8881604007c8 ffff8881604007c8
raw: ffff88816aecc800 0000000000100002 00000000f5000000 0000000000000000
head: 057ff00000000240 ffff888100041c80 ffff8881604007c8 ffff8881604007c8
head: ffff88816aecc800 0000000000100002 00000000f5000000 0000000000000000
head: 057ff00000000002 ffffea0005abb301 00000000ffffffff 00000000ffffffff
head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 403, tgid 401 (syz.2.7123), ts 484375208450, free_ts 484337246515
 post_alloc_hook+0x231/0x280
 get_page_from_freelist+0x24dc/0x2580
 __alloc_frozen_pages_noprof+0x18d/0x380
 allocate_slab+0x77/0x660
 refill_objects+0x331/0x3c0
 __pcs_replace_empty_main+0x2b9/0x620
 __kmalloc_cache_noprof+0x392/0x660
 device_add+0xbe/0xb70
 netdev_register_kobject+0x178/0x310
 register_netdevice+0x12c0/0x1cf0
 __ip_tunnel_create+0x3e8/0x560
 ip_tunnel_init_net+0x2e7/0x840
 ops_init+0x35c/0x5c0
 setup_net+0x118/0x340
 copy_net_ns+0x50e/0x730
 create_new_namespaces+0x3e7/0x6a0
page last free pid 422 tgid 417 stack trace:
 __free_frozen_pages+0xc2b/0xdb0
 device_release+0x9e/0x1d0
 kobject_put+0x228/0x560
 netdev_run_todo+0xc75/0xde0
 nl80211_post_doit+0x21d/0x320
 genl_family_rcv_msg_doit+0x26b/0x330
 genl_rcv_msg+0x61c/0x7a0
 netlink_rcv_skb+0x232/0x4b0
 genl_rcv+0x28/0x40
 netlink_unicast+0x80f/0x9b0
 netlink_sendmsg+0x813/0xb40
 ____sys_sendmsg+0x972/0x9f0
 ___sys_sendmsg+0x2a5/0x360
 __x64_sys_sendmsg+0x1bd/0x2a0
 do_syscall_64+0x14d/0xf80
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Memory state around the buggy address:
 ffff88816aecc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff88816aecc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff88816aecc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                                                             ^
 ffff88816aecc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff88816aecc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
==================================================================
