==================================================================
BUG: KASAN: slab-use-after-free in _raw_spin_lock_bh+0x36/0x50
Read of size 1 at addr ffff8881bb6656e8 by task syz.2.1846/13123

CPU: 1 UID: 0 PID: 13123 Comm: syz.2.1846 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0xe8/0x150
 print_address_description+0x55/0x1e0
 print_report+0x58/0x70
 kasan_report+0x117/0x150
 __kasan_check_byte+0x2a/0x40
 lock_acquire+0x84/0x350
 _raw_spin_lock_bh+0x36/0x50
 __lock_sock+0x16a/0x2c0
 lock_sock_nested+0xc7/0x100
 inet_shutdown+0x6a/0x390
 udp_tunnel_sock_release+0x6f/0x80
 rxe_net_del+0x121/0x2e0
 rxe_dellink+0x15/0x20
 nldev_dellink+0x304/0x3d0
 rdma_nl_rcv+0x6d1/0xa10
 netlink_unicast+0x75c/0x8e0
 netlink_sendmsg+0x813/0xb40
 ____sys_sendmsg+0x972/0x9f0
 ___sys_sendmsg+0x2a5/0x360
 __x64_sys_sendmsg+0x1bd/0x2a0
 do_syscall_64+0x15f/0xf80
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb0aff9cdd9
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fb0b0e45028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007fb0b0216090 RCX: 00007fb0aff9cdd9
RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000009
RBP: 00007fb0b0032d69 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fb0b0216128 R14: 00007fb0b0216090 R15: 00007ffd731fc128
 </TASK>

Allocated by task 7178:
 kasan_save_track+0x3e/0x80
 __kasan_slab_alloc+0x6c/0x80
 kmem_cache_alloc_noprof+0x2bc/0x650
 sk_prot_alloc+0x57/0x210
 sk_alloc+0x3a/0x390
 inet_create+0x7a0/0x1000
 __sock_create+0x4b2/0x9d0
 udp_sock_create4+0xca/0x480
 rxe_setup_udp_tunnel+0x151/0x790
 rxe_net_init+0xaf/0x330
 rxe_newlink+0xd3/0x1c0
 nldev_newlink+0x5bc/0x650
 rdma_nl_rcv+0x6d1/0xa10
 netlink_unicast+0x75c/0x8e0
 netlink_sendmsg+0x813/0xb40
 ____sys_sendmsg+0x972/0x9f0
 ___sys_sendmsg+0x2a5/0x360
 __x64_sys_sendmsg+0x1bd/0x2a0
 do_syscall_64+0x15f/0xf80
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 23:
 kasan_save_track+0x3e/0x80
 kasan_save_free_info+0x46/0x50
 __kasan_slab_free+0x5c/0x80
 kmem_cache_free+0x182/0x650
 __sk_destruct+0x739/0x9d0
 rcu_core+0x7cd/0x1070
 handle_softirqs+0x22a/0x840
 run_ksoftirqd+0x36/0x60
 smpboot_thread_fn+0x541/0xa50
 kthread+0x388/0x470
 ret_from_fork+0x514/0xb70
 ret_from_fork_asm+0x1a/0x30

Last potentially related work creation:
 kasan_save_stack+0x3e/0x60
 kasan_record_aux_stack+0xbd/0xd0
 call_rcu+0xee/0x890
 inet_release+0x143/0x190
 sock_release+0x85/0x150
 rxe_net_del+0x121/0x2e0
 rxe_dellink+0x15/0x20
 nldev_dellink+0x304/0x3d0
 rdma_nl_rcv+0x6d1/0xa10
 netlink_unicast+0x75c/0x8e0
 netlink_sendmsg+0x813/0xb40
 ____sys_sendmsg+0x972/0x9f0
 ___sys_sendmsg+0x2a5/0x360
 __x64_sys_sendmsg+0x1bd/0x2a0
 do_syscall_64+0x15f/0xf80
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The buggy address belongs to the object at ffff8881bb665500
 which belongs to the cache UDP of size 2048
The buggy address is located 488 bytes inside of
 freed 2048-byte region [ffff8881bb665500, ffff8881bb665d00)

The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff8881bb661980 pfn:0x1bb660
head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
memcg:ffff888166b38a01
flags: 0x57ff00000000240(workingset|head|node=1|zone=2|lastcpupid=0x7ff)
page_type: f5(slab)
raw: 057ff00000000240 ffff888105e87500 ffffea0006e64810 ffffea0006e67e10
raw: ffff8881bb661980 00000008000f000d 00000000f5000000 ffff888166b38a01
head: 057ff00000000240 ffff888105e87500 ffffea0006e64810 ffffea0006e67e10
head: ffff8881bb661980 00000008000f000d 00000000f5000000 ffff888166b38a01
head: 057ff00000000003 fffffffffffffe01 00000000ffffffff 00000000ffffffff
head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5355, tgid 5355 (dhcpcd), ts 38288399163, free_ts 37733736036
 post_alloc_hook+0x231/0x280
 get_page_from_freelist+0x24ba/0x2540
 __alloc_frozen_pages_noprof+0x18d/0x380
 allocate_slab+0x77/0x660
 refill_objects+0x339/0x3d0
 __pcs_replace_empty_main+0x321/0x720
 kmem_cache_alloc_noprof+0x37d/0x650
 sk_prot_alloc+0x57/0x210
 sk_alloc+0x3a/0x390
 inet_create+0x7a0/0x1000
 __sock_create+0x4b2/0x9d0
 __sys_socket+0xd6/0x1b0
 __x64_sys_socket+0x7a/0x90
 do_syscall_64+0x15f/0xf80
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5334 tgid 5334 stack trace:
 __free_frozen_pages+0xbc7/0xd30
 __slab_free+0x274/0x2c0
 qlist_free_all+0x99/0x100
 kasan_quarantine_reduce+0x148/0x160
 __kasan_slab_alloc+0x22/0x80
 __kmalloc_cache_noprof+0x2ba/0x660
 tomoyo_init_log+0x112e/0x1fb0
 tomoyo_supervisor+0x353/0x1570
 tomoyo_env_perm+0x151/0x1f0
 tomoyo_find_next_domain+0x15cb/0x1aa0
 tomoyo_bprm_check_security+0x11b/0x180
 security_bprm_check+0x85/0x240
 bprm_execve+0x8a4/0x1440
 do_execveat_common+0x50d/0x690
 __x64_sys_execve+0x97/0xc0
 do_syscall_64+0x15f/0xf80

Memory state around the buggy address:
 ffff8881bb665580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff8881bb665600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff8881bb665680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                                          ^
 ffff8881bb665700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff8881bb665780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
