================================================================== BUG: KASAN: stack-out-of-bounds in memcmp+0x126/0x160 lib/string.c:768 Read of size 1 at addr ffff88016e2d7ab0 by task syz-executor3/25712 CPU: 1 PID: 25712 Comm: syz-executor3 Not tainted 4.9.135+ #66 ffff88016e2d7398 ffffffff81b42b89 ffffea0005b8b5c0 ffff88016e2d7ab0 0000000000000000 ffff88016e2d7ab0 ffff88016e2d7a98 ffff88016e2d73d0 ffffffff815009ad ffff88016e2d7ab0 0000000000000001 0000000000000000 Call Trace: [<ffffffff81b42b89>] __dump_stack lib/dump_stack.c:15 [inline] [<ffffffff81b42b89>] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [<ffffffff815009ad>] print_address_description+0x6c/0x234 mm/kasan/report.c:256 [<ffffffff81500db7>] kasan_report_error mm/kasan/report.c:355 [inline] [<ffffffff81500db7>] kasan_report.cold.6+0x242/0x2fe mm/kasan/report.c:412 [<ffffffff814f2f64>] __asan_report_load1_noabort+0x14/0x20 mm/kasan/report.c:430 [<ffffffff81b5f686>] memcmp+0x126/0x160 lib/string.c:768 [<ffffffff8263ebe0>] addr_match include/net/xfrm.h:843 [inline] [<ffffffff8263ebe0>] __xfrm6_selector_match net/xfrm/xfrm_policy.c:90 [inline] [<ffffffff8263ebe0>] xfrm_selector_match+0x6a0/0xe40 net/xfrm/xfrm_policy.c:104 [<ffffffff8263f4c7>] xfrm_sk_policy_lookup+0x147/0x430 net/xfrm/xfrm_policy.c:1283 [<ffffffff8263f96c>] xfrm_lookup+0x1bc/0xc00 net/xfrm/xfrm_policy.c:2242 [<ffffffff82641249>] xfrm_lookup_route+0x39/0x140 net/xfrm/xfrm_policy.c:2379 [<ffffffff8269376b>] ip6_dst_lookup_flow+0x17b/0x210 net/ipv6/ip6_output.c:1096 [<ffffffff827101cc>] rawv6_sendmsg+0x8fc/0x2a70 net/ipv6/raw.c:911 [<ffffffff82594bf3>] inet_sendmsg+0x203/0x4d0 net/ipv4/af_inet.c:770 [<ffffffff822a030b>] sock_sendmsg_nosec net/socket.c:648 [inline] [<ffffffff822a030b>] sock_sendmsg+0xbb/0x110 net/socket.c:658 [<ffffffff822a0583>] sock_write_iter+0x223/0x3b0 net/socket.c:856 [<ffffffff81508337>] new_sync_write fs/read_write.c:496 [inline] [<ffffffff81508337>] __vfs_write+0x3d7/0x580 fs/read_write.c:509 [<ffffffff8150ab87>] vfs_write+0x187/0x520 fs/read_write.c:557 [<ffffffff8150e9b9>] SYSC_write fs/read_write.c:604 [inline] [<ffffffff8150e9b9>] SyS_write+0xd9/0x1c0 fs/read_write.c:596 [<ffffffff810056ef>] do_syscall_64+0x19f/0x550 arch/x86/entry/common.c:285 [<ffffffff82816b93>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb The buggy address belongs to the page: page:ffffea0005b8b5c0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x4000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88016e2d7980: 00 00 00 00 00 00 00 00 f2 f2 f2 f2 00 00 f2 f2 ffff88016e2d7a00: f2 f2 f2 f2 00 00 f2 f2 f2 f2 f2 f2 00 00 00 00 >ffff88016e2d7a80: 00 00 00 00 00 00 f2 f2 00 00 00 00 00 00 00 00 ^ ffff88016e2d7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88016e2d7b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 00 00 ==================================================================