audit: type=1400 audit(1542510094.887:5012): avc: denied { dac_override } for pid=22006 comm="syz-executor3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1542510094.887:5013): avc: denied { read } for pid=22012 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 ================================================================== BUG: KASAN: stack-out-of-bounds in memcmp+0x126/0x160 lib/string.c:768 Read of size 1 at addr ffff8801a28f7880 by task syz-executor4/22031 CPU: 0 PID: 22031 Comm: syz-executor4 Not tainted 4.9.135+ #117 ffff8801a28f7350 ffffffff81b42b89 ffffea00068a3dc0 ffff8801a28f7880 0000000000000000 ffff8801a28f7880 ffff8801a28f7868 ffff8801a28f7388 ffffffff815009ad ffff8801a28f7880 0000000000000001 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_address_description+0x6c/0x234 mm/kasan/report.c:256 [] kasan_report_error mm/kasan/report.c:355 [inline] [] kasan_report.cold.6+0x242/0x2fe mm/kasan/report.c:412 [] __asan_report_load1_noabort+0x14/0x20 mm/kasan/report.c:430 [] memcmp+0x126/0x160 lib/string.c:768 [] addr_match include/net/xfrm.h:843 [inline] [] __xfrm6_selector_match net/xfrm/xfrm_policy.c:90 [inline] [] xfrm_selector_match+0x6a0/0xe40 net/xfrm/xfrm_policy.c:104 [] xfrm_sk_policy_lookup+0x147/0x430 net/xfrm/xfrm_policy.c:1283 [] xfrm_lookup+0x1bc/0xc00 net/xfrm/xfrm_policy.c:2242 [] xfrm_lookup_route+0x39/0x140 net/xfrm/xfrm_policy.c:2379 [] ip6_dst_lookup_flow+0x17b/0x210 net/ipv6/ip6_output.c:1096 [] tcp_v6_connect+0xd34/0x1ad0 net/ipv6/tcp_ipv6.c:248 [] __inet_stream_connect+0x6e0/0xbf0 net/ipv4/af_inet.c:627 [] tcp_sendmsg_fastopen net/ipv4/tcp.c:1116 [inline] [] tcp_sendmsg+0x218a/0x2fd0 net/ipv4/tcp.c:1145 [] inet_sendmsg+0x203/0x4d0 net/ipv4/af_inet.c:770 [] sock_sendmsg_nosec net/socket.c:648 [inline] [] sock_sendmsg+0xbb/0x110 net/socket.c:658 [] SYSC_sendto net/socket.c:1683 [inline] [] SyS_sendto+0x220/0x370 net/socket.c:1651 [] do_syscall_64+0x19f/0x550 arch/x86/entry/common.c:285 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb The buggy address belongs to the page: page:ffffea00068a3dc0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x4000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801a28f7780: 00 00 f1 f1 f1 f1 04 f2 f2 f2 f2 f2 f2 f2 00 00 ffff8801a28f7800: f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 >ffff8801a28f7880: f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff8801a28f7900: 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 00 ffff8801a28f7980: f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================