================================================================== BUG: KASAN: stack-out-of-bounds in memcmp+0x126/0x160 lib/string.c:768 Read of size 1 at addr ffff8801d0f67880 by task syz-executor2/8055 CPU: 1 PID: 8055 Comm: syz-executor2 Not tainted 4.9.132+ #103 ffff8801d0f67340 ffffffff81b371b9 ffffea000743d9c0 ffff8801d0f67880 0000000000000000 ffff8801d0f67880 ffff8801d0f67868 ffff8801d0f67378 ffffffff81500bad ffff8801d0f67880 0000000000000001 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_address_description+0x6c/0x234 mm/kasan/report.c:256 netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [] kasan_report_error mm/kasan/report.c:355 [inline] [] kasan_report.cold.6+0x242/0x2fe mm/kasan/report.c:412 [] __asan_report_load1_noabort+0x14/0x20 mm/kasan/report.c:430 [] memcmp+0x126/0x160 lib/string.c:768 [] addr_match include/net/xfrm.h:833 [inline] [] __xfrm6_selector_match net/xfrm/xfrm_policy.c:87 [inline] [] xfrm_selector_match+0x6a0/0xe40 net/xfrm/xfrm_policy.c:101 [] xfrm_sk_policy_lookup+0x143/0x3c0 net/xfrm/xfrm_policy.c:1268 [] xfrm_lookup+0x1bd/0xb70 net/xfrm/xfrm_policy.c:2220 [] xfrm_lookup_route+0x39/0x140 net/xfrm/xfrm_policy.c:2354 [] ip6_dst_lookup_flow+0x17b/0x210 net/ipv6/ip6_output.c:1096 [] tcp_v6_connect+0xd34/0x1ad0 net/ipv6/tcp_ipv6.c:248 [] __inet_stream_connect+0x6e0/0xbf0 net/ipv4/af_inet.c:627 [] tcp_sendmsg_fastopen net/ipv4/tcp.c:1116 [inline] [] tcp_sendmsg+0x218a/0x2fd0 net/ipv4/tcp.c:1145 [] inet_sendmsg+0x203/0x4d0 net/ipv4/af_inet.c:770 [] sock_sendmsg_nosec net/socket.c:648 [inline] [] sock_sendmsg+0xbb/0x110 net/socket.c:658 [] SYSC_sendto net/socket.c:1683 [inline] [] SyS_sendto+0x220/0x370 net/socket.c:1651 [] do_syscall_64+0x19f/0x550 arch/x86/entry/common.c:285 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb The buggy address belongs to the page: page:ffffea000743d9c0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x4000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801d0f67780: 00 00 f1 f1 f1 f1 04 f2 f2 f2 f2 f2 f2 f2 00 00 ffff8801d0f67800: f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 >ffff8801d0f67880: f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff8801d0f67900: 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 00 ffff8801d0f67980: f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================