================================================================== BUG: KASAN: stack-out-of-bounds in memcmp+0x126/0x160 lib/string.c:768 Read of size 1 at addr ffff8801db707718 by task syz-executor3/9722 CPU: 1 PID: 9722 Comm: syz-executor3 Not tainted 4.9.131+ #50 ffff8801db7072f8 ffffffff81b37029 ffffea00076dc1c0 ffff8801db707718 0000000000000000 ffff8801db707718 ffff8801db707700 ffff8801db707330 ffffffff81500aed ffff8801db707718 0000000000000001 0000000000000000 Call Trace: [ 181.421369] [] __dump_stack lib/dump_stack.c:15 [inline] [ 181.421369] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_address_description+0x6c/0x234 mm/kasan/report.c:256 [] kasan_report_error mm/kasan/report.c:355 [inline] [] kasan_report.cold.6+0x242/0x2fe mm/kasan/report.c:412 [] __asan_report_load1_noabort+0x14/0x20 mm/kasan/report.c:430 [] memcmp+0x126/0x160 lib/string.c:768 [] addr_match include/net/xfrm.h:833 [inline] [] __xfrm6_selector_match net/xfrm/xfrm_policy.c:87 [inline] [] xfrm_selector_match+0x6a0/0xe40 net/xfrm/xfrm_policy.c:101 [] xfrm_policy_match net/xfrm/xfrm_policy.c:1105 [inline] [] xfrm_policy_lookup_bytype.constprop.16+0xde3/0x1250 net/xfrm/xfrm_policy.c:1158 [] __xfrm_policy_lookup net/xfrm/xfrm_policy.c:1193 [inline] [] xfrm_policy_lookup+0x54/0xb0 net/xfrm/xfrm_policy.c:1223 [] flow_cache_lookup+0x9db/0x1090 net/core/flow.c:273 [] __xfrm_policy_check+0x9ac/0x1760 net/xfrm/xfrm_policy.c:2512 [] __xfrm_policy_check2 include/net/xfrm.h:1063 [inline] [] xfrm_policy_check include/net/xfrm.h:1072 [inline] [] xfrm6_policy_check include/net/xfrm.h:1082 [inline] [] rawv6_rcv+0x5c4/0xff0 net/ipv6/raw.c:419 [] ipv6_raw_deliver net/ipv6/raw.c:219 [inline] [] raw6_local_deliver+0x36f/0x850 net/ipv6/raw.c:235 [] ip6_input_finish+0x441/0x1560 net/ipv6/ip6_input.c:241 [] NF_HOOK_THRESH include/linux/netfilter.h:232 [inline] [] NF_HOOK include/linux/netfilter.h:255 [inline] [] ip6_input+0x1c1/0x350 net/ipv6/ip6_input.c:322 [] dst_input include/net/dst.h:513 [inline] [] ip6_rcv_finish+0x155/0x680 net/ipv6/ip6_input.c:69 [] NF_HOOK_THRESH include/linux/netfilter.h:232 [inline] [] NF_HOOK include/linux/netfilter.h:255 [inline] [] ipv6_rcv+0x1057/0x1e60 net/ipv6/ip6_input.c:203 [] __netif_receive_skb_core+0x12b5/0x2960 net/core/dev.c:4267 [] __netif_receive_skb+0x5b/0x1c0 net/core/dev.c:4305 [] process_backlog+0x1f0/0x650 net/core/dev.c:4926 [] napi_poll net/core/dev.c:5227 [inline] [] net_rx_action+0x3a4/0xe00 net/core/dev.c:5292 [] __do_softirq+0x210/0x940 kernel/softirq.c:288 [] do_softirq_own_stack+0x1c/0x30 arch/x86/entry/entry_64.S:843 [ 181.784366] [] do_softirq.part.1+0x62/0x70 kernel/softirq.c:332 [] do_softirq arch/x86/include/asm/preempt.h:22 [inline] [] __local_bh_enable_ip+0xc8/0xd0 kernel/softirq.c:185 [] local_bh_enable include/linux/bottom_half.h:31 [inline] [] rcu_read_unlock_bh include/linux/rcupdate.h:971 [inline] [] ip6_finish_output2+0xb55/0x1d10 net/ipv6/ip6_output.c:120 [] ip6_finish_output+0x334/0x980 net/ipv6/ip6_output.c:145 [] NF_HOOK_COND include/linux/netfilter.h:246 [inline] [] ip6_output+0x1ea/0x6d0 net/ipv6/ip6_output.c:162 [] dst_output include/net/dst.h:507 [inline] [] ip6_local_out+0x9b/0x180 net/ipv6/output_core.c:176 [] ip6_send_skb+0xa1/0x340 net/ipv6/ip6_output.c:1751 [] ip6_push_pending_frames+0xb3/0xe0 net/ipv6/ip6_output.c:1771 [] rawv6_push_pending_frames net/ipv6/raw.c:611 [inline] [] rawv6_sendmsg+0x1f36/0x2810 net/ipv6/raw.c:927 [] inet_sendmsg+0x203/0x4d0 net/ipv4/af_inet.c:770 [] sock_sendmsg_nosec net/socket.c:648 [inline] [] sock_sendmsg+0xbb/0x110 net/socket.c:658 [] sock_write_iter+0x223/0x3b0 net/socket.c:856 [] new_sync_write fs/read_write.c:496 [inline] [] __vfs_write+0x3d7/0x580 fs/read_write.c:509 [] vfs_write+0x187/0x520 fs/read_write.c:557 [] SYSC_write fs/read_write.c:604 [inline] [] SyS_write+0xd9/0x1c0 fs/read_write.c:596 [] do_syscall_64+0x19f/0x550 arch/x86/entry/common.c:285 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb The buggy address belongs to the page: page:ffffea00076dc1c0 count:1 mapcount:0 mapping: (null) index:0x0 flags: 0x4000000000000400(reserved) page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801db707600: 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 ffff8801db707680: 00 00 00 f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 >ffff8801db707700: 00 00 00 f2 f2 00 00 00 00 00 00 00 00 00 00 00 ^ ffff8801db707780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801db707800: 00 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 00 00 00 ==================================================================