================================================================== BUG: KASAN: global-out-of-bounds in memcmp+0xc0/0xca lib/string.c:676 Read of size 1 at addr ffffffff89077b00 by task syz.1.991/11227 CPU: 1 PID: 11227 Comm: syz.1.991 Not tainted 6.10.0-rc5-syzkaller-gcc2c169e34b4 #0 Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:129 [] show_stack+0x34/0x40 arch/riscv/kernel/stacktrace.c:135 [] __dump_stack lib/dump_stack.c:88 [inline] [] dump_stack_lvl+0x122/0x196 lib/dump_stack.c:114 [] print_address_description mm/kasan/report.c:377 [inline] [] print_report+0x288/0x596 mm/kasan/report.c:488 [] kasan_report+0xec/0x118 mm/kasan/report.c:601 [] __asan_report_load1_noabort+0x12/0x1a mm/kasan/report_generic.c:378 [] memcmp+0xc0/0xca lib/string.c:676 [] __hw_addr_add_ex+0xee/0x676 net/core/dev_addr_lists.c:88 [] __dev_mc_add net/core/dev_addr_lists.c:867 [inline] [] dev_mc_add+0xac/0x108 net/core/dev_addr_lists.c:885 [] mrp_init_applicant+0xe8/0x56e net/802/mrp.c:873 [] vlan_mvrp_init_applicant+0x26/0x30 net/8021q/vlan_mvrp.c:57 [] register_vlan_dev+0x1b4/0x922 net/8021q/vlan.c:170 [] vlan_newlink+0x3d2/0x5fc net/8021q/vlan_netlink.c:193 [] rtnl_newlink_create net/core/rtnetlink.c:3510 [inline] [] __rtnl_newlink+0xfe4/0x1770 net/core/rtnetlink.c:3730 [] rtnl_newlink+0x6c/0xa2 net/core/rtnetlink.c:3743 [] rtnetlink_rcv_msg+0x428/0xdb2 net/core/rtnetlink.c:6635 [] netlink_rcv_skb+0x216/0x3dc net/netlink/af_netlink.c:2564 [] rtnetlink_rcv+0x26/0x30 net/core/rtnetlink.c:6653 [] netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline] [] netlink_unicast+0x508/0x862 net/netlink/af_netlink.c:1361 [] netlink_sendmsg+0x864/0xdc2 net/netlink/af_netlink.c:1905 [] sock_sendmsg_nosec net/socket.c:730 [inline] [] __sock_sendmsg+0xcc/0x162 net/socket.c:745 [] ____sys_sendmsg+0x5ce/0x79e net/socket.c:2585 [] ___sys_sendmsg+0x144/0x1e6 net/socket.c:2639 [] __sys_sendmsg+0x130/0x1f0 net/socket.c:2668 [] __do_sys_sendmsg net/socket.c:2677 [inline] [] __se_sys_sendmsg net/socket.c:2675 [inline] [] __riscv_sys_sendmsg+0x70/0xa2 net/socket.c:2675 [] syscall_handler+0x94/0x118 arch/riscv/include/asm/syscall.h:90 [] do_trap_ecall_u+0x14c/0x214 arch/riscv/kernel/traps.c:330 [] ret_from_exception+0x0/0x64 arch/riscv/kernel/entry.S:112 The buggy address belongs to the variable: vlan_mrp_app+0x60/0x3e80 The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x89277 flags: 0xffe000000002000(reserved|node=0|zone=0|lastcpupid=0x7ff) raw: 0ffe000000002000 ff1c000000249dc8 ff1c000000249dc8 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?) Memory state around the buggy address: ffffffff89077a00: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 ffffffff89077a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffffff89077b00: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffffffff89077b80: 00 00 00 00 00 00 00 00 f9 f9 f9 f9 00 00 00 00 ffffffff89077c00: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================