==================================================================
BUG: KASAN: global-out-of-bounds in memcmp+0xc0/0xca lib/string.c:676
Read of size 1 at addr ffffffff89077f80 by task syz.1.800/7422

CPU: 0 PID: 7422 Comm: syz.1.800 Not tainted 6.10.0-rc6-syzkaller-gc562ba719df5 #0
Hardware name: riscv-virtio,qemu (DT)
Call Trace:
[<ffffffff8000f6fc>] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:130
[<ffffffff85c33fac>] show_stack+0x34/0x40 arch/riscv/kernel/stacktrace.c:136
[<ffffffff85c8ddfa>] __dump_stack lib/dump_stack.c:88 [inline]
[<ffffffff85c8ddfa>] dump_stack_lvl+0x122/0x196 lib/dump_stack.c:114
[<ffffffff85c3e31c>] print_address_description mm/kasan/report.c:377 [inline]
[<ffffffff85c3e31c>] print_report+0x288/0x596 mm/kasan/report.c:488
[<ffffffff8091ece8>] kasan_report+0xec/0x118 mm/kasan/report.c:601
[<ffffffff80920b32>] __asan_report_load1_noabort+0x12/0x1a mm/kasan/report_generic.c:378
[<ffffffff85c0ae6a>] memcmp+0xc0/0xca lib/string.c:676
[<ffffffff84a28a6e>] __hw_addr_add_ex+0xee/0x676 net/core/dev_addr_lists.c:88
[<ffffffff84a2ba6e>] __dev_mc_add net/core/dev_addr_lists.c:867 [inline]
[<ffffffff84a2ba6e>] dev_mc_add+0xac/0x108 net/core/dev_addr_lists.c:885
[<ffffffff84bbdf0a>] mrp_init_applicant+0xe8/0x56e net/802/mrp.c:873
[<ffffffff85792a5e>] vlan_mvrp_init_applicant+0x26/0x30 net/8021q/vlan_mvrp.c:57
[<ffffffff85788d36>] register_vlan_dev+0x1b4/0x922 net/8021q/vlan.c:170
[<ffffffff857899f2>] register_vlan_device net/8021q/vlan.c:277 [inline]
[<ffffffff857899f2>] vlan_ioctl_handler+0x54e/0x956 net/8021q/vlan.c:621
[<ffffffff8495b372>] sock_ioctl+0x1f6/0x61a net/socket.c:1305
[<ffffffff80a0eee8>] vfs_ioctl fs/ioctl.c:51 [inline]
[<ffffffff80a0eee8>] __do_sys_ioctl fs/ioctl.c:907 [inline]
[<ffffffff80a0eee8>] __se_sys_ioctl fs/ioctl.c:893 [inline]
[<ffffffff80a0eee8>] __riscv_sys_ioctl+0x186/0x1d6 fs/ioctl.c:893
[<ffffffff8000e204>] syscall_handler+0x94/0x118 arch/riscv/include/asm/syscall.h:90
[<ffffffff85c900b4>] do_trap_ecall_u+0x14c/0x214 arch/riscv/kernel/traps.c:330
[<ffffffff85cb3264>] ret_from_exception+0x0/0x64 arch/riscv/kernel/entry.S:112

The buggy address belongs to the variable:
 vlan_mrp_app+0x60/0x3e80

The buggy address belongs to the physical page:
page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x89277
flags: 0xffe000000002000(reserved|node=0|zone=0|lastcpupid=0x7ff)
raw: 0ffe000000002000 ff1c000000249dc8 ff1c000000249dc8 0000000000000000
raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner info is not present (never set?)

Memory state around the buggy address:
 ffffffff89077e80: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
 ffffffff89077f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffffffff89077f80: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
                   ^
 ffffffff89078000: 00 00 00 00 00 00 00 00 f9 f9 f9 f9 00 00 00 00
 ffffffff89078080: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
==================================================================