random: sshd: uninitialized urandom read (32 bytes read, 34 bits of entropy available) random: sshd: uninitialized urandom read (32 bytes read, 34 bits of entropy available) random: nonblocking pool is initialized A link change request failed with some changes committed already. Interface teql0 may have been left with an inconsistent configuration, please check. ================================================================== BUG: KASAN: stack-out-of-bounds in memcmp+0x126/0x160 lib/string.c:742 Read of size 1 at addr ffff8800b92078e0 by task syz-executor471/3708 CPU: 0 PID: 3708 Comm: syz-executor471 Not tainted 4.4.140-ged9bdc8 #68 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 c082ff154dcd4715 ffff8800b9207410 ffffffff81e0e08d ffffea0002e481c0 ffff8800b92078e0 0000000000000000 ffff8800b92078e0 0000000000000000 ffff8800b9207448 ffffffff81515a56 ffff8800b92078e0 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] print_address_description+0x6c/0x216 mm/kasan/report.c:252 [] kasan_report_error mm/kasan/report.c:351 [inline] [] kasan_report.cold.7+0x175/0x2f7 mm/kasan/report.c:408 [] __asan_report_load1_noabort+0x14/0x20 mm/kasan/report.c:426 [] memcmp+0x126/0x160 lib/string.c:742 [] addr_match include/net/xfrm.h:837 [inline] [] __xfrm6_selector_match net/xfrm/xfrm_policy.c:81 [inline] [] xfrm_selector_match+0x12d/0xe50 net/xfrm/xfrm_policy.c:95 [] xfrm_sk_policy_lookup+0x151/0x350 net/xfrm/xfrm_policy.c:1241 [] xfrm_lookup+0x1b5/0xb70 net/xfrm/xfrm_policy.c:2189 [] xfrm_lookup_route+0x39/0x1b0 net/xfrm/xfrm_policy.c:2323 [] ip6_dst_lookup_flow+0x1b7/0x2f0 net/ipv6/ip6_output.c:1072 [] tcp_v6_connect+0xd58/0x1b70 net/ipv6/tcp_ipv6.c:249 [] __inet_stream_connect+0x2a9/0xc30 net/ipv4/af_inet.c:615 [] tcp_sendmsg_fastopen net/ipv4/tcp.c:1092 [inline] [] tcp_sendmsg+0x1600/0x2b00 net/ipv4/tcp.c:1112 [] inet_sendmsg+0x203/0x4d0 net/ipv4/af_inet.c:755 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xcc/0x110 net/socket.c:635 [] SYSC_sendto+0x21c/0x370 net/socket.c:1665 [] SyS_sendto+0x40/0x50 net/socket.c:1633 [] entry_SYSCALL_64_fastpath+0x22/0x9e The buggy address belongs to the page: page:ffffea0002e481c0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x4000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8800b9207780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8800b9207800: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 f2 f2 >ffff8800b9207880: f2 f2 00 00 00 00 00 00 00 00 00 00 f2 f2 00 00 ^ ffff8800b9207900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8800b9207980: 00 00 00 f1 f1 f1 f1 00 00 00 00 00 f2 f2 f2 00 ==================================================================