TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. ================================================================== BUG: KASAN: slab-out-of-bounds in dns_resolver_preparse+0x910/0x9b0 net/dns_resolver/dns_key.c:127 Read of size 1 at addr ffff8880596d6414 by task syz-executor.6/70717 CPU: 0 PID: 70717 Comm: syz-executor.6 Not tainted 5.10.207 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x107/0x167 lib/dump_stack.c:118 print_address_description.constprop.0+0x1c/0x220 mm/kasan/report.c:377 __kasan_report mm/kasan/report.c:537 [inline] kasan_report.cold+0x37/0x7c mm/kasan/report.c:554 dns_resolver_preparse+0x910/0x9b0 net/dns_resolver/dns_key.c:127 key_create_or_update+0x3e0/0xc30 security/keys/key.c:859 __do_sys_add_key+0x215/0x430 security/keys/keyctl.c:134 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x62/0xc7 RIP: 0033:0x7f59c01ddb19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f59bd753188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 RAX: ffffffffffffffda RBX: 00007f59c02f0f60 RCX: 00007f59c01ddb19 RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000020000200 RBP: 00007f59c0237f6d R08: fffffffffffffffb R09: 0000000000000000 R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffdfdef805f R14: 00007f59bd753300 R15: 0000000000022000 Allocated by task 70717: kasan_save_stack+0x1b/0x40 mm/kasan/common.c:48 kasan_set_track mm/kasan/common.c:56 [inline] __kasan_kmalloc.constprop.0+0xc9/0xd0 mm/kasan/common.c:461 kmalloc_node include/linux/slab.h:575 [inline] kvmalloc_node+0x119/0x170 mm/util.c:607 kvmalloc include/linux/mm.h:765 [inline] __do_sys_add_key+0x311/0x430 security/keys/keyctl.c:116 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x62/0xc7 The buggy address belongs to the object at ffff8880596d6410 which belongs to the cache kmalloc-8 of size 8 The buggy address is located 4 bytes inside of 8-byte region [ffff8880596d6410, ffff8880596d6418) The buggy address belongs to the page: page:00000000a865a180 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x596d6 flags: 0x100000000000200(slab) raw: 0100000000000200 ffffea000038f440 0000001400000014 ffff888008041c80 raw: 0000000000000000 0000000080660066 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8880596d6300: fc fc fc fc fb fc fc fc fc fb fc fc fc fc fb fc ffff8880596d6380: fc fc fc fb fc fc fc fc fb fc fc fc fc fb fc fc >ffff8880596d6400: fc fc 04 fc fc fc fc 00 fc fc fc fc 00 fc fc fc ^ ffff8880596d6480: fc 00 fc fc fc fc 00 fc fc fc fc 04 fc fc fc fc ffff8880596d6500: 04 fc fc fc fc 04 fc fc fc fc fa fc fc fc fc fa ================================================================== FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 70726 Comm: syz-executor.5 Tainted: G B 5.10.207 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x107/0x167 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:52 [inline] should_fail.cold+0x5/0xa lib/fault-inject.c:146 should_failslab+0x5/0x20 mm/slab_common.c:1193 slab_pre_alloc_hook mm/slab.h:515 [inline] slab_alloc_node mm/slub.c:2821 [inline] slab_alloc mm/slub.c:2904 [inline] kmem_cache_alloc+0x5b/0x310 mm/slub.c:2909 mem_pool_alloc mm/kmemleak.c:423 [inline] create_object.isra.0+0x3a/0xa20 mm/kmemleak.c:578 kmemleak_alloc_percpu+0xa0/0x100 mm/kmemleak.c:924 pcpu_alloc+0x4e2/0x1240 mm/percpu.c:1842 alloc_vfsmnt+0xfd/0x680 fs/namespace.c:192 clone_mnt+0x6c/0xce0 fs/namespace.c:1039 copy_tree+0x3b0/0xa60 fs/namespace.c:1860 copy_mnt_ns+0x144/0xa00 fs/namespace.c:3339 create_new_namespaces+0xd6/0xb20 kernel/nsproxy.c:78 unshare_nsproxy_namespaces+0xbd/0x1f0 kernel/nsproxy.c:231 ksys_unshare+0x449/0x8a0 kernel/fork.c:3003 __do_sys_unshare kernel/fork.c:3071 [inline] __se_sys_unshare kernel/fork.c:3069 [inline] __x64_sys_unshare+0x2d/0x40 kernel/fork.c:3069 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x62/0xc7 RIP: 0033:0x7fe9f34b0b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe9f0a26188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 00007fe9f35c3f60 RCX: 00007fe9f34b0b19 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000048020200 RBP: 00007fe9f0a261d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffc38c474df R14: 00007fe9f0a26300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 71141 Comm: syz-executor.5 Tainted: G B 5.10.207 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x107/0x167 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:52 [inline] should_fail.cold+0x5/0xa lib/fault-inject.c:146 should_failslab+0x5/0x20 mm/slab_common.c:1193 slab_pre_alloc_hook mm/slab.h:515 [inline] slab_alloc_node mm/slub.c:2821 [inline] slab_alloc mm/slub.c:2904 [inline] kmem_cache_alloc+0x5b/0x310 mm/slub.c:2909 kmem_cache_zalloc include/linux/slab.h:654 [inline] alloc_vfsmnt+0x23/0x680 fs/namespace.c:177 clone_mnt+0x6c/0xce0 fs/namespace.c:1039 copy_tree+0x3b0/0xa60 fs/namespace.c:1860 copy_mnt_ns+0x144/0xa00 fs/namespace.c:3339 create_new_namespaces+0xd6/0xb20 kernel/nsproxy.c:78 unshare_nsproxy_namespaces+0xbd/0x1f0 kernel/nsproxy.c:231 ksys_unshare+0x449/0x8a0 kernel/fork.c:3003 __do_sys_unshare kernel/fork.c:3071 [inline] __se_sys_unshare kernel/fork.c:3069 [inline] __x64_sys_unshare+0x2d/0x40 kernel/fork.c:3069 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x62/0xc7 RIP: 0033:0x7fe9f34b0b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe9f0a26188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 00007fe9f35c3f60 RCX: 00007fe9f34b0b19 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000048020200 RBP: 00007fe9f0a261d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffc38c474df R14: 00007fe9f0a26300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 71449 Comm: syz-executor.5 Tainted: G B 5.10.207 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x107/0x167 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:52 [inline] should_fail.cold+0x5/0xa lib/fault-inject.c:146 should_failslab+0x5/0x20 mm/slab_common.c:1193 slab_pre_alloc_hook mm/slab.h:515 [inline] slab_alloc_node mm/slub.c:2821 [inline] slab_alloc mm/slub.c:2904 [inline] kmem_cache_alloc+0x5b/0x310 mm/slub.c:2909 mem_pool_alloc mm/kmemleak.c:423 [inline] create_object.isra.0+0x3a/0xa20 mm/kmemleak.c:578 kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] slab_post_alloc_hook mm/slab.h:534 [inline] slab_alloc_node mm/slub.c:2896 [inline] slab_alloc mm/slub.c:2904 [inline] kmem_cache_alloc+0x159/0x310 mm/slub.c:2909 kmem_cache_zalloc include/linux/slab.h:654 [inline] alloc_vfsmnt+0x23/0x680 fs/namespace.c:177 clone_mnt+0x6c/0xce0 fs/namespace.c:1039 copy_tree+0x3b0/0xa60 fs/namespace.c:1860 copy_mnt_ns+0x144/0xa00 fs/namespace.c:3339 create_new_namespaces+0xd6/0xb20 kernel/nsproxy.c:78 unshare_nsproxy_namespaces+0xbd/0x1f0 kernel/nsproxy.c:231 ksys_unshare+0x449/0x8a0 kernel/fork.c:3003 __do_sys_unshare kernel/fork.c:3071 [inline] __se_sys_unshare kernel/fork.c:3069 [inline] __x64_sys_unshare+0x2d/0x40 kernel/fork.c:3069 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x62/0xc7 RIP: 0033:0x7fe9f34b0b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe9f0a26188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 00007fe9f35c3f60 RCX: 00007fe9f34b0b19 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000048020200 RBP: 00007fe9f0a261d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffc38c474df R14: 00007fe9f0a26300 R15: 0000000000022000