audit: type=1400 audit(1704956245.896:10): avc: denied { execmod } for pid=4047 comm="syz-executor.1" path="/syzkaller-testdir130896233/syzkaller.3z96rp/2/file0" dev="sda" ino=15976 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=1 ================================================================== BUG: KASAN: slab-out-of-bounds in dns_resolver_preparse+0x910/0x9b0 net/dns_resolver/dns_key.c:127 Read of size 1 at addr ffff888008d57964 by task syz-executor.4/4073 CPU: 1 PID: 4073 Comm: syz-executor.4 Not tainted 5.10.206 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x107/0x167 lib/dump_stack.c:118 print_address_description.constprop.0+0x1c/0x220 mm/kasan/report.c:377 __kasan_report mm/kasan/report.c:537 [inline] kasan_report.cold+0x37/0x7c mm/kasan/report.c:554 dns_resolver_preparse+0x910/0x9b0 net/dns_resolver/dns_key.c:127 key_create_or_update+0x3e0/0xc30 security/keys/key.c:859 __do_sys_add_key+0x215/0x430 security/keys/keyctl.c:134 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x62/0xc7 RIP: 0033:0x7fa699fb8b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa69752e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 RAX: ffffffffffffffda RBX: 00007fa69a0cbf60 RCX: 00007fa699fb8b19 RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000020000200 RBP: 00007fa69a012f6d R08: fffffffffffffffb R09: 0000000000000000 R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc89437bef R14: 00007fa69752e300 R15: 0000000000022000 Allocated by task 4073: kasan_save_stack+0x1b/0x40 mm/kasan/common.c:48 kasan_set_track mm/kasan/common.c:56 [inline] __kasan_kmalloc.constprop.0+0xc9/0xd0 mm/kasan/common.c:461 kmalloc_node include/linux/slab.h:575 [inline] kvmalloc_node+0x119/0x170 mm/util.c:607 kvmalloc include/linux/mm.h:765 [inline] __do_sys_add_key+0x311/0x430 security/keys/keyctl.c:116 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x62/0xc7 The buggy address belongs to the object at ffff888008d57960 which belongs to the cache kmalloc-8 of size 8 The buggy address is located 4 bytes inside of 8-byte region [ffff888008d57960, ffff888008d57968) The buggy address belongs to the page: page:000000008976e1de refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888008d57d98 pfn:0x8d57 flags: 0x100000000000200(slab) raw: 0100000000000200 ffffea0000240f80 0000001100000011 ffff888008041c80 raw: ffff888008d57d98 0000000080660053 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff888008d57800: fc fc fc fc fb fc fc fc fc fb fc fc fc fc fb fc ffff888008d57880: fc fc fc fb fc fc fc fc fb fc fc fc fc fb fc fc >ffff888008d57900: fc fc fb fc fc fc fc fb fc fc fc fc 04 fc fc fc ^ ffff888008d57980: fc fb fc fc fc fc fb fc fc fc fc 00 fc fc fc fc ffff888008d57a00: fa fc fc fc fc fa fc fc fc fc fa fc fc fc fc fa ================================================================== netlink: 'syz-executor.7': attribute type 16 has an invalid length. syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue ext4 filesystem being mounted at /syzkaller-testdir511988859/syzkaller.weqF82/6/file0 supports timestamps until 2038 (0x7fffffff) netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue ext4 filesystem being mounted at /syzkaller-testdir865416159/syzkaller.ATrrI9/4/file0 supports timestamps until 2038 (0x7fffffff) netlink: 'syz-executor.1': attribute type 16 has an invalid length. netlink: 'syz-executor.1': attribute type 16 has an invalid length.