================================================================== BUG: KASAN: out-of-bounds in check_canary_byte mm/kfence/core.c:211 [inline] BUG: KASAN: out-of-bounds in for_each_canary mm/kfence/core.c:245 [inline] BUG: KASAN: out-of-bounds in kfence_guarded_free+0x7f1/0x8f0 mm/kfence/core.c:374 Read of size 1 at addr ffff88823bddcd84 by task syz-executor.5/11616 CPU: 0 PID: 11616 Comm: syz-executor.5 Not tainted 5.10.0-next-20201223-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x107/0x163 lib/dump_stack.c:120 print_address_description.constprop.0.cold+0x5b/0x2f8 mm/kasan/report.c:230 __kasan_report mm/kasan/report.c:396 [inline] kasan_report.cold+0x79/0xd5 mm/kasan/report.c:413 check_canary_byte mm/kfence/core.c:211 [inline] for_each_canary mm/kfence/core.c:245 [inline] kfence_guarded_free+0x7f1/0x8f0 mm/kfence/core.c:374 __kfence_free+0x70/0x150 mm/kfence/core.c:756 do_slab_free mm/slub.c:3145 [inline] slab_free mm/slub.c:3158 [inline] kfree+0x57c/0x5c0 mm/slub.c:4156 dh_free_data security/keys/dh.c:62 [inline] __keyctl_dh_compute+0xe3a/0x1300 security/keys/dh.c:404 keyctl_dh_compute+0xbf/0x120 security/keys/dh.c:422 __do_sys_keyctl+0xb0/0x500 security/keys/keyctl.c:1973 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45e219 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f5eae5c7c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e219 RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 RBP: 000000000119bfd0 R08: 00000000200001c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c R13: 00007fffec52ae2f R14: 00007f5eae5c89c0 R15: 000000000119bf8c Allocated by task 0: (stack is not available) The buggy address belongs to the object at ffff88823bddc000 which belongs to the cache kmalloc-2k of size 2048 The buggy address is located 1412 bytes to the right of 2048-byte region [ffff88823bddc000, ffff88823bddc800) The buggy address belongs to the page: page:000000005605722d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x23bddc flags: 0x57ff00000001200(slab|reserved) raw: 057ff00000001200 ffffea0008ef7708 ffffea0008ef7708 ffff888010042000 raw: 0000000000000000 0000000000010000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88823bddcc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88823bddcd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88823bddcd80: 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff88823bddce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88823bddce80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================