device lo entered promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode ================================================================== BUG: KASAN: stack-out-of-bounds in get_frame_pointer arch/x86/include/asm/stacktrace.h:64 [inline] BUG: KASAN: stack-out-of-bounds in __unwind_start+0x3a7/0x3c0 arch/x86/kernel/unwind_frame.c:76 Read of size 8 at addr ffff8801c6be7e58 by task syz-executor5/28324 CPU: 1 PID: 28324 Comm: syz-executor5 Not tainted 4.9.91-gcc88c05 #9 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cfa2f7d0 ffffffff81d95109 ffffea00071af9c0 ffff8801c6be7e58 0000000000000000 ffff8801c6be7e58 ffff8801cfa2f900 ffff8801cfa2f808 ffffffff8153d5d3 ffff8801c6be7e58 0000000000000008 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_address_description+0x73/0x280 mm/kasan/report.c:256 [] kasan_report_error mm/kasan/report.c:355 [inline] [] kasan_report+0x255/0x380 mm/kasan/report.c:412 [] __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:433 [] get_frame_pointer arch/x86/include/asm/stacktrace.h:64 [inline] [] __unwind_start+0x3a7/0x3c0 arch/x86/kernel/unwind_frame.c:76 [] unwind_start arch/x86/include/asm/unwind.h:39 [inline] [] __save_stack_trace+0x59/0xf0 arch/x86/kernel/stacktrace.c:41 [] save_stack_trace_tsk+0x48/0x70 arch/x86/kernel/stacktrace.c:71 [] proc_pid_stack+0x146/0x230 fs/proc/base.c:466 [] proc_single_show+0xf8/0x170 fs/proc/base.c:768 [] seq_read+0x32f/0x1290 fs/seq_file.c:240 [] do_loop_readv_writev.part.17+0xc8/0x2b0 fs/read_write.c:715 [] do_loop_readv_writev fs/read_write.c:1097 [inline] [] compat_do_readv_writev+0x5ff/0x740 fs/read_write.c:1091 [] compat_readv+0xe3/0x150 fs/read_write.c:1120 [] do_compat_preadv64+0xd6/0x100 fs/read_write.c:1169 [] C_SYSC_preadv fs/read_write.c:1189 [inline] [] compat_SyS_preadv+0x3b/0x50 fs/read_write.c:1183 [] do_syscall_32_irqs_on arch/x86/entry/common.c:325 [inline] [] do_fast_syscall_32+0x2f5/0x870 arch/x86/entry/common.c:387 [] entry_SYSENTER_compat+0x90/0xa2 arch/x86/entry/entry_64_compat.S:137 The buggy address belongs to the page: page:ffffea00071af9c0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x8000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801c6be7d00: 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 f2 f2 f2 f2 ffff8801c6be7d80: 00 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 f2 >ffff8801c6be7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff8801c6be7e80: 00 00 00 00 f1 f1 f1 f1 04 f2 f2 f2 00 00 00 00 ffff8801c6be7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================