audit: type=1400 audit(1536286749.768:29): avc: denied { connect } for pid=5305 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 ================================================================== BUG: KASAN: out-of-bounds in get_frame_pointer arch/x86/include/asm/stacktrace.h:64 [inline] BUG: KASAN: out-of-bounds in __unwind_start+0x368/0x3b0 arch/x86/kernel/unwind_frame.c:76 Read of size 8 at addr ffff8801c6e77808 by task syz-executor7/5330 CPU: 1 PID: 5330 Comm: syz-executor7 Not tainted 4.9.125+ #41 ffff8801cb2df868 ffffffff81af0ae9 ffffea00071b9dc0 ffff8801c6e77808 0000000000000000 ffff8801c6e77810 ffff8801a5f997c0 ffff8801cb2df8a0 ffffffff814e0e1d ffff8801c6e77808 0000000000000008 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_address_description+0x6c/0x234 mm/kasan/report.c:256 [] kasan_report_error mm/kasan/report.c:355 [inline] [] kasan_report.cold.6+0x242/0x2fe mm/kasan/report.c:412 [] __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:433 [] get_frame_pointer arch/x86/include/asm/stacktrace.h:64 [inline] [] __unwind_start+0x368/0x3b0 arch/x86/kernel/unwind_frame.c:76 [] unwind_start arch/x86/include/asm/unwind.h:39 [inline] [] __save_stack_trace+0x59/0xf0 arch/x86/kernel/stacktrace.c:41 [] save_stack_trace_tsk+0x48/0x70 arch/x86/kernel/stacktrace.c:71 [] proc_pid_stack+0x148/0x220 fs/proc/base.c:469 [] proc_single_show+0xfd/0x170 fs/proc/base.c:771 [] seq_read+0x4b6/0x12d0 fs/seq_file.c:240 [] __vfs_read+0x115/0x560 fs/read_write.c:449 [] vfs_read+0x124/0x390 fs/read_write.c:472 [] SYSC_pread64 fs/read_write.c:626 [inline] [] SyS_pread64+0x145/0x170 fs/read_write.c:613 [] sys32_pread+0x39/0x50 arch/x86/ia32/sys_ia32.c:179 [] do_syscall_32_irqs_on arch/x86/entry/common.c:325 [inline] [] do_fast_syscall_32+0x2f1/0x860 arch/x86/entry/common.c:387 [] entry_SYSENTER_compat+0x90/0xa2 arch/x86/entry/entry_64_compat.S:137 The buggy address belongs to the page: page:ffffea00071b9dc0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x4000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801c6e77700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801c6e77780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8801c6e77800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff8801c6e77880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801c6e77900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================