================================================================== BUG: KASAN: out-of-bounds in user_mode arch/x86/include/asm/ptrace.h:136 [inline] BUG: KASAN: out-of-bounds in unwind_next_frame+0x17fc/0x1ef0 arch/x86/kernel/unwind_orc.c:455 Read of size 8 at addr ffffc90014e97a10 by task iou-wrk-10954/10956 CPU: 0 PID: 10956 Comm: iou-wrk-10954 Not tainted 6.3.0-rc3-syzkaller-00021-ga1effab7a3a3 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106 print_address_description.constprop.0+0x2c/0x3c0 mm/kasan/report.c:319 print_report mm/kasan/report.c:430 [inline] kasan_report+0x11c/0x130 mm/kasan/report.c:536 user_mode arch/x86/include/asm/ptrace.h:136 [inline] unwind_next_frame+0x17fc/0x1ef0 arch/x86/kernel/unwind_orc.c:455 arch_stack_walk+0x81/0xf0 arch/x86/kernel/stacktrace.c:25 stack_trace_save_tsk+0x179/0x210 kernel/stacktrace.c:150 proc_pid_stack+0x166/0x2a0 fs/proc/base.c:456 proc_single_show+0x11a/0x1f0 fs/proc/base.c:777 seq_read_iter+0x4f9/0x12d0 fs/seq_file.c:230 seq_read+0x171/0x210 fs/seq_file.c:162 loop_rw_iter+0x1c2/0x5c0 io_uring/rw.c:464 io_iter_do_read io_uring/rw.c:648 [inline] io_iter_do_read io_uring/rw.c:641 [inline] io_read+0x101a/0x1420 io_uring/rw.c:769 io_issue_sqe+0x15d/0x1250 io_uring/io_uring.c:1907 io_wq_submit_work+0x29c/0xdb0 io_uring/io_uring.c:1983 io_worker_handle_work+0xa39/0x1a00 io_uring/io-wq.c:587 io_wqe_worker+0x9f2/0xdb0 io_uring/io-wq.c:632 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 The buggy address belongs to the virtual mapping at [ffffc90014e90000, ffffc90014e99000) created by: kernel_clone+0xeb/0x890 kernel/fork.c:2684 The buggy address belongs to the physical page: page:ffffea00009c23c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2708f memcg:ffff88805dd3cc82 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 0000000000000000 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff ffff88805dd3cc82 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x102dc2(GFP_HIGHUSER|__GFP_NOWARN|__GFP_ZERO), pid 10950, tgid 10950 (syz-executor.4), ts 436395659404, free_ts 435681996566 prep_new_page mm/page_alloc.c:2552 [inline] get_page_from_freelist+0x1190/0x2e20 mm/page_alloc.c:4325 __alloc_pages+0x1cb/0x4a0 mm/page_alloc.c:5591 alloc_pages+0x1aa/0x270 mm/mempolicy.c:2283 vm_area_alloc_pages mm/vmalloc.c:2943 [inline] __vmalloc_area_node mm/vmalloc.c:3011 [inline] __vmalloc_node_range+0xb30/0x1300 mm/vmalloc.c:3181 alloc_thread_stack_node kernel/fork.c:311 [inline] dup_task_struct kernel/fork.c:984 [inline] copy_process+0x1320/0x7590 kernel/fork.c:2100 kernel_clone+0xeb/0x890 kernel/fork.c:2684 __do_sys_clone+0xba/0x100 kernel/fork.c:2825 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1453 [inline] free_pcp_prepare+0x5d5/0xa50 mm/page_alloc.c:1503 free_unref_page_prepare mm/page_alloc.c:3387 [inline] free_unref_page_list+0x176/0xbc0 mm/page_alloc.c:3528 release_pages+0xcd7/0x1380 mm/swap.c:1042 tlb_batch_pages_flush+0xa8/0x1a0 mm/mmu_gather.c:97 tlb_flush_mmu_free mm/mmu_gather.c:292 [inline] tlb_flush_mmu mm/mmu_gather.c:299 [inline] tlb_finish_mmu+0x14b/0x7e0 mm/mmu_gather.c:391 exit_mmap+0x205/0x690 mm/mmap.c:3047 __mmput+0x128/0x4c0 kernel/fork.c:1209 mmput+0x60/0x70 kernel/fork.c:1231 exit_mm kernel/exit.c:563 [inline] do_exit+0x9d7/0x2960 kernel/exit.c:856 do_group_exit+0xd4/0x2a0 kernel/exit.c:1019 __do_sys_exit_group kernel/exit.c:1030 [inline] __se_sys_exit_group kernel/exit.c:1028 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1028 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd Memory state around the buggy address: ffffc90014e97900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc90014e97980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc90014e97a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffffc90014e97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc90014e97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================