BUG: stack guard page was hit at ffffc900086b7f18 (stack is ffffc900086b8000..ffffc900086bffff) kernel stack overflow (double-fault): 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 24803 Comm: syz-executor.3 Not tainted 5.10.112-syzkaller-00287-gde64d941a71a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:cred_has_capability+0x18/0x420 security/selinux/hooks.c:1603 Code: c1 7c a3 4c 89 ff e8 d7 71 7f ff eb 99 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec e0 00 00 00 <89> 4c 24 10 89 54 24 14 41 89 f6 48 89 fb 65 48 8b 04 25 28 00 00 RSP: 0018:ffffc900086b7f20 EFLAGS: 00010282 RAX: ffffffff862dfb80 RBX: ffffffff862dfb80 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000000000015 RDI: ffff88810c958500 RBP: ffffc900086b8038 R08: ffffffff82238945 R09: ffffc900086b81e0 R10: fffff520010d7040 R11: 1ffff920010d703c R12: ffff88810c958500 R13: ffff88810c958500 R14: 0000000000000000 R15: 0000000000000015 FS: 00007f6ca7309700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc900086b7f18 CR3: 000000010e4f7000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Modules linked in: ---[ end trace 3483dec3377c2ff4 ]--- RIP: 0010:cred_has_capability+0x18/0x420 security/selinux/hooks.c:1603 Code: c1 7c a3 4c 89 ff e8 d7 71 7f ff eb 99 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec e0 00 00 00 <89> 4c 24 10 89 54 24 14 41 89 f6 48 89 fb 65 48 8b 04 25 28 00 00 RSP: 0018:ffffc900086b7f20 EFLAGS: 00010282 RAX: ffffffff862dfb80 RBX: ffffffff862dfb80 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000000000015 RDI: ffff88810c958500 RBP: ffffc900086b8038 R08: ffffffff82238945 R09: ffffc900086b81e0 R10: fffff520010d7040 R11: 1ffff920010d703c R12: ffff88810c958500 R13: ffff88810c958500 R14: 0000000000000000 R15: 0000000000000015 FS: 00007f6ca7309700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc900086b7f18 CR3: 000000010e4f7000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 7c a3 jl 0xffffffa5 2: 4c 89 ff mov %r15,%rdi 5: e8 d7 71 7f ff callq 0xff7f71e1 a: eb 99 jmp 0xffffffa5 c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 11: 55 push %rbp 12: 48 89 e5 mov %rsp,%rbp 15: 41 57 push %r15 17: 41 56 push %r14 19: 41 55 push %r13 1b: 41 54 push %r12 1d: 53 push %rbx 1e: 48 83 e4 e0 and $0xffffffffffffffe0,%rsp 22: 48 81 ec e0 00 00 00 sub $0xe0,%rsp * 29: 89 4c 24 10 mov %ecx,0x10(%rsp) <-- trapping instruction 2d: 89 54 24 14 mov %edx,0x14(%rsp) 31: 41 89 f6 mov %esi,%r14d 34: 48 89 fb mov %rdi,%rbx 37: 65 gs 38: 48 rex.W 39: 8b .byte 0x8b 3a: 04 25 add $0x25,%al 3c: 28 00 sub %al,(%rax)