================================================================== BUG: KASAN: stack-out-of-bounds in unwind_next_frame+0x169f/0x1810 arch/x86/kernel/unwind_orc.c:470 Read of size 8 at addr ffff888102907578 by task syz-executor.3/20691 CPU: 0 PID: 20691 Comm: syz-executor.3 Not tainted 4.14.156-syzkaller #0 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe5/0x154 lib/dump_stack.c:58 print_address_description+0x60/0x226 mm/kasan/report.c:187 __kasan_report.cold+0x1a/0x41 mm/kasan/report.c:316 unwind_next_frame+0x169f/0x1810 arch/x86/kernel/unwind_orc.c:470 perf_callchain_kernel+0x3a0/0x540 arch/x86/events/core.c:2338 get_perf_callchain+0x2f5/0x770 kernel/events/callchain.c:217 perf_callchain+0x147/0x190 kernel/events/callchain.c:190 perf_prepare_sample+0x6a8/0x1360 kernel/events/core.c:6149 __perf_event_output kernel/events/core.c:6265 [inline] perf_event_output_forward+0xdc/0x220 kernel/events/core.c:6283 __perf_event_overflow+0x12d/0x340 kernel/events/core.c:7541 perf_swevent_overflow+0x7a/0xf0 kernel/events/core.c:7617 perf_swevent_event+0x112/0x270 kernel/events/core.c:7655 perf_tp_event+0x633/0x7f0 kernel/events/core.c:8079 perf_trace_run_bpf_submit kernel/events/core.c:8049 [inline] perf_trace_run_bpf_submit+0x113/0x170 kernel/events/core.c:8035 perf_trace_lock_acquire+0x341/0x4e0 include/trace/events/lock.h:13 trace_lock_acquire include/trace/events/lock.h:13 [inline] lock_acquire+0x279/0x360 kernel/locking/lockdep.c:3993 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:152 spin_lock include/linux/spinlock.h:317 [inline] fast_dput fs/dcache.c:711 [inline] dput.part.0+0x3b4/0x710 fs/dcache.c:818 dput+0x1b/0x30 fs/dcache.c:811 inode_doinit_with_dentry+0x962/0xe90 security/selinux/hooks.c:1685 sb_finish_set_opts+0x178/0x690 security/selinux/hooks.c:563 selinux_set_mnt_opts+0xed2/0x1310 security/selinux/hooks.c:954 superblock_doinit+0x10a/0x220 security/selinux/hooks.c:1217 selinux_sb_kern_mount+0xa1/0x230 security/selinux/hooks.c:2860 security_sb_kern_mount+0x7c/0xb0 security/security.c:380 mount_fs+0x168/0x312 fs/super.c:1275 vfs_kern_mount.part.0+0xc7/0x4a0 fs/namespace.c:1056 vfs_kern_mount fs/namespace.c:1038 [inline] kern_mount_data+0x51/0xb0 fs/namespace.c:3353 pid_ns_prepare_proc+0x1a/0x80 fs/proc/root.c:266 alloc_pid+0xa10/0xca0 kernel/pid.c:326 copy_process.part.0+0x33ae/0x66c0 kernel/fork.c:1909 copy_process kernel/fork.c:1679 [inline] _do_fork+0x197/0xce0 kernel/fork.c:2220 do_syscall_64+0x19b/0x520 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f05d5939c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020886100 RBP: 000000000075bf20 R08: 00000000200002c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05d593a6d4 R13: 00000000004c0d71 R14: 00000000004d3d88 R15: 00000000ffffffff The buggy address belongs to the page: page:ffffea00040a41c0 count:0 mapcount:0 mapping: (null) index:0x1 flags: 0x4000000000000000() raw: 4000000000000000 0000000000000000 0000000000000001 00000000ffffffff raw: 0000000000000000 dead000000000200 0000000000000000 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff888102907400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888102907480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff888102907500: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 04 f2 00 f3 ^ ffff888102907580: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888102907600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================