audit: type=1400 audit(1538385481.129:66519): avc: denied { sys_admin } for pid=2092 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 ================================================================== BUG: KASAN: out-of-bounds in get_frame_pointer arch/x86/include/asm/stacktrace.h:64 [inline] BUG: KASAN: out-of-bounds in __unwind_start+0x368/0x3b0 arch/x86/kernel/unwind_frame.c:76 Read of size 8 at addr ffff8801c3e7f5a0 by task syz-executor1/19739 CPU: 1 PID: 19739 Comm: syz-executor1 Not tainted 4.9.130+ #98 ffff8801d097f070 ffffffff81b36c89 ffffea00070f9fc0 ffff8801c3e7f5a0 0000000000000000 ffff8801c3e7f5a8 ffff8801d3ad5f00 ffff8801d097f0a8 ffffffff8150080d ffff8801c3e7f5a0 0000000000000008 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_address_description+0x6c/0x234 mm/kasan/report.c:256 [] kasan_report_error mm/kasan/report.c:355 [inline] [] kasan_report.cold.6+0x242/0x2fe mm/kasan/report.c:412 [] __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:433 [] get_frame_pointer arch/x86/include/asm/stacktrace.h:64 [inline] [] __unwind_start+0x368/0x3b0 arch/x86/kernel/unwind_frame.c:76 [] unwind_start arch/x86/include/asm/unwind.h:39 [inline] [] __save_stack_trace+0x59/0xf0 arch/x86/kernel/stacktrace.c:41 [] save_stack_trace_tsk+0x48/0x70 arch/x86/kernel/stacktrace.c:71 [] proc_pid_stack+0x148/0x220 fs/proc/base.c:469 [] proc_single_show+0xfd/0x170 fs/proc/base.c:771 [] traverse+0x363/0x920 fs/seq_file.c:124 [] seq_read+0xd1b/0x12d0 fs/seq_file.c:195 [] do_loop_readv_writev.part.1+0xd5/0x280 fs/read_write.c:718 [] do_loop_readv_writev fs/read_write.c:707 [inline] [] do_readv_writev+0x56e/0x7b0 fs/read_write.c:873 [] vfs_readv+0x84/0xc0 fs/read_write.c:897 [] kernel_readv fs/splice.c:363 [inline] [] default_file_splice_read+0x451/0x7f0 fs/splice.c:435 [] do_splice_to+0x10c/0x170 fs/splice.c:899 [] splice_direct_to_actor+0x23f/0x7e0 fs/splice.c:971 [] do_splice_direct+0x1a3/0x270 fs/splice.c:1080 [] do_sendfile+0x4f0/0xc30 fs/read_write.c:1393 [] SYSC_sendfile64 fs/read_write.c:1448 [inline] [] SyS_sendfile64+0xd1/0x160 fs/read_write.c:1440 [] do_syscall_64+0x19f/0x550 arch/x86/entry/common.c:285 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb The buggy address belongs to the page: page:ffffea00070f9fc0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x4000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801c3e7f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801c3e7f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8801c3e7f580: f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 00 f3 f3 ^ ffff8801c3e7f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801c3e7f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================