================================================================== BUG: KASAN: out-of-bounds in get_frame_pointer arch/x86/include/asm/stacktrace.h:64 [inline] BUG: KASAN: out-of-bounds in __unwind_start+0x34b/0x370 arch/x86/kernel/unwind_frame.c:76 Read of size 8 at addr ffff88018eedf8b8 by task syz-executor1/25166 CPU: 0 PID: 25166 Comm: syz-executor1 Not tainted 4.9.152+ #15 ffff8801912a71a0 ffffffff81b47151 0000000000000000 ffffea00063bb7c0 ffff88018eedf8b8 0000000000000008 ffffffff810abb0b ffff8801912a71d8 ffffffff81502385 0000000000000000 ffff88018eedf8c0 ffff88018eedf8b8 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x120 lib/dump_stack.c:51 [] print_address_description+0x6f/0x238 mm/kasan/report.c:256 [] kasan_report_error mm/kasan/report.c:355 [inline] [] kasan_report mm/kasan/report.c:412 [inline] [] kasan_report.cold+0x8c/0x2ba mm/kasan/report.c:397 [] __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:433 [] get_frame_pointer arch/x86/include/asm/stacktrace.h:64 [inline] [] __unwind_start+0x34b/0x370 arch/x86/kernel/unwind_frame.c:76 [] unwind_start arch/x86/include/asm/unwind.h:39 [inline] [] __save_stack_trace+0x59/0xf0 arch/x86/kernel/stacktrace.c:41 [] save_stack_trace_tsk arch/x86/kernel/stacktrace.c:71 [inline] [] save_stack_trace_tsk+0x42/0x60 arch/x86/kernel/stacktrace.c:66 [] proc_pid_stack+0x1a2/0x290 fs/proc/base.c:483 [] proc_single_show+0xf6/0x160 fs/proc/base.c:785 [] seq_read+0x4cd/0x1250 fs/seq_file.c:240 [] do_loop_readv_writev.part.0+0xcc/0x2c0 fs/read_write.c:718 [] do_loop_readv_writev fs/read_write.c:707 [inline] [] do_readv_writev+0x556/0x7a0 fs/read_write.c:873 [] vfs_readv+0x86/0xc0 fs/read_write.c:897 [] kernel_readv fs/splice.c:363 [inline] [] default_file_splice_read+0x44b/0x7e0 fs/splice.c:435 [] do_splice_to+0x108/0x170 fs/splice.c:899 [] splice_direct_to_actor+0x246/0x820 fs/splice.c:971 [] do_splice_direct+0x1a5/0x260 fs/splice.c:1080 [] do_sendfile+0x503/0xc00 fs/read_write.c:1393 [] SYSC_sendfile64 fs/read_write.c:1454 [inline] [] SyS_sendfile64+0x145/0x160 fs/read_write.c:1440 [] do_syscall_64+0x1ad/0x570 arch/x86/entry/common.c:285 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb The buggy address belongs to the page: page:ffffea00063bb7c0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x4000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88018eedf780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88018eedf800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88018eedf880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff88018eedf900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88018eedf980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================