================================================================== BUG: KASAN: out-of-bounds in get_frame_pointer arch/x86/include/asm/stacktrace.h:64 [inline] BUG: KASAN: out-of-bounds in __unwind_start+0x37c/0x3c0 arch/x86/kernel/unwind_frame.c:76 Read of size 8 at addr ffff8801cd62f828 by task syz-executor2/13030 CPU: 1 PID: 13030 Comm: syz-executor2 Not tainted 4.9.121-g681e57b #77 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801c433f770 ffffffff81eb7e29 ffffea0007358bc0 ffff8801cd62f828 0000000000000000 ffff8801cd62f830 ffff8801c433f8a8 ffff8801c433f7a8 ffffffff8156acee ffff8801cd62f828 0000000000000008 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_address_description+0x6c/0x234 mm/kasan/report.c:256 [] kasan_report_error mm/kasan/report.c:355 [inline] [] kasan_report.cold.6+0x242/0x2fe mm/kasan/report.c:412 [] __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:433 [] get_frame_pointer arch/x86/include/asm/stacktrace.h:64 [inline] [] __unwind_start+0x37c/0x3c0 arch/x86/kernel/unwind_frame.c:76 [] unwind_start arch/x86/include/asm/unwind.h:39 [inline] [] __save_stack_trace+0x59/0xf0 arch/x86/kernel/stacktrace.c:41 [] save_stack_trace_tsk+0x48/0x70 arch/x86/kernel/stacktrace.c:71 [] proc_pid_stack+0x148/0x220 fs/proc/base.c:469 IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xb42/0xc00 net/netfilter/ipvs/ip_vs_ctl.c:2471 IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xb42/0xc00 net/netfilter/ipvs/ip_vs_ctl.c:2471 [] proc_single_show+0xfd/0x170 fs/proc/base.c:771 [] seq_read+0x4b6/0x12e0 fs/seq_file.c:240 [] do_loop_readv_writev.part.18+0xd5/0x280 fs/read_write.c:718 [] do_loop_readv_writev fs/read_write.c:707 [inline] [] do_readv_writev+0x565/0x7a0 fs/read_write.c:873 [] vfs_readv+0x84/0xc0 fs/read_write.c:897 [] do_preadv+0x197/0x240 fs/read_write.c:974 [] SYSC_preadv fs/read_write.c:1024 [inline] [] SyS_preadv+0x30/0x40 fs/read_write.c:1019 [] do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb The buggy address belongs to the page: page:ffffea0007358bc0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x8000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801cd62f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801cd62f780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8801cd62f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff8801cd62f880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801cd62f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== IPVS: Creating netns size=2536 id=23