audit: type=1400 audit(1519302927.825:27): avc: denied { dac_override } for pid=7365 comm="syz-executor7" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 ================================================================== BUG: KASAN: stack-out-of-bounds in get_frame_pointer arch/x86/include/asm/stacktrace.h:64 [inline] BUG: KASAN: stack-out-of-bounds in __unwind_start+0x3a7/0x3c0 arch/x86/kernel/unwind_frame.c:76 Read of size 8 at addr ffff8801d06af860 by task syz-executor7/7387 CPU: 1 PID: 7387 Comm: syz-executor7 Not tainted 4.9.82-g7595d55 #39 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801b101f710 ffffffff81d94fc9 ffffea000741abc0 ffff8801d06af860 0000000000000000 ffff8801d06af860 ffff8801b101f840 ffff8801b101f748 ffffffff8153e213 ffff8801d06af860 0000000000000008 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_address_description+0x73/0x280 mm/kasan/report.c:252 [] kasan_report_error mm/kasan/report.c:351 [inline] [] kasan_report+0x275/0x360 mm/kasan/report.c:408 [] __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:429 [] get_frame_pointer arch/x86/include/asm/stacktrace.h:64 [inline] [] __unwind_start+0x3a7/0x3c0 arch/x86/kernel/unwind_frame.c:76 [] unwind_start arch/x86/include/asm/unwind.h:39 [inline] [] __save_stack_trace+0x59/0xf0 arch/x86/kernel/stacktrace.c:41 [] save_stack_trace_tsk+0x48/0x70 arch/x86/kernel/stacktrace.c:71 [] proc_pid_stack+0x146/0x230 fs/proc/base.c:466 [] proc_single_show+0xf8/0x170 fs/proc/base.c:768 [] traverse+0x231/0x900 fs/seq_file.c:124 [] seq_read+0x7ea/0x1290 fs/seq_file.c:195 [] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714 [] do_loop_readv_writev fs/read_write.c:880 [inline] [] do_readv_writev+0x520/0x750 fs/read_write.c:874 [] vfs_readv+0x84/0xc0 fs/read_write.c:898 [] do_preadv+0x115/0x1a0 fs/read_write.c:975 [] SYSC_preadv fs/read_write.c:1025 [inline] [] SyS_preadv+0x30/0x40 fs/read_write.c:1020 [] do_syscall_64+0x1a5/0x490 arch/x86/entry/common.c:282 [] entry_SYSCALL_64_after_swapgs+0x47/0xc5 The buggy address belongs to the page: page:ffffea000741abc0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x8000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801d06af700: f1 f1 00 00 00 04 f2 f2 f2 f2 00 00 00 00 f3 f3 ffff8801d06af780: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8801d06af800: 00 00 f1 f1 f1 f1 00 00 04 f2 f2 f2 f2 f2 00 00 ^ ffff8801d06af880: 00 00 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 ffff8801d06af900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================