BUG: stack guard page was hit at ffffc90009df7fb8 (stack is ffffc90009df8000..ffffc90009dfffff) kernel stack overflow (double-fault): 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 30663 Comm: syz-executor.3 Not tainted 5.10.112-syzkaller-00287-gde64d941a71a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:avc_has_perm_noaudit+0x18/0x4c0 security/selinux/avc.c:1150 Code: e9 f7 fe ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec e0 00 00 00 <4c> 89 4c 24 38 45 89 c4 89 4c 24 14 48 89 54 24 18 41 89 f6 49 89 RSP: 0018:ffffc90009df7fc0 EFLAGS: 00010286 RAX: 0000000000000005 RBX: 0000000000000000 RCX: 0000000000000005 RDX: 0000000000000079 RSI: 0000000000000079 RDI: ffffffff86d0ed00 RBP: ffffc90009df80c8 R08: 0000000000200000 R09: 0000000000000000 R10: 0000000000000002 R11: ffff888117a18000 R12: ffffc90009df8160 R13: 0000000000200000 R14: 0000000000000015 R15: 1ffff920013bf020 FS: 00007f3f53452700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90009df7fb8 CR3: 000000010d60b000 CR4: 00000000003506a0 Call Trace: Modules linked in: ---[ end trace e8edfbe039ec1ded ]--- RIP: 0010:avc_has_perm_noaudit+0x18/0x4c0 security/selinux/avc.c:1150 Code: e9 f7 fe ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec e0 00 00 00 <4c> 89 4c 24 38 45 89 c4 89 4c 24 14 48 89 54 24 18 41 89 f6 49 89 RSP: 0018:ffffc90009df7fc0 EFLAGS: 00010286 RAX: 0000000000000005 RBX: 0000000000000000 RCX: 0000000000000005 RDX: 0000000000000079 RSI: 0000000000000079 RDI: ffffffff86d0ed00 RBP: ffffc90009df80c8 R08: 0000000000200000 R09: 0000000000000000 R10: 0000000000000002 R11: ffff888117a18000 R12: ffffc90009df8160 R13: 0000000000200000 R14: 0000000000000015 R15: 1ffff920013bf020 FS: 00007f3f53452700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90009df7fb8 CR3: 000000010d60b000 CR4: 00000000003506a0 ---------------- Code disassembly (best guess): 0: e9 f7 fe ff ff jmpq 0xfffffefc 5: 66 66 2e 0f 1f 84 00 data16 nopw %cs:0x0(%rax,%rax,1) c: 00 00 00 00 10: 66 90 xchg %ax,%ax 12: 55 push %rbp 13: 48 89 e5 mov %rsp,%rbp 16: 41 57 push %r15 18: 41 56 push %r14 1a: 41 55 push %r13 1c: 41 54 push %r12 1e: 53 push %rbx 1f: 48 83 e4 e0 and $0xffffffffffffffe0,%rsp 23: 48 81 ec e0 00 00 00 sub $0xe0,%rsp * 2a: 4c 89 4c 24 38 mov %r9,0x38(%rsp) <-- trapping instruction 2f: 45 89 c4 mov %r8d,%r12d 32: 89 4c 24 14 mov %ecx,0x14(%rsp) 36: 48 89 54 24 18 mov %rdx,0x18(%rsp) 3b: 41 89 f6 mov %esi,%r14d 3e: 49 rex.WB 3f: 89 .byte 0x89