================================================================== BUG: KASAN: out-of-bounds in csd_lock_record+0xd2/0xe0 kernel/smp.c:119 Read of size 8 at addr ffffc90008d87998 by task syz-executor.5/19920 CPU: 1 PID: 19920 Comm: syz-executor.5 Not tainted 5.8.0-rc3-next-20200703-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x18f/0x20d lib/dump_stack.c:118 print_address_description.constprop.0.cold+0x5/0x436 mm/kasan/report.c:383 __kasan_report mm/kasan/report.c:513 [inline] kasan_report.cold+0x1f/0x37 mm/kasan/report.c:530 csd_lock_record+0xd2/0xe0 kernel/smp.c:119 flush_smp_call_function_queue+0x285/0x730 kernel/smp.c:391 __sysvec_call_function_single+0x98/0x490 arch/x86/kernel/smp.c:248 asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:706 __run_on_irqstack arch/x86/include/asm/irq_stack.h:22 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:48 [inline] sysvec_call_function_single+0xe0/0x120 arch/x86/kernel/smp.c:243 asm_sysvec_call_function_single+0x12/0x20 arch/x86/include/asm/idtentry.h:604 RIP: 0010:__sanitizer_cov_trace_pc+0x3c/0x60 kernel/kcov.c:203 Code: 01 ff 00 48 8b 34 24 74 0f f6 c4 01 74 35 8b 82 0c 14 00 00 85 c0 74 2b 8b 82 e8 13 00 00 83 f8 02 75 20 48 8b 8a f0 13 00 00 <8b> 92 ec 13 00 00 48 8b 01 48 83 c0 01 48 39 c2 76 07 48 89 34 c1 RSP: 0018:ffffc9001adb7b60 EFLAGS: 00000246 RAX: 0000000000000002 RBX: 00000000000000d8 RCX: ffffc900140a0000 RDX: ffff888028e86580 RSI: ffffffff8362e3fd RDI: 0000000000000003 RBP: dffffc0000000000 R08: 0000000000000000 R09: ffff88809a27d5cf R10: 00000000000000ff R11: 0000000000000000 R12: ffff88809a27d500 R13: ffffc9001adb7c10 R14: ffff88809a27d5b0 R15: 00000000000000d8 tomoyo_check_acl+0x2bd/0x410 security/tomoyo/domain.c:184 tomoyo_inet_entry security/tomoyo/network.c:483 [inline] tomoyo_check_inet_address+0x5bf/0x6c0 security/tomoyo/network.c:532 tomoyo_socket_bind_permission+0x246/0x320 security/tomoyo/network.c:745 security_socket_bind+0x50/0xb0 security/security.c:2118 __sys_bind+0x180/0x250 net/socket.c:1653 __do_sys_bind net/socket.c:1668 [inline] __se_sys_bind net/socket.c:1666 [inline] __x64_sys_bind+0x6f/0xb0 net/socket.c:1666 do_syscall_64+0x60/0xe0 arch/x86/entry/common.c:367 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45cb29 Code: Bad RIP value. RSP: 002b:00007fdb36fe5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 RAX: ffffffffffffffda RBX: 00000000004da360 RCX: 000000000045cb29 RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000005 RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 0000000000000033 R14: 00000000004c3070 R15: 00007fdb36fe66d4 Memory state around the buggy address: ffffc90008d87880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc90008d87900: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 >ffffc90008d87980: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffffc90008d87a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc90008d87a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================