================================================================== BUG: KASAN: invalid-access in tomoyo_memory_ok+0x1c/0xb0 security/tomoyo/memory.c:50 Read of size 1 at addr f7ff00007b7ce000 by task hostname/4143 Pointer tag: [f7], memory tag: [f0] CPU: 0 PID: 4143 Comm: hostname Not tainted 5.12.0-rc2-syzkaller-00271-g05a59d79793d #0 Hardware name: linux,dummy-virt (DT) Call trace: dump_backtrace+0x0/0x1b0 arch/arm64/kernel/stacktrace.c:112 show_stack+0x18/0x70 arch/arm64/kernel/stacktrace.c:191 __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0xd0/0x12c lib/dump_stack.c:120 print_address_description+0x70/0x29c mm/kasan/report.c:232 __kasan_report mm/kasan/report.c:399 [inline] kasan_report+0x134/0x380 mm/kasan/report.c:416 __kasan_check_byte+0x60/0x70 mm/kasan/common.c:580 kasan_check_byte include/linux/kasan.h:265 [inline] ksize+0x90/0xcc mm/slab_common.c:1250 tomoyo_memory_ok+0x1c/0xb0 security/tomoyo/memory.c:50 tomoyo_commit_ok+0x30/0x94 security/tomoyo/memory.c:78 tomoyo_update_domain+0xb8/0x200 security/tomoyo/domain.c:139 tomoyo_update_path_acl security/tomoyo/file.c:398 [inline] tomoyo_write_file+0x210/0x460 security/tomoyo/file.c:1022 tomoyo_write_domain2+0x6c/0xc0 security/tomoyo/common.c:1152 tomoyo_add_entry security/tomoyo/common.c:2042 [inline] tomoyo_supervisor+0x4a8/0x640 security/tomoyo/common.c:2103 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x9c/0xdc security/tomoyo/file.c:573 tomoyo_check_open_permission+0x188/0x1a0 security/tomoyo/file.c:777 tomoyo_file_open security/tomoyo/tomoyo.c:313 [inline] tomoyo_file_open+0x38/0x4c security/tomoyo/tomoyo.c:308 security_file_open+0x2c/0x150 security/security.c:1589 do_dentry_open+0xd8/0x3c0 fs/open.c:813 vfs_open+0x30/0x3c fs/open.c:940 do_open fs/namei.c:3365 [inline] path_openat+0x488/0xf10 fs/namei.c:3498 do_filp_open+0x74/0x124 fs/namei.c:3525 do_sys_openat2+0xb4/0x160 fs/open.c:1187 do_sys_open fs/open.c:1203 [inline] __do_sys_openat fs/open.c:1219 [inline] __se_sys_openat fs/open.c:1214 [inline] __arm64_sys_openat+0x64/0xb0 fs/open.c:1214 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 Allocated by task 2846403498: ------------[ cut here ]------------ slab index 831406 out of bounds (274) for stack id adacafae WARNING: CPU: 0 PID: 4143 at lib/stackdepot.c:236 stack_depot_fetch+0x68/0x84 lib/stackdepot.c:236 Modules linked in: CPU: 0 PID: 4143 Comm: hostname Not tainted 5.12.0-rc2-syzkaller-00271-g05a59d79793d #0 Hardware name: linux,dummy-virt (DT) pstate: 60400089 (nZCv daIf +PAN -UAO -TCO BTYPE=--) pc : stack_depot_fetch+0x68/0x84 lib/stackdepot.c:236 lr : stack_depot_fetch+0x68/0x84 lib/stackdepot.c:236 sp : ffff80001e1db530 x29: ffff80001e1db530 x28: ffff800013b0a390 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000030 x24: f7ff000004401200 x23: 00000000000000f7 x22: ffff800012b81160 x21: 00ff00007b7ce000 x20: ffff00007b7ce000 x19: ffff00007b7ce080 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: ffffffffffffffff x13: 0000000000000564 x12: ffff80001e1db1e0 x11: ffff800013aab570 x10: 00000000ffffe000 x9 : ffff800013aab570 x8 : ffff8000139fb570 x7 : ffff800013aab570 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f3ff0000093a5b80 Call trace: stack_depot_fetch+0x68/0x84 lib/stackdepot.c:236 print_stack mm/kasan/report.c:116 [inline] print_track+0x34/0x64 mm/kasan/report.c:124 describe_object_stacks mm/kasan/report.c:178 [inline] describe_object mm/kasan/report.c:208 [inline] print_address_description+0x14c/0x29c mm/kasan/report.c:239 __kasan_report mm/kasan/report.c:399 [inline] kasan_report+0x134/0x380 mm/kasan/report.c:416 __kasan_check_byte+0x60/0x70 mm/kasan/common.c:580 kasan_check_byte include/linux/kasan.h:265 [inline] ksize+0x90/0xcc mm/slab_common.c:1250 tomoyo_memory_ok+0x1c/0xb0 security/tomoyo/memory.c:50 tomoyo_commit_ok+0x30/0x94 security/tomoyo/memory.c:78 tomoyo_update_domain+0xb8/0x200 security/tomoyo/domain.c:139 tomoyo_update_path_acl security/tomoyo/file.c:398 [inline] tomoyo_write_file+0x210/0x460 security/tomoyo/file.c:1022 tomoyo_write_domain2+0x6c/0xc0 security/tomoyo/common.c:1152 tomoyo_add_entry security/tomoyo/common.c:2042 [inline] tomoyo_supervisor+0x4a8/0x640 security/tomoyo/common.c:2103 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x9c/0xdc security/tomoyo/file.c:573 tomoyo_check_open_permission+0x188/0x1a0 security/tomoyo/file.c:777 tomoyo_file_open security/tomoyo/tomoyo.c:313 [inline] tomoyo_file_open+0x38/0x4c security/tomoyo/tomoyo.c:308 security_file_open+0x2c/0x150 security/security.c:1589 do_dentry_open+0xd8/0x3c0 fs/open.c:813 vfs_open+0x30/0x3c fs/open.c:940 do_open fs/namei.c:3365 [inline] path_openat+0x488/0xf10 fs/namei.c:3498 do_filp_open+0x74/0x124 fs/namei.c:3525 do_sys_openat2+0xb4/0x160 fs/open.c:1187 do_sys_open fs/open.c:1203 [inline] __do_sys_openat fs/open.c:1219 [inline] __se_sys_openat fs/open.c:1214 [inline] __arm64_sys_openat+0x64/0xb0 fs/open.c:1214 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699