================================================================== BUG: KASAN: stack-out-of-bounds in csd_lock_record+0xd2/0xe0 kernel/smp.c:119 Read of size 8 at addr ffffc9000d29f978 by task syz-executor.1/11068 CPU: 1 PID: 11068 Comm: syz-executor.1 Not tainted 5.8.0-rc3-next-20200703-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x18f/0x20d lib/dump_stack.c:118 print_address_description.constprop.0.cold+0x5/0x436 mm/kasan/report.c:383 __kasan_report mm/kasan/report.c:513 [inline] kasan_report.cold+0x1f/0x37 mm/kasan/report.c:530 csd_lock_record+0xd2/0xe0 kernel/smp.c:119 flush_smp_call_function_queue+0x285/0x730 kernel/smp.c:391 __sysvec_call_function_single+0x98/0x490 arch/x86/kernel/smp.c:248 asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:706 __run_on_irqstack arch/x86/include/asm/irq_stack.h:22 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:48 [inline] sysvec_call_function_single+0xe0/0x120 arch/x86/kernel/smp.c:243 asm_sysvec_call_function_single+0x12/0x20 arch/x86/include/asm/idtentry.h:604 RIP: 0010:__sanitizer_cov_trace_pc+0x52/0x60 kernel/kcov.c:205 Code: 74 2b 8b 82 e8 13 00 00 83 f8 02 75 20 48 8b 8a f0 13 00 00 8b 92 ec 13 00 00 48 8b 01 48 83 c0 01 48 39 c2 76 07 48 89 34 c1 <48> 89 01 c3 66 2e 0f 1f 84 00 00 00 00 00 41 55 41 54 49 89 fc 55 RSP: 0018:ffffc90007f37598 EFLAGS: 00000212 RAX: 000000000000adf9 RBX: 0000000000000003 RCX: ffffc90004349000 RDX: 0000000000040000 RSI: ffffffff83646081 RDI: 0000000000000001 RBP: ffff88809186c400 R08: 0000000000000001 R09: ffffffff8cad1e87 R10: 0000000000000010 R11: 0000000000000000 R12: 0000000000000010 R13: 0000000000000045 R14: dffffc0000000000 R15: 0000000000000000 tomoyo_domain_quota_is_ok+0x2f1/0x550 security/tomoyo/util.c:1071 tomoyo_supervisor+0x2d4/0xeb0 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x25c/0x360 security/tomoyo/file.c:573 tomoyo_check_open_permission+0x30f/0x380 security/tomoyo/file.c:780 tomoyo_file_open security/tomoyo/tomoyo.c:313 [inline] tomoyo_file_open+0xa3/0xd0 security/tomoyo/tomoyo.c:308 security_file_open+0x52/0x3f0 security/security.c:1574 do_dentry_open+0x358/0x11b0 fs/open.c:809 do_open fs/namei.c:3249 [inline] path_openat+0x1bb9/0x2750 fs/namei.c:3366 do_filp_open+0x17e/0x3c0 fs/namei.c:3393 do_sys_openat2+0x16f/0x3b0 fs/open.c:1173 do_sys_open fs/open.c:1189 [inline] __do_sys_openat fs/open.c:1203 [inline] __se_sys_openat fs/open.c:1198 [inline] __x64_sys_openat+0x13f/0x1f0 fs/open.c:1198 do_syscall_64+0x60/0xe0 arch/x86/entry/common.c:367 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45cb29 Code: Bad RIP value. RSP: 002b:00007f72658c1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00000000004f8220 RCX: 000000000045cb29 RDX: 0000000000020002 RSI: 0000000020000100 RDI: ffffffffffffff9c RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000000007ae R14: 00000000004ca9c6 R15: 00007f72658c26d4 Memory state around the buggy address: ffffc9000d29f800: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 ffffc9000d29f880: 00 00 00 00 00 00 00 00 00 00 00 f3 f3 f3 f3 f3 >ffffc9000d29f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 ^ ffffc9000d29f980: f1 00 00 00 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 ffffc9000d29fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================