================================================================== BUG: KASAN: stack-out-of-bounds in csd_lock_record+0xcb/0xe0 kernel/smp.c:118 Read of size 8 at addr ffffc90001bcf5f0 by task systemd-udevd/3882 CPU: 0 PID: 3882 Comm: systemd-udevd Not tainted 5.8.0-rc3-next-20200703-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x18f/0x20d lib/dump_stack.c:118 print_address_description.constprop.0.cold+0x5/0x436 mm/kasan/report.c:383 __kasan_report mm/kasan/report.c:513 [inline] kasan_report.cold+0x1f/0x37 mm/kasan/report.c:530 csd_lock_record+0xcb/0xe0 kernel/smp.c:118 flush_smp_call_function_queue+0x285/0x730 kernel/smp.c:391 __sysvec_call_function_single+0x98/0x490 arch/x86/kernel/smp.c:248 asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:706 __run_on_irqstack arch/x86/include/asm/irq_stack.h:22 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:48 [inline] sysvec_call_function_single+0xe0/0x120 arch/x86/kernel/smp.c:243 asm_sysvec_call_function_single+0x12/0x20 arch/x86/include/asm/idtentry.h:604 RIP: 0010:check_memory_region_inline mm/kasan/generic.c:172 [inline] RIP: 0010:check_memory_region+0x9/0x180 mm/kasan/generic.c:192 Code: 00 48 89 f2 be f5 00 00 00 e9 93 9c 00 02 0f 1f 00 48 89 f2 be f8 00 00 00 e9 83 9c 00 02 0f 1f 00 48 85 f6 0f 84 70 01 00 00 <49> 89 f9 41 54 44 0f b6 c2 49 01 f1 55 53 0f 82 18 01 00 00 48 b8 RSP: 0018:ffffc90001277a18 EFLAGS: 00000202 RAX: 0000000000000003 RBX: 00000000000000e4 RCX: ffffffff8362e412 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88809fd90f48 RBP: dffffc0000000000 R08: 0000000000000000 R09: ffff88809fd90f4f R10: 00000000000000ff R11: 0000000000000000 R12: ffff88809fd90f00 R13: ffffc90001277b48 R14: ffff88809fd90f30 R15: 00000000000000e4 instrument_atomic_read include/linux/instrumented.h:56 [inline] test_bit include/asm-generic/bitops/instrumented-non-atomic.h:110 [inline] tomoyo_check_acl+0x2d2/0x410 security/tomoyo/domain.c:184 tomoyo_path_permission security/tomoyo/file.c:586 [inline] tomoyo_path_permission+0x1f5/0x360 security/tomoyo/file.c:573 tomoyo_path_perm+0x2e7/0x3f0 security/tomoyo/file.c:838 security_inode_getattr+0xcf/0x140 security/security.c:1278 vfs_getattr fs/stat.c:121 [inline] vfs_statx+0x170/0x390 fs/stat.c:206 vfs_lstat include/linux/fs.h:3161 [inline] __do_sys_newlstat+0x91/0x110 fs/stat.c:374 do_syscall_64+0x60/0xe0 arch/x86/entry/common.c:367 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f61b3d93335 Code: Bad RIP value. RSP: 002b:00007ffc2aabb618 EFLAGS: 00000246 ORIG_RAX: 0000000000000006 RAX: ffffffffffffffda RBX: 000055bc49ff6a40 RCX: 00007f61b3d93335 RDX: 00007ffc2aabb650 RSI: 00007ffc2aabb650 RDI: 000055bc49ff5a40 RBP: 00007ffc2aabb710 R08: 00007f61b4052278 R09: 0000000000001010 R10: 00007f61b4051b58 R11: 0000000000000246 R12: 000055bc49ff5a40 R13: 000055bc49ff5a60 R14: 000055bc49ff562b R15: 000055bc49ff5630 Memory state around the buggy address: ffffc90001bcf480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc90001bcf500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc90001bcf580: 00 00 00 00 f1 f1 f1 f1 00 00 00 00 f3 f3 f3 f3 ^ ffffc90001bcf600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc90001bcf680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================