ffff88809ed658d8: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
ffff88809ed658e8: e8 58 d6 9e 80 88 ff ff e8 58 d6 9e 80 88 ff ff .X.......X......
ffff88809ed658f8: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
ffff88809ed65908: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
==================================================================
BUG: KASAN: slab-out-of-bounds in hex_dump_to_buffer+0x9d1/0xaa0 lib/hexdump.c:196
Read of size 1 at addr ffff88809ed65920 by task syz-executor100/7983
CPU: 0 PID: 7983 Comm: syz-executor100 Not tainted 4.14.295-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x1b2/0x281 lib/dump_stack.c:58
print_address_description.cold+0x54/0x1d3 mm/kasan/report.c:252
kasan_report_error.cold+0x8a/0x191 mm/kasan/report.c:351
kasan_report mm/kasan/report.c:409 [inline]
__asan_report_load1_noabort+0x68/0x70 mm/kasan/report.c:427
hex_dump_to_buffer+0x9d1/0xaa0 lib/hexdump.c:196
print_hex_dump+0xef/0x170 lib/hexdump.c:279
ea_get.cold+0x59/0x75 fs/jfs/xattr.c:574
__jfs_getxattr+0xae/0x340 fs/jfs/xattr.c:820
jfs_get_acl+0xf3/0x150 fs/jfs/acl.c:48
get_acl fs/posix_acl.c:140 [inline]
get_acl+0x11f/0x210 fs/posix_acl.c:95
posix_acl_create.part.0+0x2c/0x250 fs/posix_acl.c:594
posix_acl_create+0x10a/0x150 fs/posix_acl.c:628
jfs_init_acl+0x71/0x230 fs/jfs/acl.c:142
jfs_mkdir.part.0+0x175/0x7e0 fs/jfs/namei.c:249
jfs_mkdir+0x35/0x50 fs/jfs/namei.c:223
vfs_mkdir+0x463/0x6e0 fs/namei.c:3851
SYSC_mkdirat fs/namei.c:3874 [inline]
SyS_mkdirat+0x1fd/0x270 fs/namei.c:3858
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x7fc171493d69
RSP: 002b:00007ffe621de068 EFLAGS: 00000246 ORIG_RAX: 0000000000000102
RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 00007fc171493d69
RDX: 0000000000000050 RSI: 0000000020000040 RDI: 0000000000000003
RBP: 00007fc1714535d0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000f8008000
R13: 0000000000000000 R14: 00080000000000f4 R15: 0000000000000000
Allocated by task 7983:
save_stack mm/kasan/kasan.c:447 [inline]
set_track mm/kasan/kasan.c:459 [inline]
kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:551
kmem_cache_alloc+0x124/0x3c0 mm/slab.c:3552
jfs_alloc_inode+0x18/0x50 fs/jfs/super.c:118
alloc_inode+0x5d/0x170 fs/inode.c:210
iget_locked+0x151/0x400 fs/inode.c:1127
jfs_iget+0x1e/0x480 fs/jfs/inode.c:41
jfs_lookup+0x156/0x170 fs/jfs/namei.c:1478
lookup_open+0x5c4/0x1750 fs/namei.c:3220
do_last fs/namei.c:3334 [inline]
path_openat+0x14bb/0x2970 fs/namei.c:3571
do_filp_open+0x179/0x3c0 fs/namei.c:3605
do_sys_open+0x296/0x410 fs/open.c:1081
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
Freed by task 0:
(stack is not available)
The buggy address belongs to the object at ffff88809ed65180
which belongs to the cache jfs_ip of size 1952
The buggy address is located 0 bytes to the right of
1952-byte region [ffff88809ed65180, ffff88809ed65920)
The buggy address belongs to the page:
page:ffffea00027b5940 count:1 mapcount:0 mapping:ffff88809ed65180 index:0xffff88809ed65fff
flags: 0xfff00000000100(slab)
raw: 00fff00000000100 ffff88809ed65180 ffff88809ed65fff 0000000100000001
raw: ffffea000251ad20 ffffea000237d5a0 ffff8882393f36c0 0000000000000000
page dumped because: kasan: bad access detected
Memory state around the buggy address:
ffff88809ed65800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff88809ed65880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffff88809ed65900: 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc
^
ffff88809ed65980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ffff88809ed65a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
==================================================================