syzbot


KASAN: slab-out-of-bounds Read in ea_get

Status: upstream: reported C repro on 2022/10/07 03:56
Reported-by: syzbot+4bccd045a7fdc8d1811f@syzkaller.appspotmail.com
First crash: 618d, last: 480d
Similar bugs (5)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 KASAN: slab-out-of-bounds Read in ea_get 3 588d 620d 0/1 auto-obsoleted due to no activity on 2023/03/06 17:23
linux-6.1 KASAN: slab-out-of-bounds Read in ea_get origin:upstream C 5 15d 380d 0/3 upstream: reported C repro on 2023/06/02 15:16
linux-5.15 KASAN: slab-out-of-bounds Read in ea_get origin:upstream C error 18 44d 381d 0/3 upstream: reported C repro on 2023/06/01 07:39
upstream KASAN: slab-out-of-bounds Read in ea_get (2) jfs C 10 13d 44d 8/27 upstream: reported C repro on 2024/05/03 18:51
upstream KASAN: slab-out-of-bounds Read in ea_get jfs C inconclusive 29 243d 621d 0/27 closed as dup on 2022/10/05 09:10
Fix bisection attempts (3)
Created Duration User Patch Repo Result
2023/02/22 14:01 28m bisect fix linux-4.14.y job log (0) log
2023/01/23 02:53 21m bisect fix linux-4.14.y job log (0) log
2022/11/06 04:12 28m bisect fix linux-4.14.y job log (0) log

Sample crash report:
ffff88809ed658d8: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
ffff88809ed658e8: e8 58 d6 9e 80 88 ff ff e8 58 d6 9e 80 88 ff ff  .X.......X......
ffff88809ed658f8: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
ffff88809ed65908: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
==================================================================
BUG: KASAN: slab-out-of-bounds in hex_dump_to_buffer+0x9d1/0xaa0 lib/hexdump.c:196
Read of size 1 at addr ffff88809ed65920 by task syz-executor100/7983

CPU: 0 PID: 7983 Comm: syz-executor100 Not tainted 4.14.295-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x281 lib/dump_stack.c:58
 print_address_description.cold+0x54/0x1d3 mm/kasan/report.c:252
 kasan_report_error.cold+0x8a/0x191 mm/kasan/report.c:351
 kasan_report mm/kasan/report.c:409 [inline]
 __asan_report_load1_noabort+0x68/0x70 mm/kasan/report.c:427
 hex_dump_to_buffer+0x9d1/0xaa0 lib/hexdump.c:196
 print_hex_dump+0xef/0x170 lib/hexdump.c:279
 ea_get.cold+0x59/0x75 fs/jfs/xattr.c:574
 __jfs_getxattr+0xae/0x340 fs/jfs/xattr.c:820
 jfs_get_acl+0xf3/0x150 fs/jfs/acl.c:48
 get_acl fs/posix_acl.c:140 [inline]
 get_acl+0x11f/0x210 fs/posix_acl.c:95
 posix_acl_create.part.0+0x2c/0x250 fs/posix_acl.c:594
 posix_acl_create+0x10a/0x150 fs/posix_acl.c:628
 jfs_init_acl+0x71/0x230 fs/jfs/acl.c:142
 jfs_mkdir.part.0+0x175/0x7e0 fs/jfs/namei.c:249
 jfs_mkdir+0x35/0x50 fs/jfs/namei.c:223
 vfs_mkdir+0x463/0x6e0 fs/namei.c:3851
 SYSC_mkdirat fs/namei.c:3874 [inline]
 SyS_mkdirat+0x1fd/0x270 fs/namei.c:3858
 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x7fc171493d69
RSP: 002b:00007ffe621de068 EFLAGS: 00000246 ORIG_RAX: 0000000000000102
RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 00007fc171493d69
RDX: 0000000000000050 RSI: 0000000020000040 RDI: 0000000000000003
RBP: 00007fc1714535d0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000f8008000
R13: 0000000000000000 R14: 00080000000000f4 R15: 0000000000000000

Allocated by task 7983:
 save_stack mm/kasan/kasan.c:447 [inline]
 set_track mm/kasan/kasan.c:459 [inline]
 kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:551
 kmem_cache_alloc+0x124/0x3c0 mm/slab.c:3552
 jfs_alloc_inode+0x18/0x50 fs/jfs/super.c:118
 alloc_inode+0x5d/0x170 fs/inode.c:210
 iget_locked+0x151/0x400 fs/inode.c:1127
 jfs_iget+0x1e/0x480 fs/jfs/inode.c:41
 jfs_lookup+0x156/0x170 fs/jfs/namei.c:1478
 lookup_open+0x5c4/0x1750 fs/namei.c:3220
 do_last fs/namei.c:3334 [inline]
 path_openat+0x14bb/0x2970 fs/namei.c:3571
 do_filp_open+0x179/0x3c0 fs/namei.c:3605
 do_sys_open+0x296/0x410 fs/open.c:1081
 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x46/0xbb

Freed by task 0:
(stack is not available)

The buggy address belongs to the object at ffff88809ed65180
 which belongs to the cache jfs_ip of size 1952
The buggy address is located 0 bytes to the right of
 1952-byte region [ffff88809ed65180, ffff88809ed65920)
The buggy address belongs to the page:
page:ffffea00027b5940 count:1 mapcount:0 mapping:ffff88809ed65180 index:0xffff88809ed65fff
flags: 0xfff00000000100(slab)
raw: 00fff00000000100 ffff88809ed65180 ffff88809ed65fff 0000000100000001
raw: ffffea000251ad20 ffffea000237d5a0 ffff8882393f36c0 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff88809ed65800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff88809ed65880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffff88809ed65900: 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc
                               ^
 ffff88809ed65980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff88809ed65a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
==================================================================

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2022/10/07 03:55 linux-4.14.y 9d5c0b3a8e1a 80b58a42 .config console log report syz C [disk image] [vmlinux] [mounted in repro] ci2-linux-4-14 KASAN: slab-out-of-bounds Read in ea_get
* Struck through repros no longer work on HEAD.