ffff88809ed658d8: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ffff88809ed658e8: e8 58 d6 9e 80 88 ff ff e8 58 d6 9e 80 88 ff ff .X.......X...... ffff88809ed658f8: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ ffff88809ed65908: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ================================================================== BUG: KASAN: slab-out-of-bounds in hex_dump_to_buffer+0x9d1/0xaa0 lib/hexdump.c:196 Read of size 1 at addr ffff88809ed65920 by task syz-executor100/7983 CPU: 0 PID: 7983 Comm: syz-executor100 Not tainted 4.14.295-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 print_address_description.cold+0x54/0x1d3 mm/kasan/report.c:252 kasan_report_error.cold+0x8a/0x191 mm/kasan/report.c:351 kasan_report mm/kasan/report.c:409 [inline] __asan_report_load1_noabort+0x68/0x70 mm/kasan/report.c:427 hex_dump_to_buffer+0x9d1/0xaa0 lib/hexdump.c:196 print_hex_dump+0xef/0x170 lib/hexdump.c:279 ea_get.cold+0x59/0x75 fs/jfs/xattr.c:574 __jfs_getxattr+0xae/0x340 fs/jfs/xattr.c:820 jfs_get_acl+0xf3/0x150 fs/jfs/acl.c:48 get_acl fs/posix_acl.c:140 [inline] get_acl+0x11f/0x210 fs/posix_acl.c:95 posix_acl_create.part.0+0x2c/0x250 fs/posix_acl.c:594 posix_acl_create+0x10a/0x150 fs/posix_acl.c:628 jfs_init_acl+0x71/0x230 fs/jfs/acl.c:142 jfs_mkdir.part.0+0x175/0x7e0 fs/jfs/namei.c:249 jfs_mkdir+0x35/0x50 fs/jfs/namei.c:223 vfs_mkdir+0x463/0x6e0 fs/namei.c:3851 SYSC_mkdirat fs/namei.c:3874 [inline] SyS_mkdirat+0x1fd/0x270 fs/namei.c:3858 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7fc171493d69 RSP: 002b:00007ffe621de068 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 00007fc171493d69 RDX: 0000000000000050 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 00007fc1714535d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000f8008000 R13: 0000000000000000 R14: 00080000000000f4 R15: 0000000000000000 Allocated by task 7983: save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:551 kmem_cache_alloc+0x124/0x3c0 mm/slab.c:3552 jfs_alloc_inode+0x18/0x50 fs/jfs/super.c:118 alloc_inode+0x5d/0x170 fs/inode.c:210 iget_locked+0x151/0x400 fs/inode.c:1127 jfs_iget+0x1e/0x480 fs/jfs/inode.c:41 jfs_lookup+0x156/0x170 fs/jfs/namei.c:1478 lookup_open+0x5c4/0x1750 fs/namei.c:3220 do_last fs/namei.c:3334 [inline] path_openat+0x14bb/0x2970 fs/namei.c:3571 do_filp_open+0x179/0x3c0 fs/namei.c:3605 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff88809ed65180 which belongs to the cache jfs_ip of size 1952 The buggy address is located 0 bytes to the right of 1952-byte region [ffff88809ed65180, ffff88809ed65920) The buggy address belongs to the page: page:ffffea00027b5940 count:1 mapcount:0 mapping:ffff88809ed65180 index:0xffff88809ed65fff flags: 0xfff00000000100(slab) raw: 00fff00000000100 ffff88809ed65180 ffff88809ed65fff 0000000100000001 raw: ffffea000251ad20 ffffea000237d5a0 ffff8882393f36c0 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88809ed65800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88809ed65880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88809ed65900: 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff88809ed65980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff88809ed65a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ==================================================================