00000000fa354ee6: 00 00 02 00 00 00 00 00 58 49 c0 37 80 88 ff ff ........XI.7.... 00000000c6556536: 58 49 c0 37 80 88 ff ff 00 00 00 00 00 00 00 00 XI.7............ 00000000aa16d284: 70 49 c0 37 80 88 ff ff 70 49 c0 37 80 88 ff ff pI.7....pI.7.... 00000000b2e1bd07: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 000000009f6a38f4: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000007850ed2a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ================================================================== BUG: KASAN: slab-out-of-bounds in hex_dump_to_buffer+0x891/0xad0 lib/hexdump.c:172 Read of size 1 at addr ffff888037c049b0 by task syz-executor.0/6021 CPU: 1 PID: 6021 Comm: syz-executor.0 Not tainted 5.11.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x9a/0xcc lib/dump_stack.c:120 print_address_description.constprop.0.cold+0x5b/0x2c6 mm/kasan/report.c:230 __kasan_report mm/kasan/report.c:396 [inline] kasan_report.cold+0x79/0xd5 mm/kasan/report.c:413 hex_dump_to_buffer+0x891/0xad0 lib/hexdump.c:172 print_hex_dump+0xf7/0x180 lib/hexdump.c:255 ea_get.cold+0xbe/0x277 fs/jfs/xattr.c:561 __jfs_getxattr+0xba/0x330 fs/jfs/xattr.c:807 jfs_xattr_get+0x27/0x30 fs/jfs/xattr.c:931 __vfs_getxattr+0xb9/0x110 fs/xattr.c:386 inode_doinit_use_xattr+0xab/0x2b0 security/selinux/hooks.c:1335 inode_doinit_with_dentry+0xae7/0x11b0 security/selinux/hooks.c:1457 security_d_instantiate+0x41/0xb0 security/security.c:1974 d_splice_alias+0x6c/0xae0 fs/dcache.c:3036 jfs_lookup+0x1a5/0x260 fs/jfs/namei.c:1466 __lookup_slow+0x1fe/0x3c0 fs/namei.c:1544 lookup_slow fs/namei.c:1561 [inline] walk_component+0x364/0x5e0 fs/namei.c:1861 lookup_last fs/namei.c:2312 [inline] path_lookupat+0x11b/0x660 fs/namei.c:2336 do_o_path fs/namei.c:3342 [inline] path_openat+0x14e1/0x2190 fs/namei.c:3364 do_filp_open+0x16d/0x390 fs/namei.c:3398 do_sys_openat2+0x11e/0x360 fs/open.c:1172 do_sys_open fs/open.c:1188 [inline] __do_sys_open fs/open.c:1196 [inline] __se_sys_open fs/open.c:1192 [inline] __x64_sys_open+0xfd/0x1a0 fs/open.c:1192 do_syscall_64+0x2d/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f77a642b5a9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f77a5b9f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f77a654cf80 RCX: 00007f77a642b5a9 RDX: 0000000000000000 RSI: 0000000000212041 RDI: 0000000020000040 RBP: 00007f77a6486580 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcb47dd8bf R14: 00007f77a5b9f300 R15: 0000000000022000 Allocated by task 6021: kasan_save_stack+0x1b/0x40 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:401 [inline] ____kasan_kmalloc.constprop.0+0x7f/0xa0 mm/kasan/common.c:429 kasan_slab_alloc include/linux/kasan.h:209 [inline] slab_post_alloc_hook mm/slab.h:512 [inline] slab_alloc mm/slab.c:3315 [inline] kmem_cache_alloc+0x1ab/0x4c0 mm/slab.c:3486 jfs_alloc_inode+0x13/0x40 fs/jfs/super.c:105 alloc_inode+0x56/0x1e0 fs/inode.c:233 iget_locked+0x15a/0x620 fs/inode.c:1192 jfs_iget+0xd/0x420 fs/jfs/inode.c:29 jfs_lookup+0x1d5/0x260 fs/jfs/namei.c:1461 __lookup_slow+0x1fe/0x3c0 fs/namei.c:1544 lookup_slow fs/namei.c:1561 [inline] walk_component+0x364/0x5e0 fs/namei.c:1861 lookup_last fs/namei.c:2312 [inline] path_lookupat+0x11b/0x660 fs/namei.c:2336 do_o_path fs/namei.c:3342 [inline] path_openat+0x14e1/0x2190 fs/namei.c:3364 do_filp_open+0x16d/0x390 fs/namei.c:3398 do_sys_openat2+0x11e/0x360 fs/open.c:1172 do_sys_open fs/open.c:1188 [inline] __do_sys_open fs/open.c:1196 [inline] __se_sys_open fs/open.c:1192 [inline] __x64_sys_open+0xfd/0x1a0 fs/open.c:1192 do_syscall_64+0x2d/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 The buggy address belongs to the object at ffff888037c04180 which belongs to the cache jfs_ip of size 2096 The buggy address is located 0 bytes to the right of 2096-byte region [ffff888037c04180, ffff888037c049b0) The buggy address belongs to the page: page:00000000e6409fcd refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888037c04fff pfn:0x37c04 flags: 0xfff00000000200(slab) raw: 00fff00000000200 ffffea0000df00c8 ffff8880197bb150 ffff888141bcfe00 raw: ffff888037c04fff ffff888037c04180 0000000100000001 ffff88801e6d28c1 page dumped because: kasan: bad access detected pages's memcg:ffff88801e6d28c1 page_owner tracks the page as allocated page last allocated via order 0, migratetype Reclaimable, gfp_mask 0x342050(__GFP_IO|__GFP_NOWARN|__GFP_COMP|__GFP_HARDWALL|__GFP_THISNODE|__GFP_RECLAIMABLE), pid 6021, ts 79638023485 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x144/0x1c0 mm/page_alloc.c:2297 prep_new_page mm/page_alloc.c:2306 [inline] get_page_from_freelist+0x1c6e/0x3f80 mm/page_alloc.c:3945 __alloc_pages_nodemask+0x2d6/0x730 mm/page_alloc.c:4995 __alloc_pages include/linux/gfp.h:511 [inline] __alloc_pages_node include/linux/gfp.h:524 [inline] kmem_getpages mm/slab.c:1376 [inline] cache_grow_begin+0x71/0x430 mm/slab.c:2593 cache_alloc_refill+0x27f/0x380 mm/slab.c:2965 ____cache_alloc mm/slab.c:3048 [inline] ____cache_alloc mm/slab.c:3031 [inline] __do_cache_alloc mm/slab.c:3271 [inline] slab_alloc mm/slab.c:3307 [inline] kmem_cache_alloc+0x3e7/0x4c0 mm/slab.c:3486 jfs_alloc_inode+0x13/0x40 fs/jfs/super.c:105 alloc_inode+0x56/0x1e0 fs/inode.c:233 iget_locked+0x15a/0x620 fs/inode.c:1192 jfs_iget+0xd/0x420 fs/jfs/inode.c:29 jfs_lookup+0x1d5/0x260 fs/jfs/namei.c:1461 __lookup_slow+0x1fe/0x3c0 fs/namei.c:1544 lookup_slow fs/namei.c:1561 [inline] walk_component+0x364/0x5e0 fs/namei.c:1861 lookup_last fs/namei.c:2312 [inline] path_lookupat+0x11b/0x660 fs/namei.c:2336 do_o_path fs/namei.c:3342 [inline] path_openat+0x14e1/0x2190 fs/namei.c:3364 do_filp_open+0x16d/0x390 fs/namei.c:3398 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1271 [inline] __free_pages_ok+0x4da/0xed0 mm/page_alloc.c:1536 release_pages+0x4b7/0x1400 mm/swap.c:909 tlb_batch_pages_flush mm/mmu_gather.c:49 [inline] tlb_flush_mmu_free mm/mmu_gather.c:242 [inline] tlb_flush_mmu mm/mmu_gather.c:249 [inline] tlb_finish_mmu+0x127/0x790 mm/mmu_gather.c:328 exit_mmap+0x265/0x4c0 mm/mmap.c:3222 __mmput+0xeb/0x3e0 kernel/fork.c:1082 exit_mm kernel/exit.c:501 [inline] do_exit+0x9e9/0x2570 kernel/exit.c:812 do_group_exit+0xe7/0x290 kernel/exit.c:922 __do_sys_exit_group kernel/exit.c:933 [inline] __se_sys_exit_group kernel/exit.c:931 [inline] __x64_sys_exit_group+0x35/0x40 kernel/exit.c:931 do_syscall_64+0x2d/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Memory state around the buggy address: ffff888037c04880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888037c04900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff888037c04980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc ^ ffff888037c04a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff888037c04a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ==================================================================