00000000d50a0bcd: 58 a9 b2 34 80 88 ff ff 00 00 00 00 00 00 00 00 X..4............ 0000000028c4b930: 70 a9 b2 34 80 88 ff ff 70 a9 b2 34 80 88 ff ff p..4....p..4.... 0000000019652ea8: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00000000d5421e08: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000000e3c9119: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ================================================================== BUG: KASAN: slab-out-of-bounds in hex_dump_to_buffer+0x893/0xad0 lib/hexdump.c:172 Read of size 1 at addr ffff888034b2a9b0 by task syz-executor.0/6023 CPU: 1 PID: 6023 Comm: syz-executor.0 Not tainted 5.11.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x9a/0xcc lib/dump_stack.c:120 print_address_description.constprop.0.cold+0x5b/0x2c6 mm/kasan/report.c:230 __kasan_report mm/kasan/report.c:396 [inline] kasan_report.cold+0x79/0xd5 mm/kasan/report.c:413 hex_dump_to_buffer+0x893/0xad0 lib/hexdump.c:172 print_hex_dump+0xf7/0x180 lib/hexdump.c:255 ea_get.cold+0xbe/0x277 fs/jfs/xattr.c:561 __jfs_getxattr+0xba/0x330 fs/jfs/xattr.c:807 jfs_xattr_get+0x27/0x30 fs/jfs/xattr.c:931 __vfs_getxattr+0xb9/0x110 fs/xattr.c:386 inode_doinit_use_xattr+0xab/0x2b0 security/selinux/hooks.c:1335 inode_doinit_with_dentry+0xae7/0x11b0 security/selinux/hooks.c:1457 security_d_instantiate+0x41/0xb0 security/security.c:1974 d_splice_alias+0x6c/0xae0 fs/dcache.c:3036 jfs_lookup+0x1a5/0x260 fs/jfs/namei.c:1466 lookup_open.isra.0+0x73f/0x1540 fs/namei.c:3085 open_last_lookups fs/namei.c:3180 [inline] path_openat+0x7a6/0x21d0 fs/namei.c:3368 do_filp_open+0x16d/0x390 fs/namei.c:3398 do_sys_openat2+0x11e/0x360 fs/open.c:1172 do_sys_open fs/open.c:1188 [inline] __do_sys_open fs/open.c:1196 [inline] __se_sys_open fs/open.c:1192 [inline] __x64_sys_open+0xfd/0x1a0 fs/open.c:1192 do_syscall_64+0x2d/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fecce0d45a9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007feccd848168 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007fecce1f5f80 RCX: 00007fecce0d45a9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 RBP: 00007fecce12f580 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc03533bff R14: 00007feccd848300 R15: 0000000000022000 Allocated by task 6023: kasan_save_stack+0x1b/0x40 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:401 [inline] ____kasan_kmalloc.constprop.0+0x7f/0xa0 mm/kasan/common.c:429 kasan_slab_alloc include/linux/kasan.h:209 [inline] slab_post_alloc_hook mm/slab.h:512 [inline] slab_alloc mm/slab.c:3315 [inline] kmem_cache_alloc+0x1ab/0x4c0 mm/slab.c:3486 jfs_alloc_inode+0x13/0x40 fs/jfs/super.c:105 alloc_inode+0x56/0x1e0 fs/inode.c:233 iget_locked+0x15a/0x620 fs/inode.c:1192 jfs_iget+0xd/0x420 fs/jfs/inode.c:29 jfs_lookup+0x1d5/0x260 fs/jfs/namei.c:1461 lookup_open.isra.0+0x73f/0x1540 fs/namei.c:3085 open_last_lookups fs/namei.c:3180 [inline] path_openat+0x7a6/0x21d0 fs/namei.c:3368 do_filp_open+0x16d/0x390 fs/namei.c:3398 do_sys_openat2+0x11e/0x360 fs/open.c:1172 do_sys_open fs/open.c:1188 [inline] __do_sys_open fs/open.c:1196 [inline] __se_sys_open fs/open.c:1192 [inline] __x64_sys_open+0xfd/0x1a0 fs/open.c:1192 do_syscall_64+0x2d/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 The buggy address belongs to the object at ffff888034b2a180 which belongs to the cache jfs_ip of size 2096 The buggy address is located 0 bytes to the right of 2096-byte region [ffff888034b2a180, ffff888034b2a9b0) The buggy address belongs to the page: page:000000003d385f6a refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888034b2afff pfn:0x34b2a flags: 0xfff00000000200(slab) raw: 00fff00000000200 ffffea0000d2ca48 ffff88801835a450 ffff8881419e8400 raw: ffff888034b2afff ffff888034b2a180 0000000100000001 ffff888023ae7601 page dumped because: kasan: bad access detected pages's memcg:ffff888023ae7601 page_owner tracks the page as allocated page last allocated via order 0, migratetype Reclaimable, gfp_mask 0x342050(__GFP_IO|__GFP_NOWARN|__GFP_COMP|__GFP_HARDWALL|__GFP_THISNODE|__GFP_RECLAIMABLE), pid 6023, ts 79051039667 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x144/0x1c0 mm/page_alloc.c:2297 prep_new_page mm/page_alloc.c:2306 [inline] get_page_from_freelist+0x1c6e/0x3f80 mm/page_alloc.c:3945 __alloc_pages_nodemask+0x2d6/0x730 mm/page_alloc.c:4995 __alloc_pages include/linux/gfp.h:511 [inline] __alloc_pages_node include/linux/gfp.h:524 [inline] kmem_getpages mm/slab.c:1376 [inline] cache_grow_begin+0x71/0x430 mm/slab.c:2593 cache_alloc_refill+0x27f/0x380 mm/slab.c:2965 ____cache_alloc mm/slab.c:3048 [inline] ____cache_alloc mm/slab.c:3031 [inline] __do_cache_alloc mm/slab.c:3271 [inline] slab_alloc mm/slab.c:3307 [inline] kmem_cache_alloc+0x3e7/0x4c0 mm/slab.c:3486 jfs_alloc_inode+0x13/0x40 fs/jfs/super.c:105 alloc_inode+0x56/0x1e0 fs/inode.c:233 iget_locked+0x15a/0x620 fs/inode.c:1192 jfs_iget+0xd/0x420 fs/jfs/inode.c:29 jfs_lookup+0x1d5/0x260 fs/jfs/namei.c:1461 lookup_open.isra.0+0x73f/0x1540 fs/namei.c:3085 open_last_lookups fs/namei.c:3180 [inline] path_openat+0x7a6/0x21d0 fs/namei.c:3368 do_filp_open+0x16d/0x390 fs/namei.c:3398 do_sys_openat2+0x11e/0x360 fs/open.c:1172 do_sys_open fs/open.c:1188 [inline] __do_sys_open fs/open.c:1196 [inline] __se_sys_open fs/open.c:1192 [inline] __x64_sys_open+0xfd/0x1a0 fs/open.c:1192 page_owner free stack trace missing Memory state around the buggy address: ffff888034b2a880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888034b2a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff888034b2a980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc ^ ffff888034b2aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff888034b2aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ==================================================================