Hello,
syzbot found the following issue on:
HEAD commit: 3f8a27f9e27b Linux 4.19.211
git tree: linux-4.19.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=1209cc92880000
kernel config:
https://syzkaller.appspot.com/x/.config?x=9b9277b418617afe
dashboard link:
https://syzkaller.appspot.com/bug?extid=c4d13e4b96dc976b3208
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)
Unfortunately, I don't have any reproducer for this issue yet.
Downloadable assets:
disk image:
https://storage.googleapis.com/syzbot-assets/98c0bdb4abb3/disk-3f8a27f9.raw.xz
vmlinux:
https://storage.googleapis.com/syzbot-assets/ea228ff02669/vmlinux-3f8a27f9.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by:
syzbot+c4d13e...@syzkaller.appspotmail.com
0000000060d4d980: 00 00 00 00 00 00 00 00 e0 6a 90 4e 80 88 ff ff .........j.N....
00000000deffe9e4: e0 6a 90 4e 80 88 ff ff 00 00 00 00 00 00 00 00 .j.N............
000000000d8a61f5: 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00000000d830b0eb: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
==================================================================
BUG: KASAN: slab-out-of-bounds in hex_dump_to_buffer+0xc76/0xca0 lib/hexdump.c:175
Read of size 1 at addr ffff88804e906b18 by task syz-executor.3/10604
CPU: 0 PID: 10604 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1fc/0x2ef lib/dump_stack.c:118
print_address_description.cold+0x54/0x219 mm/kasan/report.c:256
kasan_report_error.cold+0x8a/0x1b9 mm/kasan/report.c:354
kasan_report mm/kasan/report.c:412 [inline]
__asan_report_load1_noabort+0x88/0x90 mm/kasan/report.c:430
hex_dump_to_buffer+0xc76/0xca0 lib/hexdump.c:175
print_hex_dump+0x12f/0x1d0 lib/hexdump.c:258
ea_get.cold+0x59/0x75 fs/jfs/xattr.c:574
__jfs_setxattr+0xdb/0xf50 fs/jfs/xattr.c:684
__jfs_xattr_set+0xc9/0x150 fs/jfs/xattr.c:930
__vfs_setxattr+0x10e/0x170 fs/xattr.c:149
__vfs_setxattr_noperm+0x11a/0x420 fs/xattr.c:180
__vfs_setxattr_locked+0x176/0x250 fs/xattr.c:238
vfs_setxattr+0xe5/0x270 fs/xattr.c:255
setxattr+0x23d/0x330 fs/xattr.c:520
path_setxattr+0x170/0x190 fs/xattr.c:539
__do_sys_setxattr fs/xattr.c:554 [inline]
__se_sys_setxattr fs/xattr.c:550 [inline]
__x64_sys_setxattr+0xc0/0x160 fs/xattr.c:550
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f04902e85a9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f048ec5c168 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc
RAX: ffffffffffffffda RBX: 00007f0490409f80 RCX: 00007f04902e85a9
RDX: 0000000020005380 RSI: 0000000020000080 RDI: 0000000020000040
RBP: 00007f0490343580 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000014 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffc0b0ba0af R14: 00007f048ec5c300 R15: 0000000000022000
Allocated by task 10604:
kmem_cache_alloc+0x122/0x370 mm/slab.c:3559
jfs_alloc_inode+0x18/0x50 fs/jfs/super.c:118
alloc_inode+0x5d/0x180 fs/inode.c:211
iget_locked+0x193/0x480 fs/inode.c:1176
jfs_iget+0x1a/0x4d0 fs/jfs/inode.c:41
jfs_lookup+0x19e/0x1c0 fs/jfs/namei.c:1474
__lookup_slow+0x246/0x4a0 fs/namei.c:1672
lookup_slow fs/namei.c:1689 [inline]
walk_component+0x7ac/0xda0 fs/namei.c:1811
lookup_last fs/namei.c:2274 [inline]
path_lookupat+0x1ff/0x8d0 fs/namei.c:2319
filename_lookup+0x1ac/0x5a0 fs/namei.c:2349
user_path_at include/linux/namei.h:57 [inline]
path_setxattr+0x95/0x190 fs/xattr.c:534
__do_sys_setxattr fs/xattr.c:554 [inline]
__se_sys_setxattr fs/xattr.c:550 [inline]
__x64_sys_setxattr+0xc0/0x160 fs/xattr.c:550
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
Freed by task 18:
__cache_free mm/slab.c:3503 [inline]
kmem_cache_free+0x7f/0x260 mm/slab.c:3765
__rcu_reclaim kernel/rcu/rcu.h:236 [inline]
rcu_do_batch kernel/rcu/tree.c:2584 [inline]
invoke_rcu_callbacks kernel/rcu/tree.c:2897 [inline]
__rcu_process_callbacks kernel/rcu/tree.c:2864 [inline]
rcu_process_callbacks+0x8ff/0x18b0 kernel/rcu/tree.c:2881
__do_softirq+0x265/0x980 kernel/softirq.c:292
The buggy address belongs to the object at ffff88804e906380
which belongs to the cache jfs_ip of size 1944
The buggy address is located 0 bytes to the right of
1944-byte region [ffff88804e906380, ffff88804e906b18)
The buggy address belongs to the page:
page:ffffea00013a4180 count:1 mapcount:0 mapping:ffff8880b0f24a80 index:0xffff88804e906fff
flags: 0xfff00000000100(slab)
raw: 00fff00000000100 ffffea00013a5708 ffffea00022b1748 ffff8880b0f24a80
raw: ffff88804e906fff ffff88804e906380 0000000100000001 0000000000000000
page dumped because: kasan: bad access detected
Memory state around the buggy address:
ffff88804e906a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff88804e906a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffff88804e906b00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
^
ffff88804e906b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ffff88804e906c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
==================================================================
---
This report is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.