================================================================== BUG: KASAN: use-after-free in memmove include/linux/string.h:359 [inline] BUG: KASAN: use-after-free in ext4_xattr_set_entry+0x92d/0x2e40 fs/ext4/xattr.c:1739 Read of size 4 at addr ffff888190f21ffd by task syz-fuzzer/1792 CPU: 0 PID: 1792 Comm: syz-fuzzer Not tainted 4.14.90+ #29 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xb9/0x11b lib/dump_stack.c:53 print_address_description+0x60/0x22b mm/kasan/report.c:252 kasan_report_error mm/kasan/report.c:351 [inline] kasan_report.cold.6+0x11b/0x2dd mm/kasan/report.c:409 memmove+0x1f/0x50 mm/kasan/kasan.c:293 memmove include/linux/string.h:359 [inline] ext4_xattr_set_entry+0x92d/0x2e40 fs/ext4/xattr.c:1739 ext4_xattr_ibody_set+0x73/0x280 fs/ext4/xattr.c:2245 ext4_xattr_set_handle+0x6a6/0xdc0 fs/ext4/xattr.c:2401 ext4_initxattrs+0xb8/0x110 fs/ext4/xattr_security.c:43 security_inode_init_security+0x228/0x310 security/security.c:493 __ext4_new_inode+0x3473/0x48e0 fs/ext4/ialloc.c:1166 ext4_mkdir+0x234/0xb40 fs/ext4/namei.c:2625 vfs_mkdir2+0x3cb/0x640 fs/namei.c:3883 SYSC_mkdirat fs/namei.c:3912 [inline] SyS_mkdirat+0x126/0x220 fs/namei.c:3896 do_syscall_64+0x19b/0x4b0 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x47fc44 RSP: 002b:000000c42013d898 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047fc44 RDX: 00000000000001c0 RSI: 000000c42a04c2c0 RDI: ffffffffffffff9c RBP: 000000c42013d8f8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001000000 R13: 0000000000000020 R14: 0000000000000013 R15: 0000000000000000 The buggy address belongs to the page: page:ffffea000643c840 count:2 mapcount:0 mapping:ffff8881d9aa8950 index:0x483 flags: 0x4000000000001074(referenced|dirty|lru|active|private) raw: 4000000000001074 ffff8881d9aa8950 0000000000000483 00000002ffffffff raw: ffffea00064b1ce0 ffffea000643b4e0 ffff88818fa31498 ffff8881da81aa80 page dumped because: kasan: bad access detected page->mem_cgroup:ffff8881da81aa80 Memory state around the buggy address: ffff888190f21f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888190f21f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff888190f22000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff888190f22080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888190f22100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================