================================================================== BUG: KASAN: use-after-free in memset include/linux/string.h:333 [inline] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x175/0x250 fs/ext4/inode.c:5916 EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16529: comm syz-executor.2: corrupted xattr entries Write of size 32737 at addr ffff88807f5890a0 by task syz-executor.5/10346 CPU: 1 PID: 10346 Comm: syz-executor.5 Not tainted 4.19.85-syzkaller #0 EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16513: comm syz-executor.0: corrupted xattr entries Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_address_description.cold+0x7c/0x20d mm/kasan/report.c:256 overlayfs: unrecognized mount option "upperdiJ.Éfi™ãHþ " or missing value kasan_report_error mm/kasan/report.c:354 [inline] kasan_report mm/kasan/report.c:412 [inline] kasan_report.cold+0x8c/0x2ba mm/kasan/report.c:396 check_memory_region_inline mm/kasan/kasan.c:260 [inline] check_memory_region+0x123/0x190 mm/kasan/kasan.c:267 memset+0x24/0x40 mm/kasan/kasan.c:285 memset include/linux/string.h:333 [inline] __ext4_expand_extra_isize+0x175/0x250 fs/ext4/inode.c:5916 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5968 [inline] ext4_mark_inode_dirty+0x6f0/0x940 fs/ext4/inode.c:6044 EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16514: comm syz-executor.2: corrupted xattr entries EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16514: comm syz-executor.2: corrupted xattr entries ext4_ext_truncate+0x92/0x200 fs/ext4/extents.c:4645 ext4_truncate+0xdf9/0x13d0 fs/ext4/inode.c:4523 EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16514: comm syz-executor.1: corrupted xattr entries ext4_setattr+0x1ae8/0x24a0 fs/ext4/inode.c:5658 overlayfs: unrecognized mount option "upperdiJ.Éfi™ãHþ " or missing value notify_change+0xad7/0xfb0 fs/attr.c:334 do_truncate+0x158/0x220 fs/open.c:63 handle_truncate fs/namei.c:3008 [inline] do_last fs/namei.c:3424 [inline] path_openat+0x2c27/0x45e0 fs/namei.c:3534 MPI: mpi too large (16392 bits) EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16513: comm syz-executor.2: corrupted xattr entries do_filp_open+0x1a1/0x280 fs/namei.c:3564 do_sys_open+0x3fe/0x550 fs/open.c:1088 ksys_open include/linux/syscalls.h:1276 [inline] __do_sys_creat fs/open.c:1146 [inline] __se_sys_creat fs/open.c:1144 [inline] __x64_sys_creat+0x61/0x80 fs/open.c:1144 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a639 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fe78d3e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 000000000045a639 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe78d3e26d4 R13: 00000000004c0ee8 R14: 00000000004d3be0 R15: 00000000ffffffff The buggy address belongs to the page: page:ffffea0001fd6240 count:2 mapcount:0 mapping:ffff8882190d1a58 index:0x432 flags: 0x1fffc0000001064(referenced|lru|active|private) raw: 01fffc0000001064 ffffea0001c8c988 ffffea0001ab2d48 ffff8882190d1a58 raw: 0000000000000432 ffff888097166930 00000002ffffffff ffff88808c57cb00 page dumped because: kasan: bad access detected page->mem_cgroup:ffff88808c57cb00 Memory state around the buggy address: ffff88807f589f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88807f589f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88807f58a000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88807f58a080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88807f58a100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================