serio: Serial port pts0 EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000079000000, ================================================================== IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready BUG: KASAN: slab-out-of-bounds in memset include/linux/string.h:337 [inline] BUG: KASAN: slab-out-of-bounds in __ext4_expand_extra_isize+0x16f/0x240 fs/ext4/inode.c:5926 Write of size 2030043104 at addr ffff8881be83b2a0 by task rs:main Q:Reg/5948 CPU: 1 PID: 5948 Comm: rs:main Q:Reg Not tainted 4.20.0-rc6-next-20181214+ #171 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 print_address_description.cold.4+0x9/0x1ff mm/kasan/report.c:187 kasan_report.cold.5+0x1b/0x39 mm/kasan/report.c:317 check_memory_region_inline mm/kasan/generic.c:185 [inline] check_memory_region+0x13e/0x1b0 mm/kasan/generic.c:191 memset+0x23/0x40 mm/kasan/common.c:113 memset include/linux/string.h:337 [inline] __ext4_expand_extra_isize+0x16f/0x240 fs/ext4/inode.c:5926 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5978 [inline] ext4_mark_inode_dirty+0x8f9/0xb20 fs/ext4/inode.c:6054 ext4_dirty_inode+0x97/0xc0 fs/ext4/inode.c:6088 __mark_inode_dirty+0x7c3/0x1510 fs/fs-writeback.c:2122 generic_update_time+0x26a/0x450 fs/inode.c:1654 update_time fs/inode.c:1670 [inline] file_update_time+0x390/0x640 fs/inode.c:1880 __generic_file_write_iter+0x1dc/0x630 mm/filemap.c:3276 ext4_file_write_iter+0x397/0x1400 fs/ext4/file.c:266 BUG: unable to handle kernel paging request at ffffed1044000000 #PF error: [normal kernel read fault] PGD 21ffef067 P4D 21ffef067 PUD 21ffed067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 12913 Comm: syz-executor0 Not tainted 4.20.0-rc6-next-20181214+ #171 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:memory_is_nonzero mm/kasan/generic.c:121 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:135 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:166 [inline] RIP: 0010:check_memory_region_inline mm/kasan/generic.c:182 [inline] RIP: 0010:check_memory_region+0x9e/0x1b0 mm/kasan/generic.c:191 Code: c8 49 c1 f9 03 45 85 c9 0f 84 23 01 00 00 48 83 38 00 75 1c 45 8d 41 ff 4a 8d 5c c0 08 48 83 c0 08 48 39 c3 0f 84 a8 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 0a 80 RSP: 0000:ffff88817e25f098 EFLAGS: 00010206 call_write_iter include/linux/fs.h:1863 [inline] new_sync_write fs/read_write.c:474 [inline] __vfs_write+0x72c/0xab0 fs/read_write.c:487 RAX: ffffed1044000000 RBX: ffffed104a78fc50 RCX: ffffffff821b72df RDX: 0000000000000001 RSI: 0000000078ffffe0 RDI: ffff8881dac7e2a0 RBP: ffff88817e25f0b0 R08: 0000000001e3fffe R09: 0000000001e3ffff R10: ffffed104a78fc4f R11: ffff888253c7e27f R12: ffffed104a78fc50 R13: 0000000000000004 R14: ffff8881dac7e2a0 R15: 0000000079000000 vfs_write+0x1fc/0x580 fs/read_write.c:549 FS: 0000000001c48940(0000) GS:ffff8881dac00000(0000) knlGS:0000000000000000 ksys_write+0x101/0x260 fs/read_write.c:598 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed1044000000 CR3: 00000001d39ad000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 __do_sys_write fs/read_write.c:610 [inline] __se_sys_write fs/read_write.c:607 [inline] __x64_sys_write+0x73/0xb0 fs/read_write.c:607 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 Call Trace: memset+0x23/0x40 mm/kasan/common.c:113 memset include/linux/string.h:337 [inline] __ext4_expand_extra_isize+0x16f/0x240 fs/ext4/inode.c:5926 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5978 [inline] ext4_mark_inode_dirty+0x8f9/0xb20 fs/ext4/inode.c:6054 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fccc2ffe19d Code: d1 20 00 00 75 10 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 be fa ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 07 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007fccc159f000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 ext4_dirty_inode+0x97/0xc0 fs/ext4/inode.c:6088 RAX: ffffffffffffffda RBX: 00000000000002ae RCX: 00007fccc2ffe19d __mark_inode_dirty+0x7c3/0x1510 fs/fs-writeback.c:2122 RDX: 00000000000002ae RSI: 000000000069aa90 RDI: 0000000000000005 RBP: 000000000069aa90 R08: 000000000069acc0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 00007fccc159f480 R14: 0000000000000006 R15: 000000000069a890 The buggy address belongs to the page: page:ffffea0006fa0ec0 count:2 mapcount:0 mapping:ffff8881cd8e1658 index:0x427 def_blk_aops flags: 0x2fffc000000203a(referenced|dirty|lru|active|private) generic_update_time+0x26a/0x450 fs/inode.c:1654 raw: 02fffc000000203a ffffea0007093948 ffffea0006f42488 ffff8881cd8e1658 raw: 0000000000000427 ffff8881b77b5b28 00000002ffffffff ffff8881d9a68b80 page dumped because: kasan: bad access detected page->mem_cgroup:ffff8881d9a68b80 Memory state around the buggy address: ffff8881bebfff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8881bebfff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 update_time fs/inode.c:1670 [inline] file_update_time+0x390/0x640 fs/inode.c:1880 >ffff8881bec00000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff8881bec00080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8881bec00100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ================================================================== ext4_page_mkwrite+0x1fe/0x14b0 fs/ext4/inode.c:6233 do_page_mkwrite+0x15c/0x770 mm/memory.c:2148 do_shared_fault mm/memory.c:3478 [inline] do_fault mm/memory.c:3543 [inline] handle_pte_fault mm/memory.c:3770 [inline] __handle_mm_fault+0x3d30/0x5b70 mm/memory.c:3894 handle_mm_fault+0x54f/0xc70 mm/memory.c:3931 do_user_addr_fault arch/x86/mm/fault.c:1475 [inline] __do_page_fault+0x5f6/0xd70 arch/x86/mm/fault.c:1541 do_page_fault+0xf2/0x7e0 arch/x86/mm/fault.c:1572 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1143 RIP: 0033:0x401777 Code: Bad RIP value. RSP: 002b:00007ffea94c23d0 EFLAGS: 00010287 RAX: 0000001b2fe24000 RBX: 00000000896210bc RCX: 0000001b30e20000 RDX: 0000001b2fe24004 RSI: 0000000000001d52 RDI: ffffffff80b15d50 RBP: 0000000000000180 R08: 0000000080b15d50 R09: 0000000080b15d54 R10: 00007ffea94c2570 R11: 0000000000000000 R12: 000000000072bf00 R13: 0000000080000000 R14: 00007f36ff126008 R15: 0000000000000d0d Modules linked in: CR2: ffffed1044000000 ---[ end trace f1b0d9d20c45a63b ]--- BUG: unable to handle kernel paging request at ffff8881bef02000 #PF error: [WRITE] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:121 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:135 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:166 [inline] RIP: 0010:check_memory_region_inline mm/kasan/generic.c:182 [inline] RIP: 0010:check_memory_region+0x9e/0x1b0 mm/kasan/generic.c:191 PGD c001067 P4D c001067 PUD 1c3ea3063 PMD 1bef01063 BAD Code: c8 49 c1 f9 03 45 85 c9 0f 84 23 01 00 00 48 83 38 00 75 1c 45 8d 41 ff 4a 8d 5c c0 08 48 83 c0 08 48 39 c3 0f 84 a8 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 0a 80 Oops: 0002 [#2] PREEMPT SMP KASAN RSP: 0000:ffff88817e25f098 EFLAGS: 00010206 CPU: 1 PID: 5950 Comm: rsyslogd Tainted: G B D 4.20.0-rc6-next-20181214+ #171 RAX: ffffed1044000000 RBX: ffffed104a78fc50 RCX: ffffffff821b72df Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RDX: 0000000000000001 RSI: 0000000078ffffe0 RDI: ffff8881dac7e2a0 RBP: ffff88817e25f0b0 R08: 0000000001e3fffe R09: 0000000001e3ffff RIP: 0010:memset_erms+0x9/0x10 arch/x86/lib/memset_64.S:66 R10: ffffed104a78fc4f R11: ffff888253c7e27f R12: ffffed104a78fc50 Code: c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01 R13: 0000000000000004 R14: ffff8881dac7e2a0 R15: 0000000079000000 RSP: 0018:ffff8881b54d7108 EFLAGS: 00010282 FS: 0000000001c48940(0000) GS:ffff8881dac00000(0000) knlGS:0000000000000000 RAX: 0000000000000000 RBX: ffff8881be83b1a0 RCX: 0000000078939180 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 RDX: 0000000078ffffe0 RSI: 0000000000000000 RDI: ffff8881bef02000 CR2: 000000000040174d CR3: 00000001d39ad000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 RBP: ffff8881b54d7128 R08: ffffed1037d80008 R09: ffff8881be83b1a0 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 R10: ffffed1046f0762f R11: ffff88823783b17f R12: 0000000078ffffe0