EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16532: comm syz-executor.3: corrupted xattr entries EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16529: comm syz-executor.1: corrupted xattr entries ================================================================== BUG: KASAN: use-after-free in memset include/linux/string.h:332 [inline] BUG: KASAN: use-after-free in __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 fs/ext4/inode.c:5832 Write of size 1504 at addr ffff8881d1cbbea0 by task syz-executor.4/6945 CPU: 1 PID: 6945 Comm: syz-executor.4 Not tainted 4.14.155-syzkaller #0 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe5/0x154 lib/dump_stack.c:58 print_address_description+0x60/0x226 mm/kasan/report.c:187 __kasan_report.cold+0x1a/0x41 mm/kasan/report.c:316 memset+0x20/0x40 mm/kasan/common.c:113 memset include/linux/string.h:332 [inline] __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 fs/ext4/inode.c:5832 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5884 [inline] ext4_mark_inode_dirty+0x471/0x7f0 fs/ext4/inode.c:5960 ext4_dirty_inode+0x6c/0x90 fs/ext4/inode.c:5994 __mark_inode_dirty+0x69c/0x1080 fs/fs-writeback.c:2144 generic_update_time+0x1b0/0x270 fs/inode.c:1650 update_time fs/inode.c:1666 [inline] file_update_time+0x269/0x390 fs/inode.c:1882 ext4_page_mkwrite+0x1d9/0x1030 fs/ext4/inode.c:6145 do_page_mkwrite+0xd9/0x2f0 mm/memory.c:2383 do_shared_fault mm/memory.c:3698 [inline] do_fault mm/memory.c:3763 [inline] handle_pte_fault mm/memory.c:3989 [inline] __handle_mm_fault+0x1054/0x2700 mm/memory.c:4113 handle_mm_fault+0x2f1/0x6da mm/memory.c:4150 __do_page_fault+0x477/0xbb0 arch/x86/mm/fault.c:1420 page_fault+0x42/0x50 arch/x86/entry/entry_64.S:1122 RIP: 80000000:0x7ff397709008 RSP: 491082be:0000000000000197 EFLAGS: 0075bfa8 The buggy address belongs to the page: page:ffffea0007472ec0 count:2 mapcount:0 mapping:ffff8881d9ab8950 index:0x428 flags: 0x400000000000203a(referenced|dirty|lru|active|private) raw: 400000000000203a ffff8881d9ab8950 0000000000000428 00000002ffffffff raw: ffffea00075568e0 ffffea000747ffe0 ffff8881cf306b28 ffff8881da81aa80 page dumped because: kasan: bad access detected page->mem_cgroup:ffff8881da81aa80 Memory state around the buggy address: ffff8881d1cbbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8881d1cbbf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8881d1cbc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff8881d1cbc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff8881d1cbc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================