EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16484: comm syz-executor.1: corrupted xattr entries EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16484: comm syz-executor.2: corrupted xattr entries EXT4-fs error (device sda1): ext4_xattr_set_entry:1605: inode #16546: comm syz-executor.5: corrupted xattr entries ================================================================== BUG: KASAN: use-after-free in memset include/linux/string.h:332 [inline] BUG: KASAN: use-after-free in __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 fs/ext4/inode.c:5795 Write of size 992 at addr ffff8881d0145ca0 by task syz-executor.3/6926 CPU: 0 PID: 6926 Comm: syz-executor.3 Not tainted 4.14.146+ #0 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xca/0x134 lib/dump_stack.c:53 print_address_description+0x60/0x226 mm/kasan/report.c:187 __kasan_report.cold+0x1a/0x41 mm/kasan/report.c:316 memset+0x20/0x40 mm/kasan/common.c:113 memset include/linux/string.h:332 [inline] __ext4_expand_extra_isize.isra.0+0x10b/0x1c0 fs/ext4/inode.c:5795 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5847 [inline] ext4_mark_inode_dirty+0x471/0x7f0 fs/ext4/inode.c:5923 ext4_dirty_inode+0x6c/0x90 fs/ext4/inode.c:5957 __mark_inode_dirty+0x69c/0x1080 fs/fs-writeback.c:2141 generic_update_time+0x1b0/0x270 fs/inode.c:1650 update_time fs/inode.c:1666 [inline] file_update_time+0x269/0x390 fs/inode.c:1882 ext4_page_mkwrite+0x1d9/0x1030 fs/ext4/inode.c:6108 do_page_mkwrite+0xd9/0x2f0 mm/memory.c:2383 do_shared_fault mm/memory.c:3698 [inline] do_fault mm/memory.c:3763 [inline] handle_pte_fault mm/memory.c:3989 [inline] __handle_mm_fault+0x1054/0x2700 mm/memory.c:4113 handle_mm_fault+0x2f1/0x6da mm/memory.c:4150 __do_page_fault+0x477/0xbb0 arch/x86/mm/fault.c:1420 page_fault+0x42/0x50 arch/x86/entry/entry_64.S:1122 RIP: 18d66150: (null) RSP: 0000:0000000000000000 EFLAGS: 00000000 The buggy address belongs to the page: page:ffffea0007405140 count:2 mapcount:0 mapping:ffff8881d9ab8950 index:0x428 flags: 0x400000000000203a(referenced|dirty|lru|active|private) raw: 400000000000203a ffff8881d9ab8950 0000000000000428 00000002ffffffff raw: ffffea00076861e0 ffffea0007405060 ffff8881ceb7a150 ffff8881da81aa80 page dumped because: kasan: bad access detected page->mem_cgroup:ffff8881da81aa80 Memory state around the buggy address: ffff8881d0145f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8881d0145f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8881d0146000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff8881d0146080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff8881d0146100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================