EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready ================================================================== IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:376 [inline] BUG: KASAN: slab-out-of-bounds in ext4_write_inline_data.isra.4+0x27a/0x480 fs/ext4/inline.c:251 Write of size 70 at addr ffff88809a4804ef by task syz-executor.0/9682 CPU: 0 PID: 9682 Comm: syz-executor.0 Not tainted 4.14.223-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x14b/0x1e7 lib/dump_stack.c:58 print_address_description.cold.6+0x9/0x1ca mm/kasan/report.c:252 kasan_report_error mm/kasan/report.c:351 [inline] kasan_report mm/kasan/report.c:409 [inline] kasan_report.cold.7+0x11a/0x2d3 mm/kasan/report.c:393 check_memory_region_inline mm/kasan/kasan.c:260 [inline] check_memory_region+0x13c/0x1b0 mm/kasan/kasan.c:267 memcpy+0x37/0x50 mm/kasan/kasan.c:303 memcpy include/linux/string.h:376 [inline] ext4_write_inline_data.isra.4+0x27a/0x480 fs/ext4/inline.c:251 ext4_write_inline_data_end+0x1dd/0x450 fs/ext4/inline.c:760 ext4_write_end+0x4ee/0xb20 fs/ext4/inode.c:1423 ext4_da_write_end+0x616/0x990 fs/ext4/inode.c:3178 generic_perform_write+0x2ce/0x450 mm/filemap.c:3066 __generic_file_write_iter+0x205/0x590 mm/filemap.c:3180 ext4_file_write_iter+0x279/0xe30 fs/ext4/file.c:270 call_write_iter include/linux/fs.h:1778 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x413/0x840 fs/read_write.c:482 vfs_write+0x150/0x4f0 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0x100/0x250 fs/read_write.c:582 do_syscall_64+0x1c7/0x5b0 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007f1177758188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000082 RSI: 0000000020000180 RDI: 0000000000000003 RBP: 00000000004b069f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 R13: 00007ffcee00900f R14: 00007f1177758300 R15: 0000000000022000 Allocated by task 9693: save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59 save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc.part.1+0x62/0xf0 mm/kasan/kasan.c:551 kasan_kmalloc+0xaf/0xc0 mm/kasan/kasan.c:536 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:489 kmem_cache_alloc+0x12e/0x3e0 mm/slab.c:3552 prepare_kernel_cred+0x1b/0x460 kernel/cred.c:625 call_usermodehelper_exec_async+0x116/0x530 kernel/umh.c:89 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Freed by task 0: (stack is not available) IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready The buggy address belongs to the object at ffff88809a480400 which belongs to the cache cred_jar of size 184 The buggy address is located 55 bytes to the right of 184-byte region [ffff88809a480400, ffff88809a4804b8) The buggy address belongs to the page: page:ffffea0002692000 count:1 mapcount:0 mapping:ffff88809a480000 index:0x0 flags: 0xfff00000000100(slab) raw: 00fff00000000100 ffff88809a480000 0000000000000000 0000000100000010 raw: ffffea00026a96a0 ffffea0002692460 ffff88823f8304c0 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88809a480380: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc ffff88809a480400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88809a480480: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc ^ ffff88809a480500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88809a480580: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc ==================================================================