EXT4-fs (sda1): re-mounted. Opts: ,errors=continue ================================================================== BUG: KASAN: use-after-free in memset include/linux/string.h:329 [inline] BUG: KASAN: use-after-free in __ext4_expand_extra_isize.isra.13+0x108/0x1b0 fs/ext4/inode.c:5780 Write of size 56598 at addr ffff88019a1295a0 by task syz-executor3/11097 CPU: 1 PID: 11097 Comm: syz-executor3 Not tainted 4.14.78+ #27 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xb9/0x11b lib/dump_stack.c:53 print_address_description+0x60/0x22b mm/kasan/report.c:252 kasan_report_error mm/kasan/report.c:351 [inline] kasan_report.cold.6+0x11b/0x2dd mm/kasan/report.c:409 memset+0x1f/0x40 mm/kasan/kasan.c:285 memset include/linux/string.h:329 [inline] __ext4_expand_extra_isize.isra.13+0x108/0x1b0 fs/ext4/inode.c:5780 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5832 [inline] ext4_mark_inode_dirty+0x46c/0x7e0 fs/ext4/inode.c:5908 ext4_dirty_inode+0x71/0xa0 fs/ext4/inode.c:5942 __mark_inode_dirty+0x108/0x1060 fs/fs-writeback.c:2097 mark_inode_dirty include/linux/fs.h:2028 [inline] generic_write_end+0x187/0x250 fs/buffer.c:2217 ext4_da_write_end+0x3d3/0xc10 fs/ext4/inode.c:3194 generic_perform_write+0x294/0x430 mm/filemap.c:3048 __generic_file_write_iter+0x345/0x540 mm/filemap.c:3162 ext4_file_write_iter+0x4f6/0xe20 fs/ext4/file.c:264 call_write_iter include/linux/fs.h:1782 [inline] new_sync_write fs/read_write.c:471 [inline] __vfs_write+0x417/0x5c0 fs/read_write.c:484 vfs_write+0x17f/0x4d0 fs/read_write.c:546 SYSC_write fs/read_write.c:593 [inline] SyS_write+0xc2/0x1a0 fs/read_write.c:585 do_syscall_64+0x19b/0x4b0 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x457569 RSP: 002b:00007f1d3227ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 RDX: 00000000fffffe38 RSI: 0000000020000080 RDI: 0000000000000005 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d3227f6d4 R13: 00000000004c57f5 R14: 00000000004d93d0 R15: 00000000ffffffff The buggy address belongs to the page: page:ffffea0006684a40 count:2 mapcount:0 mapping:ffff8801d9aa8950 index:0x431 flags: 0x4000000000001074(referenced|dirty|lru|active|private) raw: 4000000000001074 ffff8801d9aa8950 0000000000000431 00000002ffffffff raw: ffffea0006b54660 ffffea000669fc20 ffff8801d51fe690 ffff8801da81aa80 page dumped because: kasan: bad access detected page->mem_cgroup:ffff8801da81aa80 Memory state around the buggy address: ffff88019a130f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88019a130f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88019a131000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88019a131080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88019a131100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================