================================================================== BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x13ba/0x3940 fs/ext4/xattr.c:1736 Read of size 18446744073709551600 at addr ffff88811aea62b8 by task kworker/u4:3/303 CPU: 0 PID: 303 Comm: kworker/u4:3 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 Workqueue: writeback wb_workfn (flush-7:3) Call Trace: __dump_stack+0x21/0x30 lib/dump_stack.c:88 dump_stack_lvl+0x110/0x170 lib/dump_stack.c:106 print_address_description+0x7f/0x2c0 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:427 [inline] kasan_report+0xf1/0x140 mm/kasan/report.c:444 check_region_inline mm/kasan/generic.c:-1 [inline] kasan_check_range+0x249/0x2a0 mm/kasan/generic.c:189 memmove+0x2d/0x70 mm/kasan/shadow.c:54 ext4_xattr_set_entry+0x13ba/0x3940 fs/ext4/xattr.c:1736 ext4_xattr_ibody_set+0x122/0x360 fs/ext4/xattr.c:2238 ext4_destroy_inline_data_nolock+0x234/0x5d0 fs/ext4/inline.c:468 ext4_destroy_inline_data+0x84/0xe0 fs/ext4/inline.c:1915 ext4_writepages+0x64f/0x3090 fs/ext4/inode.c:2748 do_writepages+0x473/0x6c0 mm/page-writeback.c:2388 __writeback_single_inode+0xd5/0x9c0 fs/fs-writeback.c:1657 writeback_sb_inodes+0xa10/0x1610 fs/fs-writeback.c:1940 wb_writeback+0x40b/0x9d0 fs/fs-writeback.c:2116 wb_do_writeback fs/fs-writeback.c:2263 [inline] wb_workfn+0x3ac/0xf30 fs/fs-writeback.c:2304 process_one_work+0x6be/0xba0 kernel/workqueue.c:2325 worker_thread+0xa59/0x1200 kernel/workqueue.c:2472 kthread+0x411/0x500 kernel/kthread.c:337 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 The buggy address belongs to the page: page:ffffea00046ba980 refcount:2 mapcount:0 mapping:ffff88810930f258 index:0x26 pfn:0x11aea6 memcg:ffff88810d7c6780 aops:def_blk_aops ino:700003 flags: 0x4000000000022036(referenced|uptodate|lru|active|private|mappedtodisk|zone=1) raw: 4000000000022036 ffffea00046bc188 ffffea00046bbb08 ffff88810930f258 raw: 0000000000000026 ffff8881293ae930 00000002ffffffff ffff88810d7c6780 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112c40(GFP_NOFS|__GFP_NOWARN|__GFP_NORETRY|__GFP_HARDWALL), pid 532, ts 333503682718, free_ts 333392690593 set_page_owner include/linux/page_owner.h:33 [inline] post_alloc_hook+0x192/0x1b0 mm/page_alloc.c:2605 prep_new_page+0x1c/0x110 mm/page_alloc.c:2611 get_page_from_freelist+0x2d3a/0x2dc0 mm/page_alloc.c:4485 __alloc_pages+0x1a2/0x460 mm/page_alloc.c:5822 __alloc_pages_node include/linux/gfp.h:595 [inline] alloc_pages_node include/linux/gfp.h:609 [inline] alloc_pages include/linux/gfp.h:622 [inline] __page_cache_alloc include/linux/pagemap.h:305 [inline] page_cache_ra_unbounded+0x2d5/0x9a0 mm/readahead.c:227 do_page_cache_ra mm/readahead.c:280 [inline] ondemand_readahead+0x8fa/0xe80 mm/readahead.c:565 page_cache_async_ra+0x2a9/0x2e0 mm/readahead.c:624 page_cache_async_readahead include/linux/pagemap.h:854 [inline] do_async_mmap_readahead mm/filemap.c:3045 [inline] filemap_fault+0x9b5/0x1770 mm/filemap.c:3150 __do_fault+0x264/0x2f0 mm/memory.c:4192 do_read_fault mm/memory.c:4556 [inline] do_fault mm/memory.c:4697 [inline] handle_pte_fault+0x187d/0x2710 mm/memory.c:4911 __handle_mm_fault mm/memory.c:-1 [inline] do_handle_mm_fault+0x1af9/0x1de0 mm/memory.c:5333 handle_mm_fault include/linux/mm.h:1847 [inline] faultin_page mm/gup.c:976 [inline] __get_user_pages+0x80e/0x10c0 mm/gup.c:1197 populate_vma_page_range mm/gup.c:1529 [inline] __mm_populate+0x324/0x470 mm/gup.c:1638 mm_populate include/linux/mm.h:2704 [inline] vm_mmap_pgoff+0x262/0x430 mm/util.c:560 ksys_mmap_pgoff+0x161/0x1d0 mm/mmap.c:1647 __do_sys_mmap arch/x86/kernel/sys_x86_64.c:93 [inline] __se_sys_mmap arch/x86/kernel/sys_x86_64.c:86 [inline] __x64_sys_mmap+0xfa/0x110 arch/x86/kernel/sys_x86_64.c:86 page last free stack trace: reset_page_owner include/linux/page_owner.h:26 [inline] free_pages_prepare mm/page_alloc.c:1472 [inline] free_pcp_prepare mm/page_alloc.c:1544 [inline] free_unref_page_prepare+0x542/0x550 mm/page_alloc.c:3534 free_unref_page+0xae/0x540 mm/page_alloc.c:3616 free_the_page mm/page_alloc.c:805 [inline] __free_pages+0x6c/0x100 mm/page_alloc.c:5898 __free_slab+0xe8/0x1e0 mm/slub.c:2025 free_slab mm/slub.c:2040 [inline] discard_slab mm/slub.c:2046 [inline] __unfreeze_partials+0x160/0x190 mm/slub.c:2532 put_cpu_partial+0xc6/0x120 mm/slub.c:2612 __slab_free+0x1d4/0x290 mm/slub.c:3395 do_slab_free mm/slub.c:3514 [inline] ___cache_free+0x104/0x120 mm/slub.c:3535 qlink_free+0x4d/0x90 mm/kasan/quarantine.c:157 qlist_free_all+0x5f/0xb0 mm/kasan/quarantine.c:176 kasan_quarantine_reduce+0x14a/0x170 mm/kasan/quarantine.c:283 __kasan_slab_alloc+0x2f/0xf0 mm/kasan/common.c:443 kasan_slab_alloc include/linux/kasan.h:217 [inline] slab_post_alloc_hook+0x4f/0x2b0 mm/slab.h:550 slab_alloc_node mm/slub.c:3245 [inline] slab_alloc mm/slub.c:3255 [inline] kmem_cache_alloc+0xf7/0x260 mm/slub.c:3260 getname_flags+0xb9/0x500 fs/namei.c:138 getname+0x19/0x20 fs/namei.c:217 Memory state around the buggy address: ffff88811aea6180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88811aea6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88811aea6280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff88811aea6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88811aea6380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================