================================================================== BUG: KASAN: use-after-free in ext4_xattr_set_entry+0x33ee/0x39f0 fs/ext4/xattr.c:1600 Read of size 4 at addr ffff888058518084 by task syz-executor.4/24343 CPU: 0 PID: 24343 Comm: syz-executor.4 Not tainted 5.2.0-rc7 #12 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d8/0x2f8 lib/dump_stack.c:113 print_address_description+0x6d/0x310 mm/kasan/report.c:188 __kasan_report+0x14b/0x1c0 mm/kasan/report.c:317 kasan_report+0x26/0x50 mm/kasan/common.c:614 __asan_report_load4_noabort+0x14/0x20 mm/kasan/generic_report.c:131 ext4_xattr_set_entry+0x33ee/0x39f0 fs/ext4/xattr.c:1600 ext4_xattr_ibody_set fs/ext4/xattr.c:2236 [inline] ext4_xattr_set_handle+0xf1a/0x20d0 fs/ext4/xattr.c:2392 ext4_initxattrs+0xb8/0x110 fs/ext4/xattr_security.c:43 security_inode_init_security+0x371/0x3c0 security/security.c:953 ext4_init_security+0x34/0x40 fs/ext4/xattr_security.c:57 __ext4_new_inode+0x4979/0x5c40 fs/ext4/ialloc.c:1160 ext4_symlink+0x5ab/0x1010 fs/ext4/namei.c:3212 vfs_symlink+0x36f/0x4f0 fs/namei.c:4125 do_symlinkat+0x1f0/0x480 fs/namei.c:4152 __do_sys_symlink fs/namei.c:4171 [inline] __se_sys_symlink fs/namei.c:4169 [inline] __x64_sys_symlink+0x60/0x70 fs/namei.c:4169 do_syscall_64+0xfe/0x140 arch/x86/entry/common.c:301 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459247 Code: 0f 1f 00 b8 5c 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007ffc18849458 EFLAGS: 00000202 ORIG_RAX: 0000000000000058 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459247 RDX: 00007ffc188494f7 RSI: 00000000004bed0b RDI: 00007ffc188494e0 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000017 R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000001 R13: 00007ffc18849490 R14: 0000000000000000 R15: 00007ffc188494a0 The buggy address belongs to the page: page:ffffea0001614600 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 flags: 0x1fffc0000000000() raw: 01fffc0000000000 ffffea0001614e08 ffffea000157fa08 0000000000000000 raw: 0000000000000000 0000000000000003 00000000ffffff7f 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff888058517f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888058518000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff888058518080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff888058518100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888058518180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================