================================================================== BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x13ba/0x3940 fs/ext4/xattr.c:1736 Read of size 18446744073709551600 at addr ffff88811e8c76b8 by task kworker/u4:61/2713 CPU: 0 PID: 2713 Comm: kworker/u4:61 Tainted: G W syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: writeback wb_workfn (flush-7:2) Call Trace: __dump_stack+0x21/0x30 lib/dump_stack.c:88 dump_stack_lvl+0x110/0x170 lib/dump_stack.c:106 print_address_description+0x7f/0x2c0 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:427 [inline] kasan_report+0xf1/0x140 mm/kasan/report.c:444 check_region_inline mm/kasan/generic.c:-1 [inline] kasan_check_range+0x249/0x2a0 mm/kasan/generic.c:189 memmove+0x2d/0x70 mm/kasan/shadow.c:54 ext4_xattr_set_entry+0x13ba/0x3940 fs/ext4/xattr.c:1736 ext4_xattr_ibody_set+0x122/0x360 fs/ext4/xattr.c:2238 ext4_destroy_inline_data_nolock+0x234/0x5d0 fs/ext4/inline.c:468 ext4_destroy_inline_data+0x84/0xe0 fs/ext4/inline.c:1915 ext4_writepages+0x64f/0x3090 fs/ext4/inode.c:2748 do_writepages+0x473/0x6c0 mm/page-writeback.c:2388 __writeback_single_inode+0xd5/0x9c0 fs/fs-writeback.c:1657 writeback_sb_inodes+0xa10/0x1610 fs/fs-writeback.c:1940 wb_writeback+0x40b/0x9d0 fs/fs-writeback.c:2116 wb_do_writeback fs/fs-writeback.c:2263 [inline] wb_workfn+0x3ac/0xf30 fs/fs-writeback.c:2304 process_one_work+0x6be/0xba0 kernel/workqueue.c:2325 worker_thread+0xa59/0x1200 kernel/workqueue.c:2472 kthread+0x411/0x500 kernel/kthread.c:337 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 The buggy address belongs to the page: page:ffffea00047a31c0 refcount:2 mapcount:0 mapping:ffff8881093024d8 index:0x3 pfn:0x11e8c7 memcg:ffff888100256780 aops:def_blk_aops ino:700002 flags: 0x400000000002203e(referenced|uptodate|dirty|lru|active|private|mappedtodisk|zone=1) raw: 400000000002203e ffffea00045f6488 ffffea0004b3a908 ffff8881093024d8 raw: 0000000000000003 ffff8881291660a8 00000002ffffffff ffff888100256780 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112c40(GFP_NOFS|__GFP_NOWARN|__GFP_NORETRY|__GFP_HARDWALL), pid 2749, ts 149954604637, free_ts 149952960869 set_page_owner include/linux/page_owner.h:33 [inline] post_alloc_hook+0x192/0x1b0 mm/page_alloc.c:2605 prep_new_page+0x1c/0x110 mm/page_alloc.c:2611 get_page_from_freelist+0x2d3a/0x2dc0 mm/page_alloc.c:4485 __alloc_pages+0x1a2/0x460 mm/page_alloc.c:5822 __alloc_pages_node include/linux/gfp.h:595 [inline] alloc_pages_node include/linux/gfp.h:609 [inline] alloc_pages include/linux/gfp.h:622 [inline] __page_cache_alloc include/linux/pagemap.h:305 [inline] page_cache_ra_unbounded+0x2d5/0x9a0 mm/readahead.c:227 do_page_cache_ra mm/readahead.c:280 [inline] force_page_cache_ra+0x3fd/0x460 mm/readahead.c:312 page_cache_sync_ra+0x2b4/0x430 mm/readahead.c:590 page_cache_sync_readahead include/linux/pagemap.h:831 [inline] filemap_get_pages mm/filemap.c:2569 [inline] filemap_read+0x694/0x2040 mm/filemap.c:2654 generic_file_read_iter+0xac/0x400 mm/filemap.c:2814 blkdev_read_iter+0x12f/0x160 block/fops.c:563 call_read_iter include/linux/fs.h:2206 [inline] new_sync_read fs/read_write.c:404 [inline] vfs_read+0x6c9/0xc40 fs/read_write.c:485 ksys_read+0x149/0x250 fs/read_write.c:623 __do_sys_read fs/read_write.c:633 [inline] __se_sys_read fs/read_write.c:631 [inline] __x64_sys_read+0x7b/0x90 fs/read_write.c:631 x64_sys_call+0x96d/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:1 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 page last free stack trace: reset_page_owner include/linux/page_owner.h:26 [inline] free_pages_prepare mm/page_alloc.c:1472 [inline] free_pcp_prepare mm/page_alloc.c:1544 [inline] free_unref_page_prepare+0x542/0x550 mm/page_alloc.c:3534 free_unref_page+0xae/0x540 mm/page_alloc.c:3616 free_the_page mm/page_alloc.c:805 [inline] __free_pages+0x6c/0x100 mm/page_alloc.c:5898 free_pages+0x82/0x90 mm/page_alloc.c:5909 selinux_genfs_get_sid+0x20b/0x250 security/selinux/hooks.c:1381 inode_doinit_with_dentry+0x87a/0xd80 security/selinux/hooks.c:1576 selinux_d_instantiate+0x27/0x40 security/selinux/hooks.c:6495 security_d_instantiate+0x9e/0xf0 security/security.c:2074 d_splice_alias+0x6d/0x390 fs/dcache.c:3073 kernfs_iop_lookup+0x2c2/0x310 fs/kernfs/dir.c:1175 __lookup_slow+0x2b8/0x410 fs/namei.c:1671 lookup_slow+0x57/0x70 fs/namei.c:1688 walk_component+0x325/0x460 fs/namei.c:1984 lookup_last fs/namei.c:2439 [inline] path_lookupat+0x180/0x490 fs/namei.c:2463 filename_lookup+0x214/0x540 fs/namei.c:2492 user_path_at_empty+0x47/0x1c0 fs/namei.c:2891 Memory state around the buggy address: ffff88811e8c7580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88811e8c7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88811e8c7680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff88811e8c7700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88811e8c7780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================