EXT4-fs (loop4): 1 truncate cleaned up EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption=v1,bsdgroups,nouid32,i_version,jqfmt=vfsv1,oldalloc,stripe=0x0000000000000005,,errors=continue. Quota mode: none. ================================================================== BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x1331/0x3ea0 fs/ext4/xattr.c:1735 Read of size 18446744073709551600 at addr ffff88802b190ab8 by task syz.4.547/6219 CPU: 0 PID: 6219 Comm: syz.4.547 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Call Trace: dump_stack_lvl+0x188/0x250 lib/dump_stack.c:106 print_address_description+0x60/0x2d0 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:434 [inline] kasan_report+0xdf/0x130 mm/kasan/report.c:451 check_region_inline mm/kasan/generic.c:-1 [inline] kasan_check_range+0x235/0x290 mm/kasan/generic.c:189 memmove+0x25/0x60 mm/kasan/shadow.c:54 ext4_xattr_set_entry+0x1331/0x3ea0 fs/ext4/xattr.c:1735 ext4_xattr_ibody_set+0x112/0x330 fs/ext4/xattr.c:2237 ext4_destroy_inline_data_nolock+0x237/0x5e0 fs/ext4/inline.c:467 ext4_convert_inline_data_to_extent fs/ext4/inline.c:619 [inline] ext4_try_to_write_inline_data+0x72f/0x14f0 fs/ext4/inline.c:760 ext4_write_begin+0x26e/0x15d0 fs/ext4/inode.c:1181 ext4_da_write_begin+0x43b/0xb40 fs/ext4/inode.c:2975 generic_perform_write+0x2b6/0x550 mm/filemap.c:3785 ext4_buffered_write_iter+0x25f/0x3b0 fs/ext4/file.c:268 ext4_file_write_iter+0x74d/0x1700 fs/ext4/file.c:-1 do_iter_readv_writev+0x47e/0x5f0 fs/read_write.c:-1 do_iter_write+0x205/0x7b0 fs/read_write.c:855 vfs_writev fs/read_write.c:928 [inline] do_pwritev+0x240/0x3a0 fs/read_write.c:1025 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f6027480eb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f60256dc028 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 RAX: ffffffffffffffda RBX: 00007f60276fbfa0 RCX: 00007f6027480eb9 RDX: 0000000000000001 RSI: 0000200000000100 RDI: 0000000000000004 RBP: 00007f60274eec1f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000005405 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f60276fc038 R14: 00007f60276fbfa0 R15: 00007ffe1c873fb8 The buggy address belongs to the page: page:ffffea0000ac6400 refcount:3 mapcount:1 mapping:ffff88801d64cf30 index:0x1 pfn:0x2b190 memcg:ffff888140774000 aops:def_blk_aops ino:700004 flags: 0xfff0000002203e(referenced|uptodate|dirty|lru|active|private|mappedtodisk|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff0000002203e ffffea000140ec88 ffffea0000b1a1c8 ffff88801d64cf30 raw: 0000000000000001 ffff8880734d51d0 0000000300000000 ffff888140774000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112c40(GFP_NOFS|__GFP_NOWARN|__GFP_NORETRY|__GFP_HARDWALL), pid 4176, ts 194666529293, free_ts 194644836059 prep_new_page mm/page_alloc.c:2426 [inline] get_page_from_freelist+0x1bbd/0x1ca0 mm/page_alloc.c:4192 __alloc_pages+0x1ee/0x480 mm/page_alloc.c:5487 __page_cache_alloc+0xce/0x440 mm/filemap.c:1022 page_cache_ra_unbounded+0x25d/0x940 mm/readahead.c:216 do_page_cache_ra mm/readahead.c:269 [inline] force_page_cache_ra+0x3e5/0x440 mm/readahead.c:301 page_cache_sync_readahead include/linux/pagemap.h:833 [inline] filemap_get_pages mm/filemap.c:2551 [inline] filemap_read+0x5de/0x2540 mm/filemap.c:2634 blkdev_read_iter+0x11d/0x150 block/fops.c:563 call_read_iter include/linux/fs.h:2167 [inline] new_sync_read fs/read_write.c:404 [inline] vfs_read+0x759/0xd60 fs/read_write.c:485 ksys_read+0x152/0x260 fs/read_write.c:623 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1340 [inline] free_pcp_prepare mm/page_alloc.c:1391 [inline] free_unref_page_prepare+0x637/0x6c0 mm/page_alloc.c:3317 free_unref_page_list+0x119/0x820 mm/page_alloc.c:3433 release_pages+0x186c/0x1be0 mm/swap.c:963 __pagevec_release+0x6d/0xe0 mm/swap.c:983 pagevec_release include/linux/pagevec.h:81 [inline] __invalidate_mapping_pages+0x570/0x6b0 mm/truncate.c:509 ext4_put_super+0x8cc/0xe00 fs/ext4/super.c:1255 generic_shutdown_super+0x130/0x300 fs/super.c:475 kill_block_super+0x7c/0xe0 fs/super.c:1427 deactivate_locked_super+0x93/0xf0 fs/super.c:335 cleanup_mnt+0x42d/0x4e0 fs/namespace.c:1148 task_work_run+0x125/0x1a0 kernel/task_work.c:188 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop+0x10f/0x130 kernel/entry/common.c:181 exit_to_user_mode_prepare+0xee/0x180 kernel/entry/common.c:214 __syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline] syscall_exit_to_user_mode+0x16/0x40 kernel/entry/common.c:307 do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x66/0xd0 Memory state around the buggy address: ffff88802b190980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88802b190a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88802b190a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff88802b190b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88802b190b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================