BUG: memory leak
unreferenced object 0xffff8881184f2800 (size 1024):
  comm "syz-executor.0", pid 5139, jiffies 4294942760 (age 11.960s)
  hex dump (first 32 bytes):
    00 fb 8e 00 00 cf e8 9e ac aa 80 5a e1 26 a9 9c  ...........Z.&..
    71 e3 ea 67 33 7f 9a ef ca d1 17 51 5c 7f 0e 4b  q..g3......Q\..K
  backtrace:
    [<ffffffff8154ba2b>] __kmalloc_node+0x4b/0x150
    [<ffffffff8153b3b9>] kvmalloc_node+0x99/0x170
    [<ffffffff818a362c>] ext4_expand_extra_isize_ea+0x91c/0xe20
    [<ffffffff8182f461>] __ext4_expand_extra_isize+0x191/0x200
    [<ffffffff81839df7>] __ext4_mark_inode_dirty+0x247/0x360
    [<ffffffff818ac68d>] ext4_set_acl+0x2ad/0x350
    [<ffffffff817298b0>] set_posix_acl+0x100/0x140
    [<ffffffff81729e42>] vfs_set_acl+0x312/0x4c0
    [<ffffffff8172bfdf>] do_set_acl+0x8f/0x150
    [<ffffffff816aab7e>] do_setxattr+0x8e/0xd0
    [<ffffffff816aac7b>] setxattr+0xbb/0xd0
    [<ffffffff816aada1>] path_setxattr+0x111/0x130
    [<ffffffff816aae49>] __x64_sys_lsetxattr+0x29/0x30
    [<ffffffff849d1478>] do_syscall_64+0x38/0xb0
    [<ffffffff84a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888117ad9800 (size 1024):
  comm "syz-executor.0", pid 5146, jiffies 4294942790 (age 11.660s)
  hex dump (first 32 bytes):
    00 fb 8e 00 00 cf e8 9e ac aa 80 5a e1 26 a9 9c  ...........Z.&..
    71 e3 ea 67 33 7f 9a ef ca d1 17 51 5c 7f 0e 4b  q..g3......Q\..K
  backtrace:
    [<ffffffff8154ba2b>] __kmalloc_node+0x4b/0x150
    [<ffffffff8153b3b9>] kvmalloc_node+0x99/0x170
    [<ffffffff818a362c>] ext4_expand_extra_isize_ea+0x91c/0xe20
    [<ffffffff8182f461>] __ext4_expand_extra_isize+0x191/0x200
    [<ffffffff81839df7>] __ext4_mark_inode_dirty+0x247/0x360
    [<ffffffff818ac68d>] ext4_set_acl+0x2ad/0x350
    [<ffffffff817298b0>] set_posix_acl+0x100/0x140
    [<ffffffff81729e42>] vfs_set_acl+0x312/0x4c0
    [<ffffffff8172bfdf>] do_set_acl+0x8f/0x150
    [<ffffffff816aab7e>] do_setxattr+0x8e/0xd0
    [<ffffffff816aac7b>] setxattr+0xbb/0xd0
    [<ffffffff816aada1>] path_setxattr+0x111/0x130
    [<ffffffff816aae49>] __x64_sys_lsetxattr+0x29/0x30
    [<ffffffff849d1478>] do_syscall_64+0x38/0xb0
    [<ffffffff84a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff8881185c7400 (size 1024):
  comm "syz-executor.0", pid 5149, jiffies 4294942798 (age 11.580s)
  hex dump (first 32 bytes):
    00 fb 8e 00 00 cf e8 9e ac aa 80 5a e1 26 a9 9c  ...........Z.&..
    71 e3 ea 67 33 7f 9a ef ca d1 17 51 5c 7f 0e 4b  q..g3......Q\..K
  backtrace:
    [<ffffffff8154ba2b>] __kmalloc_node+0x4b/0x150
    [<ffffffff8153b3b9>] kvmalloc_node+0x99/0x170
    [<ffffffff818a362c>] ext4_expand_extra_isize_ea+0x91c/0xe20
    [<ffffffff8182f461>] __ext4_expand_extra_isize+0x191/0x200
    [<ffffffff81839df7>] __ext4_mark_inode_dirty+0x247/0x360
    [<ffffffff818ac68d>] ext4_set_acl+0x2ad/0x350
    [<ffffffff817298b0>] set_posix_acl+0x100/0x140
    [<ffffffff81729e42>] vfs_set_acl+0x312/0x4c0
    [<ffffffff8172bfdf>] do_set_acl+0x8f/0x150
    [<ffffffff816aab7e>] do_setxattr+0x8e/0xd0
    [<ffffffff816aac7b>] setxattr+0xbb/0xd0
    [<ffffffff816aada1>] path_setxattr+0x111/0x130
    [<ffffffff816aae49>] __x64_sys_lsetxattr+0x29/0x30
    [<ffffffff849d1478>] do_syscall_64+0x38/0xb0
    [<ffffffff84a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

