syz-executor.1 (pid 14731) is setting deprecated v1 encryption policy; recommend upgrading to v2. ================================================================== BUG: KASAN: use-after-free in ext4_xattr_set_entry+0x172/0x1ed6 fs/ext4/xattr.c:1593 Read of size 4 at addr ffffffe00da1f004 by task syz-executor.1/14731 CPU: 0 PID: 14731 Comm: syz-executor.1 Not tainted 5.15.0-rc1-syzkaller-00001-g64a19591a293 #0 Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:112 The buggy address belongs to the page: page:ffffffcf023707c0 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x8dc1f flags: 0xffe000000000000(node=0|zone=0|lastcpupid=0x7ff) raw: 0ffe000000000000 ffffffcf027e0808 ffffffcf022c8c08 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffff7f 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_HARDWALL), pid 14042, ts 8286473871400, free_ts 8430787403900 page_owner allocation stack trace missing page_owner free stack trace missing Memory state around the buggy address: ffffffe00da1ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffffe00da1ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffffe00da1f000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffffffe00da1f080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffffffe00da1f100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #640: comm syz-executor.1: corrupted xattr entries