================================================================== BUG: KASAN: use-after-free in ext4_xattr_set_entry+0x172/0x1ed6 fs/ext4/xattr.c:1593 Read of size 4 at addr ffffffe00d866004 by task syz-executor.0/3171 CPU: 0 PID: 3171 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller-00001-g64a19591a293 #0 Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:112 Allocated by task 141: (stack is not available) The buggy address belongs to the object at ffffffe00d866000 which belongs to the cache fs_cache of size 168 The buggy address is located 4 bytes inside of 168-byte region [ffffffe00d866000, ffffffe00d8660a8) The buggy address belongs to the page: page:ffffffcf02369980 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffffffe00d866f00 pfn:0x8da66 flags: 0xffe000000000200(slab|node=0|zone=0|lastcpupid=0x7ff) raw: 0ffe000000000200 ffffffcf02201700 0000000800000008 ffffffe0056d3000 raw: ffffffe00d866f00 0000000080100000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 141, ts 847958602300, free_ts 847939253400 page_owner allocation stack trace missing page_owner free stack trace missing Memory state around the buggy address: ffffffe00d865f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffffe00d865f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffffe00d866000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffffffe00d866080: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc ffffffe00d866100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #640: comm syz-executor.0: corrupted xattr entries