================================================================== BUG: KASAN: slab-out-of-bounds in ext4_xattr_set_entry+0x13e2/0x1ed6 fs/ext4/xattr.c:1750 Write of size 4029 at addr ffffffe00d6b7440 by task syz-executor.1/13833 CPU: 1 PID: 13833 Comm: syz-executor.1 Not tainted 5.15.0-rc1-syzkaller-00001-g64a19591a293 #0 Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:112 Allocated by task 2023: (stack is not available) The buggy address belongs to the object at ffffffe00d6b7400 which belongs to the cache kmalloc-cg-512 of size 512 The buggy address is located 64 bytes inside of 512-byte region [ffffffe00d6b7400, ffffffe00d6b7600) The buggy address belongs to the page: page:ffffffcf02362d00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8d8b4 head:ffffffcf02362d00 order:2 compound_mapcount:0 compound_pincount:0 flags: 0xffe000000010200(slab|head|node=0|zone=0|lastcpupid=0x7ff) raw: 0ffe000000010200 ffffffcf02339800 0000000300000003 ffffffe005602dc0 raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1959, ts 197600044500, free_ts 197525410800 page_owner allocation stack trace missing page_owner free stack trace missing Memory state around the buggy address: ffffffe00d6b7480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffffe00d6b7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffffe00d6b7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffffffe00d6b7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffffffe00d6b7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ==================================================================