================================================================== BUG: KASAN: slab-out-of-bounds in ext4_xattr_set_entry+0x13e2/0x1ec4 fs/ext4/xattr.c:1746 Write of size 4029 at addr ffffffe00dadb640 by task syz-executor.1/11273 CPU: 0 PID: 11273 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller-00147-g7d2a07b76933 #0 Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:112 Allocated by task 1: (stack is not available) The buggy address belongs to the object at ffffffe00dadb570 which belongs to the cache kernfs_node_cache of size 168 The buggy address is located 40 bytes to the right of 168-byte region [ffffffe00dadb570, ffffffe00dadb618) The buggy address belongs to the page: page:ffffffcf023736c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8dcdb flags: 0xffe000000000200(slab|node=0|zone=0|lastcpupid=0x7ff) raw: 0ffe000000000200 0000000000000000 0000000000000122 ffffffe0056dd280 raw: 0000000000000000 0000000000110011 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 68782040300, free_ts 68733228900 page_owner allocation stack trace missing page_owner free stack trace missing Memory state around the buggy address: ffffffe00dadb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc 00 00 ffffffe00dadb580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffffe00dadb600: 00 00 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 ^ ffffffe00dadb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffffe00dadb700: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 ==================================================================