================================================================== BUG: KASAN: user-memory-access in instrument_atomic_read_write include/linux/instrumented.h:96 [inline] BUG: KASAN: user-memory-access in atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:400 [inline] BUG: KASAN: user-memory-access in __refcount_sub_and_test include/linux/refcount.h:389 [inline] BUG: KASAN: user-memory-access in __refcount_dec_and_test include/linux/refcount.h:432 [inline] BUG: KASAN: user-memory-access in refcount_dec_and_test include/linux/refcount.h:450 [inline] BUG: KASAN: user-memory-access in posix_acl_release include/linux/posix_acl.h:62 [inline] BUG: KASAN: user-memory-access in __destroy_inode+0x496/0x670 fs/inode.c:383 Write of size 4 at addr 0000000b00000000 by task syz.0.17/6044 CPU: 0 UID: 0 PID: 6044 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 kasan_report+0x118/0x150 mm/kasan/report.c:595 check_region_inline mm/kasan/generic.c:-1 [inline] kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:189 instrument_atomic_read_write include/linux/instrumented.h:96 [inline] atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:400 [inline] __refcount_sub_and_test include/linux/refcount.h:389 [inline] __refcount_dec_and_test include/linux/refcount.h:432 [inline] refcount_dec_and_test include/linux/refcount.h:450 [inline] posix_acl_release include/linux/posix_acl.h:62 [inline] __destroy_inode+0x496/0x670 fs/inode.c:383 destroy_inode fs/inode.c:394 [inline] evict+0x797/0x9c0 fs/inode.c:834 dispose_list fs/inode.c:852 [inline] evict_inodes+0x64c/0x6d0 fs/inode.c:906 generic_shutdown_super+0x9a/0x2c0 fs/super.c:628 kill_block_super+0x44/0x90 fs/super.c:1766 deactivate_locked_super+0xbc/0x130 fs/super.c:474 cleanup_mnt+0x425/0x4c0 fs/namespace.c:1375 task_work_run+0x1d4/0x260 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0x6b5/0x2300 kernel/exit.c:961 do_group_exit+0x21c/0x2d0 kernel/exit.c:1102 get_signal+0x1286/0x1340 kernel/signal.c:3034 arch_do_signal_or_restart+0x9a/0x750 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop+0x75/0x110 kernel/entry/common.c:40 exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline] do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fa6259c1785 Code: Unable to access opcode bytes at 0x7fa6259c175b. RSP: 002b:00007fff242d6df0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 RAX: fffffffffffffdfc RBX: 00007fa625be5fa0 RCX: 00007fa6259c1785 RDX: 00007fff242d6e30 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fa625a11f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 00007fa625be5fa0 R14: 00007fa625be5fa0 R15: 0000000000000006 ==================================================================