================================================================== BUG: KASAN: wild-memory-access in instrument_atomic_read_write include/linux/instrumented.h:102 [inline] BUG: KASAN: wild-memory-access in atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline] BUG: KASAN: wild-memory-access in __refcount_sub_and_test include/linux/refcount.h:272 [inline] BUG: KASAN: wild-memory-access in __refcount_dec_and_test include/linux/refcount.h:315 [inline] BUG: KASAN: wild-memory-access in refcount_dec_and_test include/linux/refcount.h:333 [inline] BUG: KASAN: wild-memory-access in posix_acl_release include/linux/posix_acl.h:57 [inline] BUG: KASAN: wild-memory-access in posix_acl_release include/linux/posix_acl.h:55 [inline] BUG: KASAN: wild-memory-access in v9fs_get_acl+0x19e/0x5f0 fs/9p/acl.c:102 Write of size 4 at addr f400071b52ad1c00 by task syz-executor.0/21081 CPU: 0 PID: 21081 Comm: syz-executor.0 Not tainted 6.3.0-rc5-syzkaller-00202-ga79d5c76f705 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106 print_report mm/kasan/report.c:433 [inline] kasan_report+0xec/0x130 mm/kasan/report.c:536 check_region_inline mm/kasan/generic.c:181 [inline] kasan_check_range+0x141/0x190 mm/kasan/generic.c:187 instrument_atomic_read_write include/linux/instrumented.h:102 [inline] atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline] __refcount_sub_and_test include/linux/refcount.h:272 [inline] __refcount_dec_and_test include/linux/refcount.h:315 [inline] refcount_dec_and_test include/linux/refcount.h:333 [inline] posix_acl_release include/linux/posix_acl.h:57 [inline] posix_acl_release include/linux/posix_acl.h:55 [inline] v9fs_get_acl+0x19e/0x5f0 fs/9p/acl.c:102 v9fs_mount+0x662/0xca0 fs/9p/vfs_super.c:183 legacy_get_tree+0x109/0x220 fs/fs_context.c:610 vfs_get_tree+0x8d/0x350 fs/super.c:1510 do_new_mount fs/namespace.c:3042 [inline] path_mount+0x1342/0x1e40 fs/namespace.c:3372 do_mount fs/namespace.c:3385 [inline] __do_sys_mount fs/namespace.c:3594 [inline] __se_sys_mount fs/namespace.c:3571 [inline] __x64_sys_mount+0x283/0x300 fs/namespace.c:3571 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f404448c169 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f40452a6168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f40445abf80 RCX: 00007f404448c169 RDX: 0000000020000b80 RSI: 00000000200003c0 RDI: 0000000000000000 RBP: 00007f40444e7ca1 R08: 0000000020000140 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe10b390cf R14: 00007f40452a6300 R15: 0000000000022000 ==================================================================