REISERFS (device loop1): Using r5 hash to sort names
REISERFS (device loop1): Created .reiserfs_priv - reserved for xattr storage.
general protection fault, probably for non-canonical address 0xe91f0d291bffff80: 0000 [#1] PREEMPT SMP KASAN
KASAN: maybe wild-memory-access in range [0x48f88948dffffc00-0x48f88948dffffc07]
CPU: 1 PID: 8699 Comm: syz-executor.1 Not tainted 6.2.0-syzkaller-13277-g2eb29d59ddf0 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023
RIP: 0010:may_create_in_sticky fs/namei.c:1238 [inline]
RIP: 0010:do_open fs/namei.c:3538 [inline]
RIP: 0010:path_openat+0xd23/0x2750 fs/namei.c:3715
Code: 0d 8f 0c 31 ff 48 8b 5b 68 89 ee e8 37 8e 9b ff 85 ed 75 3d e8 de 91 9b ff 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 0f 85 1a 0e 00 00 0f b7 2b bf 00 10 00 00 66 81
RSP: 0018:ffffc90004cefb08 EFLAGS: 00010212
RAX: dffffc0000000000 RBX: 48f88948dffffc00 RCX: ffffc90003ee1000
RDX: 091f11291bffff80 RSI: ffffffff81e96862 RDI: 0000000000000005
RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000
R13: ffff88802ea462fc R14: 0000000000008241 R15: ffffc90004cefc48
FS:  00007f3580878700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b32e2a000 CR3: 000000002649b000 CR4: 0000000000350ee0
Call Trace:
 <TASK>
 do_filp_open+0x1ba/0x410 fs/namei.c:3742
 do_sys_openat2+0x16d/0x4c0 fs/open.c:1348
 do_sys_open fs/open.c:1364 [inline]
 __do_sys_creat fs/open.c:1440 [inline]
 __se_sys_creat fs/open.c:1434 [inline]
 __x64_sys_creat+0xcd/0x120 fs/open.c:1434
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f357fa8c0f9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f3580878168 EFLAGS: 00000246 ORIG_RAX: 0000000000000055
RAX: ffffffffffffffda RBX: 00007f357fbabf80 RCX: 00007f357fa8c0f9
RDX: 0000000000000000 RSI: 1fb978507dcbbb5e RDI: 0000000020000100
RBP: 00007f357fae7ae9 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fff09ffd03f R14: 00007f3580878300 R15: 0000000000022000
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:may_create_in_sticky fs/namei.c:1238 [inline]
RIP: 0010:do_open fs/namei.c:3538 [inline]
RIP: 0010:path_openat+0xd23/0x2750 fs/namei.c:3715
Code: 0d 8f 0c 31 ff 48 8b 5b 68 89 ee e8 37 8e 9b ff 85 ed 75 3d e8 de 91 9b ff 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 0f 85 1a 0e 00 00 0f b7 2b bf 00 10 00 00 66 81
RSP: 0018:ffffc90004cefb08 EFLAGS: 00010212
RAX: dffffc0000000000 RBX: 48f88948dffffc00 RCX: ffffc90003ee1000
RDX: 091f11291bffff80 RSI: ffffffff81e96862 RDI: 0000000000000005
RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000
R13: ffff88802ea462fc R14: 0000000000008241 R15: ffffc90004cefc48
FS:  00007f3580878700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b3362c000 CR3: 000000002649b000 CR4: 0000000000350ef0
----------------
Code disassembly (best guess):
   0:	0d 8f 0c 31 ff       	or     $0xff310c8f,%eax
   5:	48 8b 5b 68          	mov    0x68(%rbx),%rbx
   9:	89 ee                	mov    %ebp,%esi
   b:	e8 37 8e 9b ff       	callq  0xff9b8e47
  10:	85 ed                	test   %ebp,%ebp
  12:	75 3d                	jne    0x51
  14:	e8 de 91 9b ff       	callq  0xff9b91f7
  19:	48 89 da             	mov    %rbx,%rdx
  1c:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  23:	fc ff df
  26:	48 c1 ea 03          	shr    $0x3,%rdx
* 2a:	0f b6 04 02          	movzbl (%rdx,%rax,1),%eax <-- trapping instruction
  2e:	84 c0                	test   %al,%al
  30:	0f 85 1a 0e 00 00    	jne    0xe50
  36:	0f b7 2b             	movzwl (%rbx),%ebp
  39:	bf 00 10 00 00       	mov    $0x1000,%edi
  3e:	66                   	data16
  3f:	81                   	.byte 0x81