loop4: detected capacity change from 0 to 32768 ================================================================== BUG: KASAN: user-memory-access in instrument_atomic_read_write include/linux/instrumented.h:102 [inline] BUG: KASAN: user-memory-access in atomic_long_try_cmpxchg_acquire include/linux/atomic/atomic-instrumented.h:1779 [inline] BUG: KASAN: user-memory-access in rwsem_write_trylock kernel/locking/rwsem.c:262 [inline] BUG: KASAN: user-memory-access in __down_write_common kernel/locking/rwsem.c:1304 [inline] BUG: KASAN: user-memory-access in __down_write kernel/locking/rwsem.c:1314 [inline] BUG: KASAN: user-memory-access in down_write_nested+0xdc/0x280 kernel/locking/rwsem.c:1673 Write of size 8 at addr 00000000002000e1 by task syz-executor.4/14822 CPU: 0 PID: 14822 Comm: syz-executor.4 Not tainted 6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106 print_report+0xed/0x1f0 mm/kasan/report.c:398 kasan_report+0xcd/0x100 mm/kasan/report.c:495 kasan_check_range+0x2a7/0x2e0 mm/kasan/generic.c:189 instrument_atomic_read_write include/linux/instrumented.h:102 [inline] atomic_long_try_cmpxchg_acquire include/linux/atomic/atomic-instrumented.h:1779 [inline] rwsem_write_trylock kernel/locking/rwsem.c:262 [inline] __down_write_common kernel/locking/rwsem.c:1304 [inline] __down_write kernel/locking/rwsem.c:1314 [inline] down_write_nested+0xdc/0x280 kernel/locking/rwsem.c:1673 inode_lock_nested include/linux/fs.h:791 [inline] open_xa_root fs/reiserfs/xattr.c:127 [inline] open_xa_dir+0x11e/0x610 fs/reiserfs/xattr.c:152 xattr_lookup+0x27/0x280 fs/reiserfs/xattr.c:395 reiserfs_xattr_get+0xfa/0x580 fs/reiserfs/xattr.c:677 reiserfs_get_acl+0x7a/0x650 fs/reiserfs/xattr_acl.c:214 get_acl+0x157/0x260 fs/posix_acl.c:153 check_acl+0x35/0x150 fs/namei.c:306 acl_permission_check fs/namei.c:351 [inline] generic_permission+0x388/0x4e0 fs/namei.c:404 do_inode_permission fs/namei.c:458 [inline] inode_permission+0x22c/0x450 fs/namei.c:525 may_open+0x2a4/0x400 fs/namei.c:3185 do_open fs/namei.c:3555 [inline] path_openat+0x24a2/0x2df0 fs/namei.c:3713 do_filp_open+0x264/0x4f0 fs/namei.c:3740 do_sys_openat2+0x124/0x4e0 fs/open.c:1310 do_sys_open fs/open.c:1326 [inline] __do_sys_openat fs/open.c:1342 [inline] __se_sys_openat fs/open.c:1337 [inline] __x64_sys_openat+0x243/0x290 fs/open.c:1337 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fac9723d654 Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 RSP: 002b:00007fac97fbff10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fac9723d654 RDX: 0000000000010000 RSI: 0000000020000100 RDI: 00000000ffffff9c RBP: 0000000020000100 R08: 0000000000000000 R09: 0000000020000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 R13: 0000000020000100 R14: 00007fac97fbffe0 R15: 0000000020007380 ==================================================================