WARNING: the mand mount option is being deprecated and will be removed in v5.15! ====================================================== audit: type=1800 audit(1670573321.199:2): pid=10362 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file2" dev="loop2" ino=3 res=0 ------------[ cut here ]------------ kernel BUG at fs/fat/inode.c:161! invalid opcode: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 10362 Comm: syz-executor.2 Not tainted 4.14.301-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 task: ffff88804e184040 task.stack: ffff88804e1e8000 RIP: 0010:__fat_get_block fs/fat/inode.c:161 [inline] RIP: 0010:fat_get_block+0x647/0x750 fs/fat/inode.c:176 RSP: 0018:ffff88804e1ef328 EFLAGS: 00010216 RAX: 0000000000040000 RBX: ffff888047d3e0a8 RCX: ffffc90007cf8000 RDX: 0000000000000ce3 RSI: ffffffff81d000a7 RDI: ffff888045ebaae8 RBP: ffff888045ebaba0 R08: ffff88804e1ef3c0 R09: 0000000000000000 R10: 0000000000000000 R11: ffff88804e184040 R12: ffff88804ddfacc0 R13: 0000000000000000 R14: 000000000000000b R15: 0000000000000001 FS: 00007fbe888d9700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b30e25000 CR3: 00000000a2cb1000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __block_write_begin_int+0x35c/0x11d0 fs/buffer.c:2038 __block_write_begin fs/buffer.c:2088 [inline] block_write_begin+0x58/0x270 fs/buffer.c:2147 cont_write_begin+0x4a3/0x740 fs/buffer.c:2497 fat_write_begin+0x89/0x170 fs/fat/inode.c:222 generic_perform_write+0x1d5/0x430 mm/filemap.c:3055 __generic_file_write_iter+0x42b/0x590 mm/filemap.c:3148 generic_file_write_iter+0x36f/0x650 mm/filemap.c:3208 call_write_iter include/linux/fs.h:1780 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x44c/0x630 fs/read_write.c:482 __kernel_write+0xf5/0x330 fs/read_write.c:501 write_pipe_buf+0x143/0x1c0 fs/splice.c:797 splice_from_pipe_feed fs/splice.c:502 [inline] __splice_from_pipe+0x326/0x7a0 fs/splice.c:626 splice_from_pipe fs/splice.c:661 [inline] default_file_splice_write+0xc5/0x150 fs/splice.c:809 do_splice_from fs/splice.c:851 [inline] direct_splice_actor+0x115/0x160 fs/splice.c:1018 splice_direct_to_actor+0x27c/0x730 fs/splice.c:973 do_splice_direct+0x164/0x210 fs/splice.c:1061 do_sendfile+0x47f/0xb30 fs/read_write.c:1441 SYSC_sendfile64 fs/read_write.c:1502 [inline] SyS_sendfile64+0xff/0x110 fs/read_write.c:1488 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7fbe8a3670d9 RSP: 002b:00007fbe888d9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 00007fbe8a486f80 RCX: 00007fbe8a3670d9 RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 RBP: 00007fbe8a3c2ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 000080001d00c0d1 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fffcd7b369f R14: 00007fbe888d9300 R15: 0000000000022000 Code: 1a af ff e9 bd fa ff ff 48 8b 7c 24 20 e8 d2 19 af ff e9 f4 fb ff ff 48 8b 7c 24 38 e8 d3 18 af ff e9 52 fe ff ff e8 99 59 85 ff <0f> 0b e8 92 59 85 ff 0f 0b e8 8b 1a af ff e9 b1 fa ff ff 48 8b RIP: __fat_get_block fs/fat/inode.c:161 [inline] RSP: ffff88804e1ef328 RIP: fat_get_block+0x647/0x750 fs/fat/inode.c:176 RSP: ffff88804e1ef328 ---[ end trace 9073f5fef1d28916 ]---