netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. ------------[ cut here ]------------ kernel BUG at fs/buffer.c:3111! invalid opcode: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 7243 Comm: syz-executor.0 Not tainted 4.14.140 #36 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff888055d96140 task.stack: ffff888055d98000 RIP: 0010:submit_bh_wbc+0x5a0/0x720 fs/buffer.c:3111 RSP: 0018:ffff888055d9f820 EFLAGS: 00010212 RAX: 0000000000040000 RBX: ffff88809a3ce9d8 RCX: ffffc90006842000 RDX: 000000000000ec8d RSI: ffffffff8199d240 RDI: 0000000000000000 RBP: ffff888055d9f868 R08: 0000000000000000 R09: ffff888055d969e0 R10: 0000000000000000 R11: 0000000000000000 R12: ffff88809a3ce9d8 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 00007faa8d578700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 kobject: '9p-2' (ffff88805518ae10): kobject_add_internal: parent: 'bdi', set: 'devices' CR2: 0000000000625208 CR3: 0000000083d4f000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: submit_bh fs/buffer.c:3158 [inline] __bread_slow fs/buffer.c:1238 [inline] __bread_gfp+0x106/0x290 fs/buffer.c:1420 sb_bread include/linux/buffer_head.h:307 [inline] fat__get_entry+0x4a3/0x8b0 fs/fat/dir.c:100 kobject: '9p-2' (ffff88805518ae10): kobject_uevent_env fat_get_entry fs/fat/dir.c:128 [inline] fat_get_short_entry+0x130/0x2a0 fs/fat/dir.c:876 fat_subdirs+0xa7/0x150 fs/fat/dir.c:942 kobject: '9p-2' (ffff88805518ae10): fill_kobj_path: path = '/devices/virtual/bdi/9p-2' fat_read_root fs/fat/inode.c:1409 [inline] fat_fill_super+0x1d13/0x3560 fs/fat/inode.c:1839 vfat_fill_super+0x32/0x40 fs/fat/namei_vfat.c:1059 mount_bdev+0x2be/0x370 fs/super.c:1134 vfat_mount+0x35/0x40 fs/fat/namei_vfat.c:1066 mount_fs+0x97/0x2a1 fs/super.c:1237 vfs_kern_mount.part.0+0x5e/0x3d0 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0x417/0x27d0 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xab/0x120 fs/namespace.c:3072 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45c2ca RSP: 002b:00007faa8d577a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007faa8d577b40 RCX: 000000000045c2ca RDX: 00007faa8d577ae0 RSI: 00000000200004c0 RDI: 00007faa8d577b00 RBP: 0000000000000001 R08: 00007faa8d577b40 R09: 00007faa8d577ae0 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 R13: 00000000004c8b06 R14: 00000000004dfa48 R15: 00000000ffffffff Code: f0 80 63 01 f7 e9 3d fb ff ff 48 8d 43 20 48 89 45 d0 48 8d 43 10 48 89 45 c0 e9 34 fc ff ff e8 27 0f c3 ff 0f 0b e8 20 0f c3 ff <0f> 0b e8 19 0f c3 ff 0f 0b e8 12 0f c3 ff 0f 0b e8 0b 0f c3 ff RIP: submit_bh_wbc+0x5a0/0x720 fs/buffer.c:3111 RSP: ffff888055d9f820 kobject: 'loop5' (ffff8880a4ad9360): kobject_uevent_env ---[ end trace a873c34a13e845f9 ]--- kobject: 'loop5' (ffff8880a4ad9360): fill_kobj_path: path = '/devices/virtual/block/loop5'