================================================================================ UBSAN: Undefined behaviour in fs/ext4/super.c:3763:25 shift exponent 102760449 is too large for 32-bit type 'int' CPU: 1 PID: 15943 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 ubsan_epilogue+0xe/0x3a lib/ubsan.c:161 __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 lib/ubsan.c:422 ext4_fill_super.cold+0x33b/0x4ea fs/ext4/super.c:3763 mount_bdev+0x2fc/0x3b0 fs/super.c:1158 mount_fs+0xa3/0x318 fs/super.c:1261 vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2469 [inline] do_mount+0x51c/0x2f10 fs/namespace.c:2799 ksys_mount+0xcf/0x130 fs/namespace.c:3015 __do_sys_mount fs/namespace.c:3029 [inline] __se_sys_mount fs/namespace.c:3026 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3026 do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4608aa Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 RSP: 002b:00007f930ff9ea88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f930ff9eb20 RCX: 00000000004608aa RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f930ff9eae0 RBP: 00007f930ff9eae0 R08: 00007f930ff9eb20 R09: 0000000020000000 R10: 0000000000008000 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000040 R14: 0000000020000140 R15: 0000000020000080 ================================================================================ FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 15947 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x2f lib/fault-inject.c:149 __should_failslab+0x153/0x1b6 mm/failslab.c:32 should_failslab+0x5/0xf mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2b1/0x4a0 mm/slab.c:3557 __d_alloc+0x2b/0xa20 fs/dcache.c:1612 d_alloc+0x4a/0x230 fs/dcache.c:1696 d_alloc_parallel+0xeb/0x1b70 fs/dcache.c:2443 __lookup_slow+0x18d/0x4a0 fs/namei.c:1655 lookup_slow fs/namei.c:1689 [inline] walk_component+0x7ac/0xda0 fs/namei.c:1811 lookup_last fs/namei.c:2274 [inline] path_lookupat+0x1ff/0x8d0 fs/namei.c:2319 filename_lookup+0x1ac/0x5a0 fs/namei.c:2349 unix_find_other+0xd1/0x5c0 net/unix/af_unix.c:930 unix_dgram_sendmsg+0x8e5/0x12c0 net/unix/af_unix.c:1732 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xc7/0x130 net/socket.c:632 ___sys_sendmsg+0x3b3/0x8f0 net/socket.c:2115 __sys_sendmmsg+0x195/0x470 net/socket.c:2210 __do_sys_sendmmsg net/socket.c:2239 [inline] __se_sys_sendmmsg net/socket.c:2236 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2236 do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45de59 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fcb4f67fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 RDX: 0000000000000002 RSI: 0000000020008600 RDI: 0000000000000005 RBP: 00007fcb4f67fca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00007fff228d41cf R14: 00007fcb4f6809c0 R15: 000000000118bf2c FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem CPU: 1 PID: 16027 Comm: syz-executor.5 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x2f lib/fault-inject.c:149 __should_failslab+0x153/0x1b6 mm/failslab.c:32 should_failslab+0x5/0xf mm/slab_common.c:1588 EXT4-fs (loop2): Invalid log block size: 102760449 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2b1/0x4a0 mm/slab.c:3557 getname_flags+0xce/0x590 fs/namei.c:140 getname fs/namei.c:211 [inline] user_path_mountpoint_at+0x23/0x40 fs/namei.c:2748 ksys_umount+0x156/0x10e0 fs/namespace.c:1645 __do_sys_umount fs/namespace.c:1671 [inline] __se_sys_umount fs/namespace.c:1669 [inline] __x64_sys_umount+0x50/0x70 fs/namespace.c:1669 do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45de59 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f935df0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: ffffffffffffffda RBX: 0000000000038080 RCX: 000000000045de59 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 00007f935df0eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc781673df R14: 00007f935df0f9c0 R15: 000000000118bf2c EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 16070 Comm: syz-executor.5 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x2f lib/fault-inject.c:149 EXT4-fs (loop2): Invalid log block size: 102760449 should_fail_alloc_page mm/page_alloc.c:3088 [inline] prepare_alloc_pages mm/page_alloc.c:4346 [inline] __alloc_pages_nodemask+0x256/0x2a60 mm/page_alloc.c:4393 __alloc_pages include/linux/gfp.h:496 [inline] __alloc_pages_node include/linux/gfp.h:509 [inline] kmem_getpages mm/slab.c:1412 [inline] cache_grow_begin+0xa1/0x9b0 mm/slab.c:2682 cache_alloc_refill+0x2aa/0x410 mm/slab.c:3049 ____cache_alloc mm/slab.c:3132 [inline] __do_cache_alloc mm/slab.c:3354 [inline] slab_alloc mm/slab.c:3389 [inline] kmem_cache_alloc+0x3b4/0x4a0 mm/slab.c:3557 getname_flags+0xce/0x590 fs/namei.c:140 getname fs/namei.c:211 [inline] user_path_mountpoint_at+0x23/0x40 fs/namei.c:2748 ksys_umount+0x156/0x10e0 fs/namespace.c:1645 __do_sys_umount fs/namespace.c:1671 [inline] __se_sys_umount fs/namespace.c:1669 [inline] __x64_sys_umount+0x50/0x70 fs/namespace.c:1669 do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45de59 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f935df0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: ffffffffffffffda RBX: 0000000000038080 RCX: 000000000045de59 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 00007f935df0eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffc781673df R14: 00007f935df0f9c0 R15: 000000000118bf2c IPVS: ftp: loaded support on port[0] = 21 EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 16144 Comm: syz-executor.5 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x2f lib/fault-inject.c:149 __should_failslab+0x153/0x1b6 mm/failslab.c:32 should_failslab+0x5/0xf mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x2b6/0x4b0 mm/slab.c:3623 kmalloc include/linux/slab.h:515 [inline] kzalloc include/linux/slab.h:709 [inline] kobject_uevent_env+0x255/0x1390 lib/kobject_uevent.c:521 device_del+0x693/0xa30 drivers/base/core.c:2340 device_unregister+0x11/0x30 drivers/base/core.c:2362 bdi_unregister+0x482/0x650 mm/backing-dev.c:949 IPVS: ftp: loaded support on port[0] = 21 release_bdi mm/backing-dev.c:965 [inline] kref_put include/linux/kref.h:70 [inline] bdi_put+0x141/0x170 mm/backing-dev.c:974 generic_shutdown_super+0x2aa/0x370 fs/super.c:470 kill_anon_super+0x36/0x60 fs/super.c:1032 deactivate_locked_super+0x8c/0x100 fs/super.c:329 deactivate_super+0x174/0x1a0 fs/super.c:360 cleanup_mnt+0x1da/0x300 fs/namespace.c:1098 task_work_run+0x141/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x269/0x2c0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x57c/0x670 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45de59 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f935df0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: 0000000000000000 RBX: 0000000000038080 RCX: 000000000045de59 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 00007f935df0eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffc781673df R14: 00007f935df0f9c0 R15: 000000000118bf2c EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 FAT-fs (loop3): Unrecognized mount option "fmask=004000000000000000 ¼I0000" or missing value EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAT-fs (loop3): Unrecognized mount option "fmask=004000000000000000 ¼I0000" or missing value CPU: 0 PID: 16216 Comm: syz-executor.5 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x2f lib/fault-inject.c:149 __should_failslab+0x153/0x1b6 mm/failslab.c:32 should_failslab+0x5/0xf mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x2dd/0x4f0 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] kzalloc include/linux/slab.h:709 [inline] kobject_get_path+0xc1/0x1c0 lib/kobject.c:171 kobject_uevent_env+0x27a/0x1390 lib/kobject_uevent.c:526 device_del+0x693/0xa30 drivers/base/core.c:2340 device_unregister+0x11/0x30 drivers/base/core.c:2362 bdi_unregister+0x482/0x650 mm/backing-dev.c:949 release_bdi mm/backing-dev.c:965 [inline] kref_put include/linux/kref.h:70 [inline] bdi_put+0x141/0x170 mm/backing-dev.c:974 generic_shutdown_super+0x2aa/0x370 fs/super.c:470 kill_anon_super+0x36/0x60 fs/super.c:1032 deactivate_locked_super+0x8c/0x100 fs/super.c:329 deactivate_super+0x174/0x1a0 fs/super.c:360 cleanup_mnt+0x1da/0x300 fs/namespace.c:1098 task_work_run+0x141/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x269/0x2c0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x57c/0x670 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45de59 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f935df0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: 0000000000000000 RBX: 0000000000038080 RCX: 000000000045de59 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 00007f935df0eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 R13: 00007ffc781673df R14: 00007f935df0f9c0 R15: 000000000118bf2c EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 Bluetooth: hci0: command 0x0406 tx timeout Bluetooth: hci1: command 0x0406 tx timeout FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 Bluetooth: hci5: command 0x0406 tx timeout CPU: 0 PID: 16277 Comm: syz-executor.5 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x2f lib/fault-inject.c:149 __should_failslab+0x153/0x1b6 mm/failslab.c:32 should_failslab+0x5/0xf mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node_trace+0x244/0x4d0 mm/slab.c:3666 __do_kmalloc_node mm/slab.c:3688 [inline] __kmalloc_node_track_caller+0x38/0x70 mm/slab.c:3703 __kmalloc_reserve net/core/skbuff.c:137 [inline] __alloc_skb+0xae/0x580 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:995 [inline] alloc_uevent_skb+0x7b/0x210 lib/kobject_uevent.c:288 uevent_net_broadcast_untagged lib/kobject_uevent.c:324 [inline] kobject_uevent_net_broadcast lib/kobject_uevent.c:406 [inline] kobject_uevent_env+0x94f/0x1390 lib/kobject_uevent.c:590 device_del+0x693/0xa30 drivers/base/core.c:2340 device_unregister+0x11/0x30 drivers/base/core.c:2362 bdi_unregister+0x482/0x650 mm/backing-dev.c:949 release_bdi mm/backing-dev.c:965 [inline] kref_put include/linux/kref.h:70 [inline] bdi_put+0x141/0x170 mm/backing-dev.c:974 generic_shutdown_super+0x2aa/0x370 fs/super.c:470 kill_anon_super+0x36/0x60 fs/super.c:1032 deactivate_locked_super+0x8c/0x100 fs/super.c:329 deactivate_super+0x174/0x1a0 fs/super.c:360 cleanup_mnt+0x1da/0x300 fs/namespace.c:1098 task_work_run+0x141/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x269/0x2c0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x57c/0x670 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45de59 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f935df0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: 0000000000000000 RBX: 0000000000038080 RCX: 000000000045de59 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 00007f935df0eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 R13: 00007ffc781673df R14: 00007f935df0f9c0 R15: 000000000118bf2c Bluetooth: hci2: command 0x0406 tx timeout Bluetooth: hci3: command 0x0406 tx timeout Bluetooth: hci4: command 0x0406 tx timeout EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 16321 Comm: syz-executor.5 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x2f lib/fault-inject.c:149 __should_failslab+0x153/0x1b6 mm/failslab.c:32 should_failslab+0x5/0xf mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node_trace+0x244/0x4d0 mm/slab.c:3666 __do_kmalloc_node mm/slab.c:3688 [inline] __kmalloc_node_track_caller+0x38/0x70 mm/slab.c:3703 __kmalloc_reserve net/core/skbuff.c:137 [inline] __alloc_skb+0xae/0x580 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:995 [inline] alloc_uevent_skb+0x7b/0x210 lib/kobject_uevent.c:288 uevent_net_broadcast_untagged lib/kobject_uevent.c:324 [inline] kobject_uevent_net_broadcast lib/kobject_uevent.c:406 [inline] kobject_uevent_env+0x94f/0x1390 lib/kobject_uevent.c:590 device_del+0x693/0xa30 drivers/base/core.c:2340 device_unregister+0x11/0x30 drivers/base/core.c:2362 bdi_unregister+0x482/0x650 mm/backing-dev.c:949 release_bdi mm/backing-dev.c:965 [inline] kref_put include/linux/kref.h:70 [inline] bdi_put+0x141/0x170 mm/backing-dev.c:974 generic_shutdown_super+0x2aa/0x370 fs/super.c:470 kill_anon_super+0x36/0x60 fs/super.c:1032 deactivate_locked_super+0x8c/0x100 fs/super.c:329 deactivate_super+0x174/0x1a0 fs/super.c:360 cleanup_mnt+0x1da/0x300 fs/namespace.c:1098 task_work_run+0x141/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x269/0x2c0 arch/x86/entry/common.c:167 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x57c/0x670 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45de59 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f935df0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: 0000000000000000 RBX: 0000000000038080 RCX: 000000000045de59 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 00007f935df0eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00007ffc781673df R14: 00007f935df0f9c0 R15: 000000000118bf2c EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. EXT4-fs (loop2): Invalid log block size: 102760449 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 FAT-fs (loop3): Unrecognized mount option "iocharset¶òoÁírU ´" or missing value FAT-fs (loop3): Unrecognized mount option "iocharset¶òoÁírU ´" or missing value EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop2): Invalid log block size: 102760449 nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem