netlink: 1092 bytes leftover after parsing attributes in process `syz-executor.3'. audit: type=1800 audit(1616062218.798:304): pid=3295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="loop0" ino=128 res=0 INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 1 PID: 3316 Comm: syz-executor.4 Not tainted 4.19.181-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 assign_lock_key kernel/locking/lockdep.c:727 [inline] register_lock_class+0xe76/0x11c0 kernel/locking/lockdep.c:753 __lock_acquire+0x17d/0x3ff0 kernel/locking/lockdep.c:3303 lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3907 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x8c/0xc0 kernel/locking/spinlock.c:152 skb_dequeue+0x1c/0x180 net/core/skbuff.c:2834 skb_queue_purge+0x21/0x30 net/core/skbuff.c:2872 l2cap_chan_del+0x690/0xa50 net/bluetooth/l2cap_core.c:637 l2cap_chan_close+0x1b5/0x950 net/bluetooth/l2cap_core.c:757 l2cap_sock_shutdown+0x339/0xe10 net/bluetooth/l2cap_sock.c:1159 l2cap_sock_release+0x77/0x290 net/bluetooth/l2cap_sock.c:1202 __sock_release+0xcd/0x2a0 net/socket.c:579 sock_close+0x15/0x20 net/socket.c:1140 __fput+0x2ce/0x890 fs/file_table.c:278 task_work_run+0x148/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x41927b Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 RSP: 002b:00007fff0d4cca00 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000005 RCX: 000000000041927b RDX: ffffffffffffffbc RSI: 0000000008c9f276 RDI: 0000000000000004 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b31f22128 R10: 00007fff0d4ccaf0 R11: 0000000000000293 R12: 00000000000ba92e R13: 00000000000003e8 R14: 000000000056bf60 R15: 00000000000ba90d netlink: 1092 bytes leftover after parsing attributes in process `syz-executor.3'. loop5: p1 < > p2 p3 < p5 p6 > p4 loop5: p2 size 1073741824 extends beyond EOD, truncated loop5: p5 size 1073741824 extends beyond EOD, truncated netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. MTD: Attempt to mount non-MTD device "/dev/loop0" romfs: Mounting image 'rom 5f663c08' through the block layer audit: type=1800 audit(1616062219.528:305): pid=3344 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="loop0" ino=128 res=0 loop5: p1 < > p2 p3 < p5 p6 > p4 loop5: p2 size 1073741824 extends beyond EOD, truncated loop0: p1 < > p2 p3 < p5 p6 > p4 loop0: p2 size 1073741824 extends beyond EOD, truncated loop5: p5 size 1073741824 extends beyond EOD, truncated loop0: p5 size 1073741824 extends beyond EOD, truncated loop0: p1 < > p2 p3 < p5 p6 > p4 loop5: p1 < > p2 p3 < p5 p6 > p4 loop0: p2 size 1073741824 extends beyond EOD, truncated loop5: p2 size 1073741824 extends beyond EOD, truncated loop0: p5 size 1073741824 extends beyond EOD, truncated loop5: p5 size 1073741824 extends beyond EOD, truncated loop0: p1 < > p2 p3 < p5 p6 > p4 loop0: p2 size 1073741824 extends beyond EOD, truncated loop5: p1 < > p2 p3 < p5 p6 > p4 loop5: p2 size 1073741824 extends beyond EOD, truncated loop0: p5 size 1073741824 extends beyond EOD, truncated loop0: p1 < > p2 p3 < p5 p6 > p4 loop5: p5 size 1073741824 extends beyond EOD, truncated loop0: p2 size 1073741824 extends beyond EOD, truncated loop0: p5 size 1073741824 extends beyond EOD, truncated x_tables: eb_tables: redirect.0 target: invalid size 8 (kernel) != (user) 0 EXT4-fs error (device loop4): ext4_fill_super:4446: inode #2: comm syz-executor.4: iget: bogus i_mode (0) EXT4-fs (loop4): get root inode failed EXT4-fs (loop4): mount failed EXT4-fs error (device loop4): ext4_fill_super:4446: inode #2: comm syz-executor.4: iget: bogus i_mode (0) EXT4-fs (loop4): get root inode failed EXT4-fs (loop4): mount failed EXT4-fs error (device loop4): ext4_fill_super:4446: inode #2: comm syz-executor.4: iget: bogus i_mode (0) EXT4-fs (loop4): get root inode failed EXT4-fs (loop4): mount failed EXT4-fs error (device loop4): ext4_fill_super:4446: inode #2: comm syz-executor.4: iget: bogus i_mode (0) EXT4-fs (loop4): get root inode failed EXT4-fs (loop4): mount failed EXT4-fs error (device loop4): ext4_fill_super:4446: inode #2: comm syz-executor.4: iget: bogus i_mode (0) EXT4-fs (loop4): get root inode failed EXT4-fs (loop4): mount failed ubi0: attaching mtd0 ubi0: scanning is finished ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 ubi0: VID header offset: 64 (aligned 64), data offset: 128 ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 ubi0: max/mean erase counter: 2/1, WL threshold: 4096, image sequence number: 2594597186 audit: type=1326 audit(1616062228.648:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3867 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x465f69 code=0x7ffc0000 ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 md: md0 has zero or unknown size, marking faulty! ubi0: background thread "ubi_bgt0d" started, PID 3863 ubi0: detaching mtd0 md: md_import_device returned -22 md: md0 has zero or unknown size, marking faulty! audit: type=1326 audit(1616062228.648:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3867 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=298 compat=0 ip=0x465f69 code=0x7ffc0000 md: md_import_device returned -22 ubi0: mtd0 is detached ubi0: attaching mtd0 ubi0: scanning is finished audit: type=1326 audit(1616062228.648:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3867 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x465f69 code=0x7ffc0000 audit: type=1326 audit(1616062228.648:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3867 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=319 compat=0 ip=0x465f69 code=0x7ffc0000 audit: type=1326 audit(1616062228.648:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3867 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=77 compat=0 ip=0x465f27 code=0x7ffc0000 ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4