MINIX-fs: mounting file system with errors, running fsck is recommended kasan: GPF could be caused by NULL-ptr deref or user memory access minix_free_inode: bit 1 already cleared general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 8483 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181107+ #107 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:locks_remove_flock+0x216/0x350 fs/locks.c:2567 Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 RSP: 0018:ffff880187edf880 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffc90006591000 RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb RBP: ffff880187edfa60 R08: ffff88018a6d4600 R09: ffffed003b5c5b67 R10: ffffed003b5c5b67 R11: ffff8801dae2db3b R12: ffff8801bb23ea40 R13: ffff880187edf8f8 R14: 1ffff10030fdbf13 R15: dffffc0000000000 FS: 00007f5fa86aa700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b32128000 CR3: 00000001d3883000 CR4: 00000000001406f0 Call Trace: locks_remove_file+0x148/0x5c0 fs/locks.c:2607 __fput+0x2f0/0xa70 fs/file_table.c:271 ____fput+0x15/0x20 fs/file_table.c:312 task_work_run+0x1e8/0x2a0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:188 [inline] exit_to_usermode_loop+0x318/0x380 arch/x86/entry/common.c:166 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457569 Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f5fa86a9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000457569 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5fa86aa6d4 R13: 00000000004efe32 R14: 00000000004cc6e0 R15: 00000000ffffffff Modules linked in: kobject: 'loop3' (000000002cc954f8): kobject_uevent_env kobject: 'loop3' (000000002cc954f8): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (000000001ff017a9): kobject_uevent_env kobject: 'loop1' (000000001ff017a9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (0000000027ab3e9d): kobject_uevent_env kobject: 'loop0' (0000000027ab3e9d): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (0000000006a19550): kobject_uevent_env kobject: 'loop4' (0000000006a19550): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (000000002cc954f8): kobject_uevent_env kobject: 'loop3' (000000002cc954f8): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (0000000043b933af): kobject_uevent_env ---[ end trace 08a1266d17ca5aba ]--- kobject: 'loop5' (0000000043b933af): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (000000002cc954f8): kobject_uevent_env kobject: 'loop3' (000000002cc954f8): fill_kobj_path: path = '/devices/virtual/block/loop3' kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access kobject: 'loop1' (000000001ff017a9): kobject_uevent_env kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access kobject: 'loop1' (000000001ff017a9): fill_kobj_path: path = '/devices/virtual/block/loop1' general protection fault: 0000 [#2] PREEMPT SMP KASAN CPU: 1 PID: 8521 Comm: syz-executor2 Tainted: G D 4.20.0-rc1-next-20181107+ #107 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:locks_remove_flock+0x216/0x350 fs/locks.c:2567 Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 RSP: 0018:ffff880186747880 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffc90006792000 RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb RBP: ffff880186747a60 R08: ffff8801cda14540 R09: 00000000bca5fffb R10: 00000000a8936d98 R11: ffff8801cda14540 R12: ffff8801cc18c2c0 R13: ffff8801867478f8 R14: 1ffff10030ce8f13 R15: dffffc0000000000 FS: 00007f5fa8689700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000070c1b4 CR3: 00000001d3883000 CR4: 00000000001406e0 Call Trace: locks_remove_file+0x148/0x5c0 fs/locks.c:2607 __fput+0x2f0/0xa70 fs/file_table.c:271 ____fput+0x15/0x20 fs/file_table.c:312 task_work_run+0x1e8/0x2a0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:188 [inline] exit_to_usermode_loop+0x318/0x380 arch/x86/entry/common.c:166 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457569 Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f5fa8688c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000457569 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5fa86896d4 R13: 00000000004efe32 R14: 00000000004cc6e0 R15: 00000000ffffffff Modules linked in: kobject: 'loop0' (0000000027ab3e9d): kobject_uevent_env kobject: 'loop0' (0000000027ab3e9d): fill_kobj_path: path = '/devices/virtual/block/loop0' RIP: 0010:locks_remove_flock+0x216/0x350 fs/locks.c:2567 Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 RSP: 0018:ffff880187edf880 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffc90006591000 RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb RBP: ffff880187edfa60 R08: ffff88018a6d4600 R09: ffffed003b5c5b67 R10: ffffed003b5c5b67 R11: ffff8801dae2db3b R12: ffff8801bb23ea40 R13: ffff880187edf8f8 R14: 1ffff10030fdbf13 R15: dffffc0000000000 FS: 00007f5fa86aa700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2c2b691000 CR3: 00000001d3883000 CR4: 00000000001406e0