ubi0: VID header offset: 64 (aligned 64), data offset: 128 ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 general protection fault: 0000 [#1] PREEMPT SMP KASAN ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 1941875527 Modules linked in: CPU: 0 PID: 7583 Comm: kworker/0:4 Not tainted 4.14.181-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: krxrpcd rxrpc_process_call ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 task: ffff888092d6c500 task.stack: ffff888066810000 RIP: 0010:__read_once_size include/linux/compiler.h:183 [inline] RIP: 0010:atomic_read arch/x86/include/asm/atomic.h:27 [inline] RIP: 0010:refcount_read include/linux/refcount.h:42 [inline] RIP: 0010:rxrpc_get_skb+0x5e/0x350 net/rxrpc/skbuff.c:52 RSP: 0018:ffff888066817c50 EFLAGS: 00010203 ubi0: background thread "ubi_bgt0d" started, PID 5344 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 000000000000001c RSI: 000000000000000a RDI: 00000000000000e4 RBP: 000000000000000a R08: 0000000000002b78 R09: ffffffff89e6a500 R10: ffff888092d6cdd8 R11: ffff888092d6c500 R12: 0000000000000000 R13: ffff8880672bbe50 R14: ffffffff8ae477a0 R15: ffff8880672bbd18 FS: 0000000000000000(0000) GS:ffff8880aec00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b30b3b000 CR3: 0000000061cac000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rxrpc_resend net/rxrpc/call_event.c:319 [inline] rxrpc_process_call+0x78c/0x1147 net/rxrpc/call_event.c:407 process_one_work+0x7c0/0x14c0 kernel/workqueue.c:2116 worker_thread+0x5d7/0x1080 kernel/workqueue.c:2250 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Code: c0 60 77 e4 8a 4c 0f 46 f0 e8 af c1 9f fb f0 45 0f c1 26 48 8d bb e4 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 RIP: __read_once_size include/linux/compiler.h:183 [inline] RSP: ffff888066817c50 RIP: atomic_read arch/x86/include/asm/atomic.h:27 [inline] RSP: ffff888066817c50 RIP: refcount_read include/linux/refcount.h:42 [inline] RSP: ffff888066817c50 RIP: rxrpc_get_skb+0x5e/0x350 net/rxrpc/skbuff.c:52 RSP: ffff888066817c50 ---[ end trace d97db98c90ada844 ]---