XFS (loop3): Invalid superblock magic number ============================= WARNING: suspicious RCU usage 4.19.0-rc5-next-20180925+ #80 Not tainted ----------------------------- include/net/inet_sock.h:136 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor0/9065: #0: 00000000d1ebf5cf (sk_lock-AF_INET6){+.+.}, at: lock_sock include/net/sock.h:1492 [inline] #0: 00000000d1ebf5cf (sk_lock-AF_INET6){+.+.}, at: dccp_ioctl+0x23/0x170 net/dccp/proto.c:376 stack backtrace: CPU: 1 PID: 9065 Comm: syz-executor0 Not tainted 4.19.0-rc5-next-20180925+ #80 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4536 ireq_opt_deref include/net/inet_sock.h:135 [inline] inet_csk_route_req+0x977/0xde0 net/ipv4/inet_connection_sock.c:547 dccp_v4_send_response+0xb4/0x6d0 net/dccp/ipv4.c:485 dccp_v4_conn_request+0xc81/0x1390 net/dccp/ipv4.c:634 dccp_v6_conn_request+0xdb9/0x1660 net/dccp/ipv6.c:317 dccp_rcv_state_process+0x6f7/0x1a32 net/dccp/input.c:612 dccp_v4_do_rcv+0x102/0x180 net/dccp/ipv4.c:683 dccp_v6_do_rcv+0x99d/0xbf0 net/dccp/ipv6.c:579 sk_backlog_rcv include/net/sock.h:932 [inline] __release_sock+0x12a/0x3a0 net/core/sock.c:2336 release_sock+0xad/0x2c0 net/core/sock.c:2849 dccp_ioctl+0x129/0x170 net/dccp/proto.c:402 inet6_ioctl+0x1b0/0x1f0 net/ipv6/af_inet6.c:554 sock_do_ioctl+0xeb/0x420 net/socket.c:951 sock_ioctl+0x313/0x690 net/socket.c:1075 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0x1de/0x1720 fs/ioctl.c:685 ksys_ioctl+0xa9/0xd0 fs/ioctl.c:702 __do_sys_ioctl fs/ioctl.c:709 [inline] __se_sys_ioctl fs/ioctl.c:707 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:707 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f591b90ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 RDX: 0000000020000040 RSI: 0000000000008905 RDI: 0000000000000008 RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f591b90f6d4 R13: 00000000004c9600 R14: 00000000004d3060 R15: 00000000ffffffff ============================= WARNING: suspicious RCU usage 4.19.0-rc5-next-20180925+ #80 Not tainted ----------------------------- include/net/inet_sock.h:136 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor0/9065: #0: 00000000d1ebf5cf (sk_lock-AF_INET6){+.+.}, at: lock_sock include/net/sock.h:1492 [inline] #0: 00000000d1ebf5cf (sk_lock-AF_INET6){+.+.}, at: dccp_ioctl+0x23/0x170 net/dccp/proto.c:376 stack backtrace: CPU: 1 PID: 9065 Comm: syz-executor0 Not tainted 4.19.0-rc5-next-20180925+ #80 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4536 ireq_opt_deref include/net/inet_sock.h:135 [inline] dccp_v4_send_response+0x537/0x6d0 net/dccp/ipv4.c:496 dccp_v4_conn_request+0xc81/0x1390 net/dccp/ipv4.c:634 dccp_v6_conn_request+0xdb9/0x1660 net/dccp/ipv6.c:317 dccp_rcv_state_process+0x6f7/0x1a32 net/dccp/input.c:612 dccp_v4_do_rcv+0x102/0x180 net/dccp/ipv4.c:683 dccp_v6_do_rcv+0x99d/0xbf0 net/dccp/ipv6.c:579 sk_backlog_rcv include/net/sock.h:932 [inline] __release_sock+0x12a/0x3a0 net/core/sock.c:2336 release_sock+0xad/0x2c0 net/core/sock.c:2849 dccp_ioctl+0x129/0x170 net/dccp/proto.c:402 inet6_ioctl+0x1b0/0x1f0 net/ipv6/af_inet6.c:554 sock_do_ioctl+0xeb/0x420 net/socket.c:951 sock_ioctl+0x313/0x690 net/socket.c:1075 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0x1de/0x1720 fs/ioctl.c:685 ksys_ioctl+0xa9/0xd0 fs/ioctl.c:702 __do_sys_ioctl fs/ioctl.c:709 [inline] __se_sys_ioctl fs/ioctl.c:707 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:707 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f591b90ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 RDX: 0000000020000040 RSI: 0000000000008905 RDI: 0000000000000008 RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f591b90f6d4 R13: 00000000004c9600 R14: 00000000004d3060 R15: 00000000ffffffff XFS (loop3): Invalid superblock magic number syz-executor2 (9095): /proc/9092/oom_adj is deprecated, please use /proc/9092/oom_score_adj instead. 9pnet: Insufficient options for proto=fd Unknown ioctl 21505 Unknown ioctl 21505 (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 *** Guest State *** CR0: actual=0x0000000000050037, shadow=0x0000000000050037, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x0000000000000000 RSP = 0x0000000000000f80 RIP = 0x0000000000000014 RFLAGS=0x00000002 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 CS: sel=0x0023, attr=0x000fb, limit=0x0000ffff, base=0x0000000000000000 DS: sel=0x002b, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 SS: sel=0x002b, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 ES: sel=0x002b, attr=0x000f1, limit=0x0000ffff, base=0x0000000000000000 FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 GDTR: limit=0x000007ff, base=0x0000000000001000 LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 IDTR: limit=0x000001ff, base=0x0000000000003800 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000000001 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811f40e7 RSP = 0xffff8801b927f350 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f1f59517700 GSBase=ffff8801dad00000 TRBase=fffffe0000033000 GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 CR0=0000000080050033 CR3=00000001c7cd9000 CR4=00000000001426e0 Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87e01360 EFER = 0x0000000000000d01 PAT = 0x0407050600070106 *** Control State *** PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca EntryControls=0000d1ff ExitControls=002fefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000007 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffff7357e6df7e EPT pointer = 0x00000001ce6d301e *** Guest State *** CR0: actual=0x0000000000050037, shadow=0x0000000000050037, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x0000000000000000 RSP = 0x0000000000000f80 RIP = 0x0000000000000014 RFLAGS=0x00000002 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 CS: sel=0x0023, attr=0x000fb, limit=0x0000ffff, base=0x0000000000000000 DS: sel=0x002b, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 SS: sel=0x002b, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 ES: sel=0x002b, attr=0x000f1, limit=0x0000ffff, base=0x0000000000000000 FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 GDTR: limit=0x000007ff, base=0x0000000000001000 LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 IDTR: limit=0x000001ff, base=0x0000000000003800 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000000001 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811f40e7 RSP = 0xffff88018e7c7350 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f1f59472700 GSBase=ffff8801dad00000 TRBase=fffffe0000003000 GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 CR0=0000000080050033 CR3=00000001c7cd9000 CR4=00000000001426e0 Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87e01360 EFER = 0x0000000000000d01 PAT = 0x0407050600070106 *** Control State *** PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca EntryControls=0000d1ff ExitControls=002fefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000007 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffff7357e6df7e EPT pointer = 0x00000001ce6d301e 9pnet_virtio: no channels available for device selinux 9pnet_virtio: no channels available for device selinux raw_sendmsg: syz-executor2 forgot to set AF_INET. Fix it! input:  as /devices/virtual/input/input5 XFS (loop5): unknown mount option [·µ–_^véú.m–ŽŒéE]. XFS (loop5): unknown mount option [·µ–_^véú.m–ŽŒéE]. input:  as /devices/virtual/input/input6 ********************************************************** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** ** ** trace_printk() being used. Allocating extra memory. ** ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. ** ** ** ** If you see this message and you are not debugging ** ** the kernel, report this immediately to your vendor! ** ** ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ********************************************************** input:  as /devices/virtual/input/input7 REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "" REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option ""