loop0: detected capacity change from 0 to 32768
------------[ cut here ]------------
DEBUG_LOCKS_WARN_ON(__owner_task(owner) != get_current())
WARNING: CPU: 1 PID: 3059 at kernel/locking/mutex.c:918 __mutex_unlock_slowpath+0xd8/0x1cc kernel/locking/mutex.c:918
Modules linked in:
CPU: 1 PID: 3059 Comm: syz-executor219 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __mutex_unlock_slowpath+0xd8/0x1cc kernel/locking/mutex.c:918
lr : __mutex_unlock_slowpath+0xd8/0x1cc kernel/locking/mutex.c:918
sp : ffff800012a235f0
x29: ffff800012a23610 x28: ffff0000cadfa000 x27: 0000000000000001
x26: ffff80000d30c000 x25: ffff0000c6a00000 x24: ffff80000ee2b000
x23: ffff80000cb542e5 x22: ffff80000cb5430a x21: ffff80000cb4f71b
x20: ffff0000c69fffff x19: ffff0000cac26c50 x18: fffffffffffffff5
x17: ffff80000dd0b198 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000000012 x12: ffff80000d5ef920
x11: ff808000081c0d5c x10: 0000000000000000 x9 : 8e92b9cb1a3ef300
x8 : 8e92b9cb1a3ef300 x7 : 4e5241575f534b43 x6 : ffff80000819545c
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000100000000 x0 : 0000000000000039
Call trace:
__mutex_unlock_slowpath+0xd8/0x1cc kernel/locking/mutex.c:918
mutex_unlock+0x24/0x30 kernel/locking/mutex.c:543
dbAllocBits+0x364/0x3b0 fs/jfs/jfs_dmap.c:2225
dbAllocDmap+0x44/0xd0 fs/jfs/jfs_dmap.c:1999
dbAllocNext+0x280/0x290 fs/jfs/jfs_dmap.c:1152
dbAlloc+0x200/0x694 fs/jfs/jfs_dmap.c:786
extBalloc+0xd0/0x368 fs/jfs/jfs_extent.c:321
extAlloc+0x16c/0x384 fs/jfs/jfs_extent.c:122
jfs_get_block+0x1b4/0x3ec fs/jfs/inode.c:248
__block_write_begin_int+0x240/0x95c fs/buffer.c:2006
__block_write_begin fs/buffer.c:2056 [inline]
block_write_begin+0x74/0x14c fs/buffer.c:2117
jfs_write_begin+0x44/0x88 fs/jfs/inode.c:304
generic_perform_write+0xf0/0x2cc mm/filemap.c:3738
__generic_file_write_iter+0xd8/0x21c mm/filemap.c:3866
generic_file_write_iter+0x6c/0x168 mm/filemap.c:3898
do_iter_write+0x318/0x560 fs/read_write.c:855
vfs_writev fs/read_write.c:928 [inline]
do_pwritev+0x130/0x1e8 fs/read_write.c:1025
__do_sys_pwritev fs/read_write.c:1072 [inline]
__se_sys_pwritev fs/read_write.c:1067 [inline]
__arm64_sys_pwritev+0x28/0x38 fs/read_write.c:1067
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]
el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206
el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581
irq event stamp: 23579
hardirqs last enabled at (23579): [<ffff80000bfc8a34>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last enabled at (23579): [<ffff80000bfc8a34>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (23578): [<ffff80000bfc8834>] __raw_spin_lock_irq include/linux/spinlock_api_smp.h:117 [inline]
hardirqs last disabled at (23578): [<ffff80000bfc8834>] _raw_spin_lock_irq+0x34/0x9c kernel/locking/spinlock.c:170
softirqs last enabled at (21660): [<ffff8000080102e4>] _stext+0x2e4/0x37c
softirqs last disabled at (21411): [<ffff800008017c14>] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79
---[ end trace 0000000000000000 ]---
Unable to handle kernel paging request at virtual address ffff80000d272a70
Mem abort info:
ESR = 0x0000000096000047
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x07: level 3 translation fault
Data abort info:
ISV = 0, ISS = 0x00000047
CM = 0, WnR = 1
swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001c566b000
[ffff80000d272a70] pgd=100000023ffff003, p4d=100000023ffff003, pud=100000023fffe003, pmd=100000023fffa003, pte=0000000000000000
Internal error: Oops: 0000000096000047 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 3059 Comm: syz-executor219 Tainted: G W 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : queued_spin_lock_slowpath+0x198/0x380 kernel/locking/qspinlock.c:474
lr : queued_spin_lock_slowpath+0x114/0x380 kernel/locking/qspinlock.c:405
sp : ffff800012a23560
x29: ffff800012a23560 x28: ffff0000cadfa000 x27: 0000000000000001
x26: ffff80000d30c000 x25: ffff0000c6a00000 x24: ffff0001fefefa40
x23: 0000000000000000 x22: ffff80000d30cf28 x21: ffff80000d272a40
x20: 0000000000000001 x19: ffff0000cac26c58 x18: fffffffffffffff5
x17: ffff80000dd0b198 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000000 x13: 000000000000ffff x12: 0000000000000000
x11: ffff80000d272a70 x10: 0000000000080000 x9 : ffff0001fefefa48
x8 : ffff0001fefefa40 x7 : 0000000000000000 x6 : ffff80000bfc2310
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000001 x1 : ffff80000ce26a7f x0 : 0000000000000001
Call trace:
decode_tail kernel/locking/qspinlock.c:131 [inline]
queued_spin_lock_slowpath+0x198/0x380 kernel/locking/qspinlock.c:471
queued_spin_lock include/asm-generic/qspinlock.h:114 [inline]
do_raw_spin_lock+0x10c/0x110 kernel/locking/spinlock_debug.c:115
__raw_spin_lock include/linux/spinlock_api_smp.h:134 [inline]
_raw_spin_lock+0x5c/0x6c kernel/locking/spinlock.c:154
__mutex_unlock_slowpath+0x138/0x1cc kernel/locking/mutex.c:932
mutex_unlock+0x24/0x30 kernel/locking/mutex.c:543
dbAllocBits+0x364/0x3b0 fs/jfs/jfs_dmap.c:2225
dbAllocDmap+0x44/0xd0 fs/jfs/jfs_dmap.c:1999
dbAllocNext+0x280/0x290 fs/jfs/jfs_dmap.c:1152
dbAlloc+0x200/0x694 fs/jfs/jfs_dmap.c:786
extBalloc+0xd0/0x368 fs/jfs/jfs_extent.c:321
extAlloc+0x16c/0x384 fs/jfs/jfs_extent.c:122
jfs_get_block+0x1b4/0x3ec fs/jfs/inode.c:248
__block_write_begin_int+0x240/0x95c fs/buffer.c:2006
__block_write_begin fs/buffer.c:2056 [inline]
block_write_begin+0x74/0x14c fs/buffer.c:2117
jfs_write_begin+0x44/0x88 fs/jfs/inode.c:304
generic_perform_write+0xf0/0x2cc mm/filemap.c:3738
__generic_file_write_iter+0xd8/0x21c mm/filemap.c:3866
generic_file_write_iter+0x6c/0x168 mm/filemap.c:3898
do_iter_write+0x318/0x560 fs/read_write.c:855
vfs_writev fs/read_write.c:928 [inline]
do_pwritev+0x130/0x1e8 fs/read_write.c:1025
__do_sys_pwritev fs/read_write.c:1072 [inline]
__se_sys_pwritev fs/read_write.c:1067 [inline]
__arm64_sys_pwritev+0x28/0x38 fs/read_write.c:1067
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]
el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206
el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581
Code: 8b2c4ecc f85f818c 1200056b 8b2b52ab (f82b6988)
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
0: 8b2c4ecc add x12, x22, w12, uxtw #3
4: f85f818c ldur x12, [x12, #-8]
8: 1200056b and w11, w11, #0x3
c: 8b2b52ab add x11, x21, w11, uxtw #4
* 10: f82b6988 str x8, [x12, x11] <-- trapping instruction