loop0: rw=0, want=26932836, limit=128 Buffer I/O error on dev loop0, logical block 13466417, async page read attempt to access beyond end of device loop0: rw=0, want=16147214, limit=128 Buffer I/O error on dev loop0, logical block 8073606, async page read BUG: sleeping function called from invalid context at fs/buffer.c:1319 in_atomic(): 1, irqs_disabled(): 0, pid: 17326, name: syz-executor.0 2 locks held by syz-executor.0/17326: #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: inode_lock_shared include/linux/fs.h:758 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: lookup_slow fs/namei.c:1688 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: walk_component+0x798/0xda0 fs/namei.c:1811 #1: 000000007380e61d (pointers_lock){.+.+}, at: get_block+0x171/0x1510 fs/sysv/itree.c:217 Preemption disabled at: [<0000000000000000>] (null) CPU: 0 PID: 17326 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 __getblk_gfp fs/buffer.c:1319 [inline] __bread_gfp+0x3f/0x300 fs/buffer.c:1366 sb_bread include/linux/buffer_head.h:309 [inline] get_branch+0x2cd/0x640 fs/sysv/itree.c:104 get_block+0x194/0x1510 fs/sysv/itree.c:218 block_read_full_page+0x288/0xd10 fs/buffer.c:2259 do_read_cache_page+0x533/0x1170 mm/filemap.c:2828 read_mapping_page include/linux/pagemap.h:402 [inline] dir_get_page fs/sysv/dir.c:58 [inline] sysv_find_entry+0x21a/0x6f0 fs/sysv/dir.c:146 sysv_inode_by_name+0x6d/0x3d0 fs/sysv/dir.c:360 sysv_lookup fs/sysv/namei.c:53 [inline] sysv_lookup+0x7c/0x100 fs/sysv/namei.c:46 __lookup_slow+0x246/0x4a0 fs/namei.c:1672 lookup_slow fs/namei.c:1689 [inline] walk_component+0x7ac/0xda0 fs/namei.c:1811 link_path_walk.part.0+0x901/0x1230 fs/namei.c:2142 link_path_walk fs/namei.c:2270 [inline] path_lookupat+0xe4/0x8d0 fs/namei.c:2318 filename_lookup+0x1ac/0x5a0 fs/namei.c:2349 user_path include/linux/namei.h:62 [inline] do_mount+0x147/0x2f50 fs/namespace.c:2762 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa9aed1e0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa9ad290168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa9aee3df80 RCX: 00007fa9aed1e0c9 RDX: 00000000200003c0 RSI: 0000000020000280 RDI: 0000000000000000 RBP: 00007fa9aed79ae9 R08: 0000000020000400 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc78f8ae9f R14: 00007fa9ad290300 R15: 0000000000022000 attempt to access beyond end of device loop0: rw=0, want=6491550, limit=128 Buffer I/O error on dev loop0, logical block 3245774, async page read attempt to access beyond end of device loop0: rw=0, want=17669880, limit=128 Buffer I/O error on dev loop0, logical block 8834939, async page read EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue kauditd_printk_skb: 24 callbacks suppressed audit: type=1804 audit(1674905476.985:177): pid=17369 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1145310157/syzkaller.Oxie6Z/127/file0/bus" dev="loop4" ino=18 res=1 audit: type=1804 audit(1674905477.035:178): pid=17396 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1145310157/syzkaller.Oxie6Z/127/file0/bus" dev="loop4" ino=18 res=1 9pnet_virtio: no channels available for device 127.0.0.1 BUG: sleeping function called from invalid context at include/linux/pagemap.h:482 in_atomic(): 1, irqs_disabled(): 0, pid: 17326, name: syz-executor.0 2 locks held by syz-executor.0/17326: #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: inode_lock_shared include/linux/fs.h:758 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: lookup_slow fs/namei.c:1688 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: walk_component+0x798/0xda0 fs/namei.c:1811 #1: 000000007380e61d (pointers_lock){.+.+}, at: get_block+0x171/0x1510 fs/sysv/itree.c:217 Preemption disabled at: [<0000000000000000>] (null) CPU: 0 PID: 17326 Comm: syz-executor.0 Tainted: G W 4.19.211-syzkaller #0 ieee802154 phy0 wpan0: encryption failed: -22 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 ieee802154 phy1 wpan1: encryption failed: -22 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 lock_page include/linux/pagemap.h:482 [inline] pagecache_get_page+0x5f2/0xd50 mm/filemap.c:1577 find_or_create_page include/linux/pagemap.h:322 [inline] grow_dev_page fs/buffer.c:948 [inline] grow_buffers fs/buffer.c:1017 [inline] __getblk_slow+0x216/0x9e0 fs/buffer.c:1044 __getblk_gfp fs/buffer.c:1321 [inline] __bread_gfp+0x218/0x300 fs/buffer.c:1366 sb_bread include/linux/buffer_head.h:309 [inline] get_branch+0x2cd/0x640 fs/sysv/itree.c:104 get_block+0x194/0x1510 fs/sysv/itree.c:218 block_read_full_page+0x288/0xd10 fs/buffer.c:2259 do_read_cache_page+0x533/0x1170 mm/filemap.c:2828 read_mapping_page include/linux/pagemap.h:402 [inline] dir_get_page fs/sysv/dir.c:58 [inline] sysv_find_entry+0x21a/0x6f0 fs/sysv/dir.c:146 sysv_inode_by_name+0x6d/0x3d0 fs/sysv/dir.c:360 sysv_lookup fs/sysv/namei.c:53 [inline] sysv_lookup+0x7c/0x100 fs/sysv/namei.c:46 __lookup_slow+0x246/0x4a0 fs/namei.c:1672 lookup_slow fs/namei.c:1689 [inline] walk_component+0x7ac/0xda0 fs/namei.c:1811 link_path_walk.part.0+0x901/0x1230 fs/namei.c:2142 link_path_walk fs/namei.c:2270 [inline] path_lookupat+0xe4/0x8d0 fs/namei.c:2318 filename_lookup+0x1ac/0x5a0 fs/namei.c:2349 user_path include/linux/namei.h:62 [inline] do_mount+0x147/0x2f50 fs/namespace.c:2762 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa9aed1e0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa9ad290168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa9aee3df80 RCX: 00007fa9aed1e0c9 RDX: 00000000200003c0 RSI: 0000000020000280 RDI: 0000000000000000 RBP: 00007fa9aed79ae9 R08: 0000000020000400 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc78f8ae9f R14: 00007fa9ad290300 R15: 0000000000022000 audit: type=1326 audit(1674905478.015:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17412 comm="" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f5ee56480c9 code=0x0 BUG: sleeping function called from invalid context at fs/buffer.c:1319 in_atomic(): 1, irqs_disabled(): 0, pid: 17326, name: syz-executor.0 2 locks held by syz-executor.0/17326: #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: inode_lock_shared include/linux/fs.h:758 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: lookup_slow fs/namei.c:1688 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: walk_component+0x798/0xda0 fs/namei.c:1811 #1: 000000007380e61d (pointers_lock){.+.+}, at: get_block+0x171/0x1510 fs/sysv/itree.c:217 Preemption disabled at: [<0000000000000000>] (null) CPU: 0 PID: 17326 Comm: syz-executor.0 Tainted: G W 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 __getblk_gfp fs/buffer.c:1319 [inline] __bread_gfp+0x3f/0x300 fs/buffer.c:1366 sb_bread include/linux/buffer_head.h:309 [inline] get_branch+0x2cd/0x640 fs/sysv/itree.c:104 get_block+0x194/0x1510 fs/sysv/itree.c:218 block_read_full_page+0x288/0xd10 fs/buffer.c:2259 do_read_cache_page+0x533/0x1170 mm/filemap.c:2828 read_mapping_page include/linux/pagemap.h:402 [inline] dir_get_page fs/sysv/dir.c:58 [inline] sysv_find_entry+0x21a/0x6f0 fs/sysv/dir.c:146 sysv_inode_by_name+0x6d/0x3d0 fs/sysv/dir.c:360 sysv_lookup fs/sysv/namei.c:53 [inline] sysv_lookup+0x7c/0x100 fs/sysv/namei.c:46 __lookup_slow+0x246/0x4a0 fs/namei.c:1672 lookup_slow fs/namei.c:1689 [inline] walk_component+0x7ac/0xda0 fs/namei.c:1811 link_path_walk.part.0+0x901/0x1230 fs/namei.c:2142 link_path_walk fs/namei.c:2270 [inline] path_lookupat+0xe4/0x8d0 fs/namei.c:2318 filename_lookup+0x1ac/0x5a0 fs/namei.c:2349 user_path include/linux/namei.h:62 [inline] do_mount+0x147/0x2f50 fs/namespace.c:2762 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa9aed1e0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa9ad290168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa9aee3df80 RCX: 00007fa9aed1e0c9 RDX: 00000000200003c0 RSI: 0000000020000280 RDI: 0000000000000000 RBP: 00007fa9aed79ae9 R08: 0000000020000400 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc78f8ae9f R14: 00007fa9ad290300 R15: 0000000000022000 EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue audit: type=1804 audit(1674905479.016:180): pid=17426 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1145310157/syzkaller.Oxie6Z/128/file0/bus" dev="loop4" ino=18 res=1 BUG: sleeping function called from invalid context at fs/buffer.c:1319 in_atomic(): 1, irqs_disabled(): 0, pid: 17326, name: syz-executor.0 2 locks held by syz-executor.0/17326: #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: inode_lock_shared include/linux/fs.h:758 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: lookup_slow fs/namei.c:1688 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: walk_component+0x798/0xda0 fs/namei.c:1811 #1: 000000007380e61d (pointers_lock){.+.+}, at: get_block+0x171/0x1510 fs/sysv/itree.c:217 Preemption disabled at: [<0000000000000000>] (null) CPU: 1 PID: 17326 Comm: syz-executor.0 Tainted: G W 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 __getblk_gfp fs/buffer.c:1319 [inline] __bread_gfp+0x3f/0x300 fs/buffer.c:1366 sb_bread include/linux/buffer_head.h:309 [inline] get_branch+0x2cd/0x640 fs/sysv/itree.c:104 get_block+0x194/0x1510 fs/sysv/itree.c:218 block_read_full_page+0x288/0xd10 fs/buffer.c:2259 do_read_cache_page+0x533/0x1170 mm/filemap.c:2828 read_mapping_page include/linux/pagemap.h:402 [inline] dir_get_page fs/sysv/dir.c:58 [inline] sysv_find_entry+0x21a/0x6f0 fs/sysv/dir.c:146 sysv_inode_by_name+0x6d/0x3d0 fs/sysv/dir.c:360 sysv_lookup fs/sysv/namei.c:53 [inline] sysv_lookup+0x7c/0x100 fs/sysv/namei.c:46 __lookup_slow+0x246/0x4a0 fs/namei.c:1672 lookup_slow fs/namei.c:1689 [inline] walk_component+0x7ac/0xda0 fs/namei.c:1811 link_path_walk.part.0+0x901/0x1230 fs/namei.c:2142 link_path_walk fs/namei.c:2270 [inline] path_lookupat+0xe4/0x8d0 fs/namei.c:2318 filename_lookup+0x1ac/0x5a0 fs/namei.c:2349 user_path include/linux/namei.h:62 [inline] do_mount+0x147/0x2f50 fs/namespace.c:2762 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa9aed1e0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa9ad290168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa9aee3df80 RCX: 00007fa9aed1e0c9 RDX: 00000000200003c0 RSI: 0000000020000280 RDI: 0000000000000000 RBP: 00007fa9aed79ae9 R08: 0000000020000400 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc78f8ae9f R14: 00007fa9ad290300 R15: 0000000000022000 audit: type=1326 audit(1674905479.936:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17436 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f5ee56480c9 code=0x0 EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue audit: type=1804 audit(1674905480.136:182): pid=17442 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1145310157/syzkaller.Oxie6Z/129/file0/bus" dev="loop4" ino=18 res=1 BUG: sleeping function called from invalid context at fs/buffer.c:1319 in_atomic(): 1, irqs_disabled(): 0, pid: 17326, name: syz-executor.0 audit: type=1804 audit(1674905480.196:183): pid=17459 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1145310157/syzkaller.Oxie6Z/129/file0/bus" dev="loop4" ino=18 res=1 2 locks held by syz-executor.0/17326: #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: inode_lock_shared include/linux/fs.h:758 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: lookup_slow fs/namei.c:1688 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: walk_component+0x798/0xda0 fs/namei.c:1811 #1: 000000007380e61d (pointers_lock){.+.+}, at: get_block+0x171/0x1510 fs/sysv/itree.c:217 Preemption disabled at: [<0000000000000000>] (null) CPU: 0 PID: 17326 Comm: syz-executor.0 Tainted: G W 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 __getblk_gfp fs/buffer.c:1319 [inline] __bread_gfp+0x3f/0x300 fs/buffer.c:1366 sb_bread include/linux/buffer_head.h:309 [inline] get_branch+0x2cd/0x640 fs/sysv/itree.c:104 get_block+0x194/0x1510 fs/sysv/itree.c:218 block_read_full_page+0x288/0xd10 fs/buffer.c:2259 do_read_cache_page+0x533/0x1170 mm/filemap.c:2828 read_mapping_page include/linux/pagemap.h:402 [inline] dir_get_page fs/sysv/dir.c:58 [inline] sysv_find_entry+0x21a/0x6f0 fs/sysv/dir.c:146 sysv_inode_by_name+0x6d/0x3d0 fs/sysv/dir.c:360 sysv_lookup fs/sysv/namei.c:53 [inline] sysv_lookup+0x7c/0x100 fs/sysv/namei.c:46 __lookup_slow+0x246/0x4a0 fs/namei.c:1672 F2FS-fs (loop1): Unrecognized mount option "nnlt" or missing value lookup_slow fs/namei.c:1689 [inline] walk_component+0x7ac/0xda0 fs/namei.c:1811 link_path_walk.part.0+0x901/0x1230 fs/namei.c:2142 link_path_walk fs/namei.c:2270 [inline] path_lookupat+0xe4/0x8d0 fs/namei.c:2318 filename_lookup+0x1ac/0x5a0 fs/namei.c:2349 user_path include/linux/namei.h:62 [inline] do_mount+0x147/0x2f50 fs/namespace.c:2762 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa9aed1e0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa9ad290168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa9aee3df80 RCX: 00007fa9aed1e0c9 RDX: 00000000200003c0 RSI: 0000000020000280 RDI: 0000000000000000 RBP: 00007fa9aed79ae9 R08: 0000000020000400 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc78f8ae9f R14: 00007fa9ad290300 R15: 0000000000022000 F2FS-fs (loop1): Unrecognized mount option "nnlt" or missing value BUG: sleeping function called from invalid context at fs/buffer.c:1319 in_atomic(): 1, irqs_disabled(): 0, pid: 17326, name: syz-executor.0 2 locks held by syz-executor.0/17326: #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: inode_lock_shared include/linux/fs.h:758 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: lookup_slow fs/namei.c:1688 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: walk_component+0x798/0xda0 fs/namei.c:1811 #1: 000000007380e61d (pointers_lock){.+.+}, at: get_block+0x171/0x1510 fs/sysv/itree.c:217 Preemption disabled at: [<0000000000000000>] (null) CPU: 1 PID: 17326 Comm: syz-executor.0 Tainted: G W 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 __getblk_gfp fs/buffer.c:1319 [inline] __bread_gfp+0x3f/0x300 fs/buffer.c:1366 sb_bread include/linux/buffer_head.h:309 [inline] get_branch+0x2cd/0x640 fs/sysv/itree.c:104 get_block+0x194/0x1510 fs/sysv/itree.c:218 block_read_full_page+0x288/0xd10 fs/buffer.c:2259 do_read_cache_page+0x533/0x1170 mm/filemap.c:2828 read_mapping_page include/linux/pagemap.h:402 [inline] dir_get_page fs/sysv/dir.c:58 [inline] sysv_find_entry+0x21a/0x6f0 fs/sysv/dir.c:146 sysv_inode_by_name+0x6d/0x3d0 fs/sysv/dir.c:360 sysv_lookup fs/sysv/namei.c:53 [inline] sysv_lookup+0x7c/0x100 fs/sysv/namei.c:46 __lookup_slow+0x246/0x4a0 fs/namei.c:1672 lookup_slow fs/namei.c:1689 [inline] walk_component+0x7ac/0xda0 fs/namei.c:1811 link_path_walk.part.0+0x901/0x1230 fs/namei.c:2142 link_path_walk fs/namei.c:2270 [inline] path_lookupat+0xe4/0x8d0 fs/namei.c:2318 filename_lookup+0x1ac/0x5a0 fs/namei.c:2349 user_path include/linux/namei.h:62 [inline] do_mount+0x147/0x2f50 fs/namespace.c:2762 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa9aed1e0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa9ad290168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa9aee3df80 RCX: 00007fa9aed1e0c9 RDX: 00000000200003c0 RSI: 0000000020000280 RDI: 0000000000000000 RBP: 00007fa9aed79ae9 R08: 0000000020000400 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc78f8ae9f R14: 00007fa9ad290300 R15: 0000000000022000 BUG: sleeping function called from invalid context at fs/buffer.c:1319 in_atomic(): 1, irqs_disabled(): 0, pid: 17326, name: syz-executor.0 2 locks held by syz-executor.0/17326: #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: inode_lock_shared include/linux/fs.h:758 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: lookup_slow fs/namei.c:1688 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: walk_component+0x798/0xda0 fs/namei.c:1811 #1: 000000007380e61d (pointers_lock){.+.+}, at: get_block+0x171/0x1510 fs/sysv/itree.c:217 Preemption disabled at: [<0000000000000000>] (null) CPU: 1 PID: 17326 Comm: syz-executor.0 Tainted: G W 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 __getblk_gfp fs/buffer.c:1319 [inline] __bread_gfp+0x3f/0x300 fs/buffer.c:1366 sb_bread include/linux/buffer_head.h:309 [inline] get_branch+0x2cd/0x640 fs/sysv/itree.c:104 get_block+0x194/0x1510 fs/sysv/itree.c:218 block_read_full_page+0x288/0xd10 fs/buffer.c:2259 do_read_cache_page+0x533/0x1170 mm/filemap.c:2828 read_mapping_page include/linux/pagemap.h:402 [inline] dir_get_page fs/sysv/dir.c:58 [inline] sysv_find_entry+0x21a/0x6f0 fs/sysv/dir.c:146 sysv_inode_by_name+0x6d/0x3d0 fs/sysv/dir.c:360 sysv_lookup fs/sysv/namei.c:53 [inline] sysv_lookup+0x7c/0x100 fs/sysv/namei.c:46 __lookup_slow+0x246/0x4a0 fs/namei.c:1672 lookup_slow fs/namei.c:1689 [inline] walk_component+0x7ac/0xda0 fs/namei.c:1811 link_path_walk.part.0+0x901/0x1230 fs/namei.c:2142 link_path_walk fs/namei.c:2270 [inline] path_lookupat+0xe4/0x8d0 fs/namei.c:2318 filename_lookup+0x1ac/0x5a0 fs/namei.c:2349 user_path include/linux/namei.h:62 [inline] do_mount+0x147/0x2f50 fs/namespace.c:2762 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa9aed1e0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa9ad290168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa9aee3df80 RCX: 00007fa9aed1e0c9 RDX: 00000000200003c0 RSI: 0000000020000280 RDI: 0000000000000000 RBP: 00007fa9aed79ae9 R08: 0000000020000400 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc78f8ae9f R14: 00007fa9ad290300 R15: 0000000000022000 BUG: sleeping function called from invalid context at fs/buffer.c:1319 in_atomic(): 1, irqs_disabled(): 0, pid: 17326, name: syz-executor.0 2 locks held by syz-executor.0/17326: #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: inode_lock_shared include/linux/fs.h:758 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: lookup_slow fs/namei.c:1688 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: walk_component+0x798/0xda0 fs/namei.c:1811 #1: 000000007380e61d (pointers_lock){.+.+}, at: get_block+0x171/0x1510 fs/sysv/itree.c:217 Preemption disabled at: [<0000000000000000>] (null) CPU: 0 PID: 17326 Comm: syz-executor.0 Tainted: G W 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 __getblk_gfp fs/buffer.c:1319 [inline] __bread_gfp+0x3f/0x300 fs/buffer.c:1366 sb_bread include/linux/buffer_head.h:309 [inline] get_branch+0x2cd/0x640 fs/sysv/itree.c:104 get_block+0x194/0x1510 fs/sysv/itree.c:218 block_read_full_page+0x288/0xd10 fs/buffer.c:2259 do_read_cache_page+0x533/0x1170 mm/filemap.c:2828 read_mapping_page include/linux/pagemap.h:402 [inline] dir_get_page fs/sysv/dir.c:58 [inline] sysv_find_entry+0x21a/0x6f0 fs/sysv/dir.c:146 sysv_inode_by_name+0x6d/0x3d0 fs/sysv/dir.c:360 sysv_lookup fs/sysv/namei.c:53 [inline] sysv_lookup+0x7c/0x100 fs/sysv/namei.c:46 __lookup_slow+0x246/0x4a0 fs/namei.c:1672 lookup_slow fs/namei.c:1689 [inline] walk_component+0x7ac/0xda0 fs/namei.c:1811 link_path_walk.part.0+0x901/0x1230 fs/namei.c:2142 link_path_walk fs/namei.c:2270 [inline] path_lookupat+0xe4/0x8d0 fs/namei.c:2318 filename_lookup+0x1ac/0x5a0 fs/namei.c:2349 user_path include/linux/namei.h:62 [inline] do_mount+0x147/0x2f50 fs/namespace.c:2762 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa9aed1e0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa9ad290168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa9aee3df80 RCX: 00007fa9aed1e0c9 RDX: 00000000200003c0 RSI: 0000000020000280 RDI: 0000000000000000 RBP: 00007fa9aed79ae9 R08: 0000000020000400 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc78f8ae9f R14: 00007fa9ad290300 R15: 0000000000022000 BUG: sleeping function called from invalid context at fs/buffer.c:1319 in_atomic(): 1, irqs_disabled(): 0, pid: 17326, name: syz-executor.0 2 locks held by syz-executor.0/17326: #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: inode_lock_shared include/linux/fs.h:758 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: lookup_slow fs/namei.c:1688 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: walk_component+0x798/0xda0 fs/namei.c:1811 #1: 000000007380e61d (pointers_lock){.+.+}, at: get_block+0x171/0x1510 fs/sysv/itree.c:217 Preemption disabled at: [<0000000000000000>] (null) CPU: 0 PID: 17326 Comm: syz-executor.0 Tainted: G W 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 __getblk_gfp fs/buffer.c:1319 [inline] __bread_gfp+0x3f/0x300 fs/buffer.c:1366 sb_bread include/linux/buffer_head.h:309 [inline] get_branch+0x2cd/0x640 fs/sysv/itree.c:104 get_block+0x194/0x1510 fs/sysv/itree.c:218 block_read_full_page+0x288/0xd10 fs/buffer.c:2259 do_read_cache_page+0x533/0x1170 mm/filemap.c:2828 read_mapping_page include/linux/pagemap.h:402 [inline] dir_get_page fs/sysv/dir.c:58 [inline] sysv_find_entry+0x21a/0x6f0 fs/sysv/dir.c:146 sysv_inode_by_name+0x6d/0x3d0 fs/sysv/dir.c:360 sysv_lookup fs/sysv/namei.c:53 [inline] sysv_lookup+0x7c/0x100 fs/sysv/namei.c:46 __lookup_slow+0x246/0x4a0 fs/namei.c:1672 lookup_slow fs/namei.c:1689 [inline] walk_component+0x7ac/0xda0 fs/namei.c:1811 link_path_walk.part.0+0x901/0x1230 fs/namei.c:2142 link_path_walk fs/namei.c:2270 [inline] path_lookupat+0xe4/0x8d0 fs/namei.c:2318 filename_lookup+0x1ac/0x5a0 fs/namei.c:2349 user_path include/linux/namei.h:62 [inline] do_mount+0x147/0x2f50 fs/namespace.c:2762 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa9aed1e0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa9ad290168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa9aee3df80 RCX: 00007fa9aed1e0c9 RDX: 00000000200003c0 RSI: 0000000020000280 RDI: 0000000000000000 RBP: 00007fa9aed79ae9 R08: 0000000020000400 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc78f8ae9f R14: 00007fa9ad290300 R15: 0000000000022000 Bluetooth: hci0: command 0x0406 tx timeout Bluetooth: hci1: command 0x0406 tx timeout Bluetooth: hci2: command 0x0406 tx timeout Bluetooth: hci3: command 0x0406 tx timeout BUG: sleeping function called from invalid context at fs/buffer.c:1319 in_atomic(): 1, irqs_disabled(): 0, pid: 17326, name: syz-executor.0 2 locks held by syz-executor.0/17326: #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: inode_lock_shared include/linux/fs.h:758 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: lookup_slow fs/namei.c:1688 [inline] #0: 00000000c497a84a (&type->i_mutex_dir_key#19){.+.+}, at: walk_component+0x798/0xda0 fs/namei.c:1811 #1: 000000007380e61d (pointers_lock){.+.+}, at: get_block+0x171/0x1510 fs/sysv/itree.c:217 Preemption disabled at: [<0000000000000000>] (null) CPU: 1 PID: 17326 Comm: syz-executor.0 Tainted: G W 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 __getblk_gfp fs/buffer.c:1319 [inline] __bread_gfp+0x3f/0x300 fs/buffer.c:1366 sb_bread include/linux/buffer_head.h:309 [inline] get_branch+0x2cd/0x640 fs/sysv/itree.c:104 get_block+0x194/0x1510 fs/sysv/itree.c:218 block_read_full_page+0x288/0xd10 fs/buffer.c:2259 do_read_cache_page+0x533/0x1170 mm/filemap.c:2828 read_mapping_page include/linux/pagemap.h:402 [inline] dir_get_page fs/sysv/dir.c:58 [inline] sysv_find_entry+0x21a/0x6f0 fs/sysv/dir.c:146 sysv_inode_by_name+0x6d/0x3d0 fs/sysv/dir.c:360 sysv_lookup fs/sysv/namei.c:53 [inline] sysv_lookup+0x7c/0x100 fs/sysv/namei.c:46 __lookup_slow+0x246/0x4a0 fs/namei.c:1672 lookup_slow fs/namei.c:1689 [inline] walk_component+0x7ac/0xda0 fs/namei.c:1811 link_path_walk.part.0+0x901/0x1230 fs/namei.c:2142 link_path_walk fs/namei.c:2270 [inline] path_lookupat+0xe4/0x8d0 fs/namei.c:2318 filename_lookup+0x1ac/0x5a0 fs/namei.c:2349 user_path include/linux/namei.h:62 [inline] do_mount+0x147/0x2f50 fs/namespace.c:2762 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa9aed1e0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa9ad290168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa9aee3df80 RCX: 00007fa9aed1e0c9 RDX: 00000000200003c0 RSI: 0000000020000280 RDI: 0000000000000000 RBP: 00007fa9aed79ae9 R08: 0000000020000400 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc78f8ae9f R14: 00007fa9ad290300 R15: 0000000000022000