loop1: rw=0, want=13466418, limit=128 Buffer I/O error on dev loop1, logical block 13466417, async page read attempt to access beyond end of device loop1: rw=0, want=8073606, limit=128 Buffer I/O error on dev loop1, logical block 8073605, async page read BUG: sleeping function called from invalid context at fs/buffer.c:1319 in_atomic(): 1, irqs_disabled(): 0, pid: 21202, name: syz-executor.1 2 locks held by syz-executor.1/21202: #0: 0000000058419198 (&iint->mutex){+.+.}, at: process_measurement+0x316/0x1440 security/integrity/ima/ima_main.c:224 #1: 000000003f51c465 (pointers_lock){.+.+}, at: get_block+0x171/0x1510 fs/sysv/itree.c:217 Preemption disabled at: [<0000000000000000>] (null) CPU: 0 PID: 21202 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 __getblk_gfp fs/buffer.c:1319 [inline] __bread_gfp+0x3f/0x300 fs/buffer.c:1366 sb_bread include/linux/buffer_head.h:309 [inline] get_branch+0x2cd/0x640 fs/sysv/itree.c:104 get_block+0x194/0x1510 fs/sysv/itree.c:218 block_read_full_page+0x288/0xd10 fs/buffer.c:2259 read_pages.isra.0+0x329/0x5d0 mm/readahead.c:133 __do_page_cache_readahead+0x5c6/0x6c0 mm/readahead.c:211 ra_submit mm/internal.h:66 [inline] ondemand_readahead.isra.0+0x575/0xd40 mm/readahead.c:493 page_cache_sync_readahead mm/readahead.c:528 [inline] page_cache_sync_readahead+0x275/0x520 mm/readahead.c:510 generic_file_buffered_read mm/filemap.c:2115 [inline] generic_file_read_iter+0x1497/0x2b60 mm/filemap.c:2385 call_read_iter include/linux/fs.h:1815 [inline] new_sync_read fs/read_write.c:406 [inline] __vfs_read+0x518/0x750 fs/read_write.c:418 integrity_kernel_read+0x147/0x1f0 security/integrity/iint.c:200 ima_calc_file_hash_tfm security/integrity/ima/ima_crypto.c:364 [inline] ima_calc_file_shash security/integrity/ima/ima_crypto.c:393 [inline] ima_calc_file_hash+0x4b2/0x8a0 security/integrity/ima/ima_crypto.c:450 ima_collect_measurement+0x4c4/0x570 security/integrity/ima/ima_api.c:231 process_measurement+0xddd/0x1440 security/integrity/ima/ima_main.c:284 ima_file_check+0xb9/0x100 security/integrity/ima/ima_main.c:391 do_last fs/namei.c:3425 [inline] path_openat+0x7e4/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7feb69c6d0a9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007feb5fdad168 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007feb69d8d120 RCX: 00007feb69c6d0a9 RDX: 0000000000000000 RSI: 000000000000007e RDI: 0000000020000140 RBP: 00007feb69cc8ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcc030b6df R14: 00007feb5fdad300 R15: 0000000000022000 attempt to access beyond end of device loop1: rw=0, want=3245519, limit=128 Buffer I/O error on dev loop1, logical block 3245518, async page read attempt to access beyond end of device loop1: rw=0, want=8769404, limit=128 Buffer I/O error on dev loop1, logical block 8769403, async page read attempt to access beyond end of device loop1: rw=0, want=3245513, limit=128 attempt to access beyond end of device loop1: rw=0, want=8767868, limit=128 attempt to access beyond end of device loop1: rw=0, want=13269810, limit=128 attempt to access beyond end of device loop1: rw=0, want=8073606, limit=128 attempt to access beyond end of device loop1: rw=0, want=3245516, limit=128 attempt to access beyond end of device loop1: rw=0, want=8768636, limit=128 attempt to access beyond end of device netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. loop1: rw=0, want=13466418, limit=128 attempt to access beyond end of device loop1: rw=0, want=8073606, limit=128 kauditd_printk_skb: 34 callbacks suppressed audit: type=1800 audit(1672676985.449:157): pid=21202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="/" dev="loop1" ino=2 res=0 VFS: Found a Xenix FS (block size = 512) on device loop1 sysv_count_free_blocks: >flc_size entries in free-list block sysv_count_free_inodes: unable to read inode table attempt to access beyond end of device sysv_count_free_blocks: >flc_size entries in free-list block loop1: rw=0, want=3245513, limit=128 attempt to access beyond end of device sysv_count_free_inodes: unable to read inode table device lo entered promiscuous mode loop1: rw=0, want=8767868, limit=128 IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready attempt to access beyond end of device loop1: rw=0, want=13269810, limit=128 attempt to access beyond end of device loop1: rw=0, want=8073606, limit=128 attempt to access beyond end of device loop1: rw=0, want=3245516, limit=128 attempt to access beyond end of device loop1: rw=0, want=8768636, limit=128 attempt to access beyond end of device loop1: rw=0, want=13466418, limit=128 attempt to access beyond end of device loop1: rw=0, want=8073606, limit=128 BUG: sleeping function called from invalid context at fs/buffer.c:1319 in_atomic(): 1, irqs_disabled(): 0, pid: 21361, name: syz-executor.1 2 locks held by syz-executor.1/21361: #0: 00000000ef66db43 (&iint->mutex){+.+.}, at: process_measurement+0x316/0x1440 security/integrity/ima/ima_main.c:224 #1: 000000003f51c465 (pointers_lock){.+.+}, at: get_block+0x171/0x1510 fs/sysv/itree.c:217 Preemption disabled at: [<0000000000000000>] (null) CPU: 1 PID: 21361 Comm: syz-executor.1 Tainted: G W 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 __getblk_gfp fs/buffer.c:1319 [inline] __bread_gfp+0x3f/0x300 fs/buffer.c:1366 sb_bread include/linux/buffer_head.h:309 [inline] get_branch+0x2cd/0x640 fs/sysv/itree.c:104 get_block+0x194/0x1510 fs/sysv/itree.c:218 block_read_full_page+0x288/0xd10 fs/buffer.c:2259 read_pages.isra.0+0x329/0x5d0 mm/readahead.c:133 __do_page_cache_readahead+0x5c6/0x6c0 mm/readahead.c:211 ra_submit mm/internal.h:66 [inline] ondemand_readahead.isra.0+0x575/0xd40 mm/readahead.c:493 page_cache_sync_readahead mm/readahead.c:528 [inline] page_cache_sync_readahead+0x275/0x520 mm/readahead.c:510 generic_file_buffered_read mm/filemap.c:2115 [inline] generic_file_read_iter+0x1497/0x2b60 mm/filemap.c:2385 call_read_iter include/linux/fs.h:1815 [inline] new_sync_read fs/read_write.c:406 [inline] __vfs_read+0x518/0x750 fs/read_write.c:418 integrity_kernel_read+0x147/0x1f0 security/integrity/iint.c:200 ima_calc_file_hash_tfm security/integrity/ima/ima_crypto.c:364 [inline] ima_calc_file_shash security/integrity/ima/ima_crypto.c:393 [inline] ima_calc_file_hash+0x4b2/0x8a0 security/integrity/ima/ima_crypto.c:450 ima_collect_measurement+0x4c4/0x570 security/integrity/ima/ima_api.c:231 process_measurement+0xddd/0x1440 security/integrity/ima/ima_main.c:284 ima_file_check+0xb9/0x100 security/integrity/ima/ima_main.c:391 do_last fs/namei.c:3425 [inline] path_openat+0x7e4/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7feb69c6d0a9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007feb5fdce168 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007feb69d8d050 RCX: 00007feb69c6d0a9 RDX: 0000000000000000 RSI: 000000000000007e RDI: 0000000020000140 RBP: 00007feb69cc8ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcc030b6df R14: 00007feb5fdce300 R15: 0000000000022000 attempt to access beyond end of device loop1: rw=0, want=3245519, limit=128 attempt to access beyond end of device loop1: rw=0, want=8769404, limit=128 attempt to access beyond end of device loop1: rw=0, want=3245513, limit=128 attempt to access beyond end of device loop1: rw=0, want=8767868, limit=128 attempt to access beyond end of device loop1: rw=0, want=13269810, limit=128 attempt to access beyond end of device loop1: rw=0, want=8073606, limit=128 attempt to access beyond end of device loop1: rw=0, want=3245516, limit=128 attempt to access beyond end of device loop1: rw=0, want=8768636, limit=128 attempt to access beyond end of device loop1: rw=0, want=13466418, limit=128 attempt to access beyond end of device loop1: rw=0, want=8073606, limit=128 audit: type=1800 audit(1672676986.769:158): pid=21361 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="/" dev="loop1" ino=2 res=0 ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 IPVS: ftp: loaded support on port[0] = 21 device lo left promiscuous mode overlayfs: failed to resolve './file0': -2 audit: type=1800 audit(1672676987.699:159): pid=21477 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=14132 res=0 device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready device lo left promiscuous mode audit: type=1800 audit(1672676989.439:160): pid=21515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15188 res=0 device lo entered promiscuous mode audit: type=1800 audit(1672676989.659:161): pid=21547 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15180 res=0 overlayfs: failed to resolve './file0': -2 IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready audit: type=1800 audit(1672676989.699:162): pid=21554 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15180 res=0 nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. IPVS: ftp: loaded support on port[0] = 21 netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 100 bytes leftover after parsing attributes in process `syz-executor.3'. BTRFS info (device loop2): unrecognized mount option 'user_subvZl_ÿ' BTRFS error (device loop2): open_ctree failed REISERFS (device loop1): found reiserfs format "3.6" with non-standard journal REISERFS (device loop1): using ordered data mode reiserfs: using flush barriers REISERFS (device loop1): journal params: device loop1, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 REISERFS (device loop1): checking transaction log (loop1) IPVS: ftp: loaded support on port[0] = 21 netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. REISERFS (device loop1): Using r5 hash to sort names IPVS: ftp: loaded support on port[0] = 21 netlink: 100 bytes leftover after parsing attributes in process `syz-executor.3'. REISERFS (device loop1): Created .reiserfs_priv - reserved for xattr storage. IPVS: ftp: loaded support on port[0] = 21 Bluetooth: hci5: command 0x0405 tx timeout F2FS-fs (loop5): Invalid log sectors per block(2411855875) log sectorsize(9) F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock F2FS-fs (loop5): invalid crc value F2FS-fs (loop5): Found nat_bits in checkpoint F2FS-fs (loop5): Mounted with checkpoint version = 753bd00b audit: type=1804 audit(1672676992.039:163): pid=21812 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir1282490951/syzkaller.eLHXaL/551/mnt/bus" dev="loop5" ino=4 res=1 audit: type=1804 audit(1672676992.069:164): pid=21612 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir1282490951/syzkaller.eLHXaL/551/mnt/bus" dev="loop5" ino=4 res=1 IPVS: ftp: loaded support on port[0] = 21 netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 100 bytes leftover after parsing attributes in process `syz-executor.3'. IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 REISERFS (device loop1): found reiserfs format "3.6" with non-standard journal REISERFS (device loop1): using ordered data mode reiserfs: using flush barriers netlink: 'syz-executor.0': attribute type 44 has an invalid length. REISERFS (device loop1): journal params: device loop1, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 IPVS: ftp: loaded support on port[0] = 21 REISERFS (device loop1): checking transaction log (loop1) netlink: 'syz-executor.0': attribute type 44 has an invalid length. REISERFS (device loop1): Using r5 hash to sort names REISERFS (device loop1): Created .reiserfs_priv - reserved for xattr storage. netlink: 'syz-executor.0': attribute type 44 has an invalid length. IPVS: ftp: loaded support on port[0] = 21 nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead.