VFS: Found a Xenix FS (block size = 512) on device loop1 BUG: sleeping function called from invalid context at fs/buffer.c:1381 in_atomic(): 1, irqs_disabled(): 0, pid: 9703, name: syz-executor.1 3 locks held by syz-executor.1/9703: #0: (sb_writers#15){.+.+}, at: [] sb_start_write include/linux/fs.h:1551 [inline] #0: (sb_writers#15){.+.+}, at: [] mnt_want_write+0x3a/0xb0 fs/namespace.c:386 #1: (&sb->s_type->i_mutex_key#21){+.+.}, at: [] inode_lock include/linux/fs.h:719 [inline] #1: (&sb->s_type->i_mutex_key#21){+.+.}, at: [] do_truncate+0xf0/0x1a0 fs/open.c:61 #2: (pointers_lock){.+.+}, at: [] get_block+0x153/0x1230 fs/sysv/itree.c:217 Preemption disabled at: [< (null)>] (null) CPU: 1 PID: 9703 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6040 __getblk_gfp fs/buffer.c:1381 [inline] __bread_gfp+0x3e/0x2e0 fs/buffer.c:1428 sb_bread include/linux/buffer_head.h:343 [inline] get_branch+0x2ac/0x600 fs/sysv/itree.c:104 get_block+0x176/0x1230 fs/sysv/itree.c:218 audit: type=1804 audit(1675676744.623:2): pid=9716 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir1575531822/syzkaller.mPOJfe/13/bus" dev="sda1" ino=13947 res=1 block_truncate_page+0x2a8/0x8f0 fs/buffer.c:2944 sysv_truncate+0x1c4/0xd70 fs/sysv/itree.c:383 sysv_setattr+0x115/0x180 fs/sysv/file.c:47 notify_change+0x56b/0xd10 fs/attr.c:315 do_truncate+0xff/0x1a0 fs/open.c:63 vfs_truncate+0x456/0x680 fs/open.c:120 do_sys_truncate.part.0+0xdc/0xf0 fs/open.c:143 do_sys_truncate fs/open.c:137 [inline] SYSC_truncate fs/open.c:155 [inline] SyS_truncate+0x23/0x40 fs/open.c:153 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f573a7050c9 RSP: 002b:00007f5738c77168 EFLAGS: 00000246 ORIG_RAX: 000000000000004c RAX: ffffffffffffffda RBX: 00007f573a824f80 RCX: 00007f573a7050c9 RDX: 0000000000000000 RSI: 000000000000317b RDI: 00000000200001c0 RBP: 00007f573a760ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffde3a5a91f R14: 00007f5738c77300 R15: 0000000000022000 audit: type=1804 audit(1675676744.953:3): pid=9734 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir1575531822/syzkaller.mPOJfe/14/bus" dev="sda1" ino=13944 res=1 audit: type=1804 audit(1675676744.953:4): pid=9734 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir1575531822/syzkaller.mPOJfe/14/bus" dev="sda1" ino=13944 res=1 audit: type=1804 audit(1675676745.153:5): pid=9746 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir1196346773/syzkaller.PRte5H/13/bus" dev="sda1" ino=13948 res=1 audit: type=1804 audit(1675676745.173:6): pid=9746 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir1196346773/syzkaller.PRte5H/13/bus" dev="sda1" ino=13948 res=1 VFS: Found a Xenix FS (block size = 512) on device loop1 audit: type=1804 audit(1675676745.233:7): pid=9751 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir2115498041/syzkaller.MhdyQR/14/bus" dev="sda1" ino=13953 res=1 BUG: sleeping function called from invalid context at fs/buffer.c:1381 in_atomic(): 1, irqs_disabled(): 0, pid: 9765, name: syz-executor.1 3 locks held by syz-executor.1/9765: #0: (sb_writers#15){.+.+}, at: [] sb_start_write include/linux/fs.h:1551 [inline] #0: (sb_writers#15){.+.+}, at: [] mnt_want_write+0x3a/0xb0 fs/namespace.c:386 #1: (&sb->s_type->i_mutex_key#21){+.+.}, at: [] inode_lock include/linux/fs.h:719 [inline] #1: (&sb->s_type->i_mutex_key#21){+.+.}, at: [] do_truncate+0xf0/0x1a0 fs/open.c:61 #2: (pointers_lock){++++}, at: [] get_block+0x153/0x1230 fs/sysv/itree.c:217 Preemption disabled at: [< (null)>] (null) CPU: 1 PID: 9765 Comm: syz-executor.1 Tainted: G W 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6040 __getblk_gfp fs/buffer.c:1381 [inline] __bread_gfp+0x3e/0x2e0 fs/buffer.c:1428 sb_bread include/linux/buffer_head.h:343 [inline] get_branch+0x2ac/0x600 fs/sysv/itree.c:104 get_block+0x176/0x1230 fs/sysv/itree.c:218 audit: type=1804 audit(1675676745.253:8): pid=9751 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir2115498041/syzkaller.MhdyQR/14/bus" dev="sda1" ino=13953 res=1 block_truncate_page+0x2a8/0x8f0 fs/buffer.c:2944 sysv_truncate+0x1c4/0xd70 fs/sysv/itree.c:383 sysv_setattr+0x115/0x180 fs/sysv/file.c:47 notify_change+0x56b/0xd10 fs/attr.c:315 do_truncate+0xff/0x1a0 fs/open.c:63 vfs_truncate+0x456/0x680 fs/open.c:120 do_sys_truncate.part.0+0xdc/0xf0 fs/open.c:143 do_sys_truncate fs/open.c:137 [inline] SYSC_truncate fs/open.c:155 [inline] SyS_truncate+0x23/0x40 fs/open.c:153 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f573a7050c9 RSP: 002b:00007f5738c77168 EFLAGS: 00000246 ORIG_RAX: 000000000000004c RAX: ffffffffffffffda RBX: 00007f573a824f80 RCX: 00007f573a7050c9 RDX: 0000000000000000 RSI: 000000000000317b RDI: 00000000200001c0 RBP: 00007f573a760ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffde3a5a91f R14: 00007f5738c77300 R15: 0000000000022000 audit: type=1804 audit(1675676745.373:9): pid=9754 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir1575531822/syzkaller.mPOJfe/15/bus" dev="sda1" ino=13899 res=1 audit: type=1804 audit(1675676745.393:10): pid=9754 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir1575531822/syzkaller.mPOJfe/15/bus" dev="sda1" ino=13899 res=1 audit: type=1804 audit(1675676745.463:11): pid=9761 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir1196346773/syzkaller.PRte5H/14/bus" dev="sda1" ino=13878 res=1 BUG: sleeping function called from invalid context at fs/buffer.c:1381 in_atomic(): 1, irqs_disabled(): 0, pid: 9765, name: syz-executor.1 3 locks held by syz-executor.1/9765: #0: (sb_writers#15){.+.+}, at: [] sb_start_write include/linux/fs.h:1551 [inline] #0: (sb_writers#15){.+.+}, at: [] mnt_want_write+0x3a/0xb0 fs/namespace.c:386 #1: (&sb->s_type->i_mutex_key#21){+.+.}, at: [] inode_lock include/linux/fs.h:719 [inline] #1: (&sb->s_type->i_mutex_key#21){+.+.}, at: [] do_truncate+0xf0/0x1a0 fs/open.c:61 #2: (pointers_lock){++++}, at: [] find_shared fs/sysv/itree.c:290 [inline] #2: (pointers_lock){++++}, at: [] sysv_truncate+0x29c/0xd70 fs/sysv/itree.c:394 Preemption disabled at: [< (null)>] (null) CPU: 1 PID: 9765 Comm: syz-executor.1 Tainted: G W 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6040 __getblk_gfp fs/buffer.c:1381 [inline] __bread_gfp+0x3e/0x2e0 fs/buffer.c:1428 sb_bread include/linux/buffer_head.h:343 [inline] get_branch+0x2ac/0x600 fs/sysv/itree.c:104 find_shared fs/sysv/itree.c:291 [inline] sysv_truncate+0x2c2/0xd70 fs/sysv/itree.c:394 sysv_setattr+0x115/0x180 fs/sysv/file.c:47 notify_change+0x56b/0xd10 fs/attr.c:315 do_truncate+0xff/0x1a0 fs/open.c:63 vfs_truncate+0x456/0x680 fs/open.c:120 do_sys_truncate.part.0+0xdc/0xf0 fs/open.c:143 do_sys_truncate fs/open.c:137 [inline] SYSC_truncate fs/open.c:155 [inline] SyS_truncate+0x23/0x40 fs/open.c:153 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f573a7050c9 RSP: 002b:00007f5738c77168 EFLAGS: 00000246 ORIG_RAX: 000000000000004c RAX: ffffffffffffffda RBX: 00007f573a824f80 RCX: 00007f573a7050c9 RDX: 0000000000000000 RSI: 000000000000317b RDI: 00000000200001c0 RBP: 00007f573a760ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffde3a5a91f R14: 00007f5738c77300 R15: 0000000000022000 VFS: Found a Xenix FS (block size = 512) on device loop1 VFS: Found a Xenix FS (block size = 512) on device loop1 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. bond0: veth1_to_team is up - this may be due to an out of date ifenslave UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. batman_adv: batadv0: Interface deactivated: batadv_slave_0 batman_adv: batadv0: Removing interface: batadv_slave_0 bond0: batadv_slave_0 is up - this may be due to an out of date ifenslave UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) attempt to access beyond end of device netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. loop3: rw=2049, want=137, limit=128 hub 9-0:1.0: USB hub found hub 9-0:1.0: 8 ports detected bond0: veth0_to_hsr is up - this may be due to an out of date ifenslave netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. kauditd_printk_skb: 17 callbacks suppressed audit: type=1800 audit(1675676749.744:29): pid=10074 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=13963 res=0 UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) audit: type=1804 audit(1675676749.984:30): pid=10068 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir2115498041/syzkaller.MhdyQR/23/file0/bus" dev="loop4" ino=1357 res=1 hub 9-0:1.0: USB hub found hub 9-0:1.0: 8 ports detected audit: type=1804 audit(1675676750.104:31): pid=10092 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir2115498041/syzkaller.MhdyQR/23/file0/bus" dev="loop4" ino=1357 res=1 audit: type=1804 audit(1675676750.604:32): pid=10068 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir2115498041/syzkaller.MhdyQR/23/file0/bus" dev="loop4" ino=1357 res=1 UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) audit: type=1804 audit(1675676750.924:33): pid=10130 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir2115498041/syzkaller.MhdyQR/24/file0/bus" dev="loop4" ino=1357 res=1 hub 9-0:1.0: USB hub found UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) hub 9-0:1.0: 8 ports detected audit: type=1804 audit(1675676751.024:34): pid=10145 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir2115498041/syzkaller.MhdyQR/24/file0/bus" dev="loop4" ino=1357 res=1 audit: type=1804 audit(1675676751.204:35): pid=10142 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir2624174995/syzkaller.Wl6mmu/16/file0/bus" dev="loop2" ino=1357 res=1 audit: type=1804 audit(1675676751.264:36): pid=10168 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir2624174995/syzkaller.Wl6mmu/16/file0/bus" dev="loop2" ino=1357 res=1 audit: type=1804 audit(1675676751.274:37): pid=10168 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir2624174995/syzkaller.Wl6mmu/16/file0/bus" dev="loop2" ino=1357 res=1 UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) audit: type=1804 audit(1675676751.474:38): pid=10130 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir2115498041/syzkaller.MhdyQR/24/file0/bus" dev="loop4" ino=1357 res=1 hub 9-0:1.0: USB hub found hub 9-0:1.0: 8 ports detected L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000)