audit: type=1804 audit(1642348787.460:192): pid=16527 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir296354751/syzkaller.dK3Wjo/148/bus" dev="sda1" ino=14376 res=1 device geneve2 entered promiscuous mode EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue audit: type=1800 audit(1642348788.050:193): pid=16577 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="loop5" ino=17 res=0 ------------[ cut here ]------------ kernel BUG at fs/ext4/inode.c:2822! audit: type=1804 audit(1642348788.050:194): pid=16577 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir400998930/syzkaller.gd64zu/109/file0/file0" dev="loop5" ino=17 res=1 invalid opcode: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 16577 Comm: syz-executor.5 Not tainted 4.14.262-syzkaller #0 audit: type=1804 audit(1642348788.080:195): pid=16577 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir400998930/syzkaller.gd64zu/109/file0/file0" dev="loop5" ino=17 res=1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff88809ded2380 task.stack: ffff88804ef88000 RIP: 0010:ext4_writepages+0x27fc/0x32a0 fs/ext4/inode.c:2822 RSP: 0018:ffff88804ef8f638 EFLAGS: 00010212 RAX: 0000000000040000 RBX: 00000000a802c010 RCX: ffffc90005bcc000 RDX: 000000000000091d RSI: ffffffff81bb1dcc RDI: ffff88809ded3388 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000050517 R10: ffff88809ded2c58 R11: ffff88809ded2380 R12: 0000000000000001 R13: dffffc0000000000 R14: ffff888055de8270 R15: ffff88804ef8fa60 FS: 00007fb010756700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb010735718 CR3: 000000009b7db000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: do_writepages+0xc3/0x240 mm/page-writeback.c:2361 __filemap_fdatawrite_range+0x236/0x310 mm/filemap.c:346 file_write_and_wait_range+0x86/0xd0 mm/filemap.c:678 __generic_file_fsync+0x70/0x190 fs/libfs.c:985 ext4_sync_file+0x8ed/0x12c0 fs/ext4/fsync.c:118 vfs_fsync_range+0x103/0x260 fs/sync.c:196 generic_write_sync include/linux/fs.h:2684 [inline] ext4_file_write_iter+0x5fa/0xd20 fs/ext4/file.c:281 call_write_iter include/linux/fs.h:1780 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x44c/0x630 fs/read_write.c:482 vfs_write+0x17f/0x4d0 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xf2/0x210 fs/read_write.c:582 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7fb011de0fe9 RSP: 002b:00007fb010756168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007fb011ef3f60 RCX: 00007fb011de0fe9 RDX: 0000000000000044 RSI: 0000000020000380 RDI: 0000000000000006 RBP: 00007fb011e3b08d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcee10d47f R14: 00007fb010756300 R15: 0000000000022000 Code: ff ff 4c 89 ff e8 b5 cc c3 ff e9 98 db ff ff e8 7b 1d 9a ff 48 8b bc 24 b8 00 00 00 e8 0e 76 b1 ff e9 18 f5 ff ff e8 64 1d 9a ff <0f> 0b e8 5d 1d 9a ff 48 8b bc 24 b8 00 00 00 e8 f0 75 b1 ff 8b RIP: ext4_writepages+0x27fc/0x32a0 fs/ext4/inode.c:2822 RSP: ffff88804ef8f638 ---[ end trace a959e27e7a760526 ]--- IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'.