gfs2: fsid=syz:syz.0: first mount done, others may mount ------------[ cut here ]------------ WARNING: CPU: 0 PID: 10667 at fs/gfs2/rgrp.c:2628 gfs2_check_blk_type+0x394/0x598 Modules linked in: CPU: 0 PID: 10667 Comm: syz-executor.2 Not tainted 6.3.0-rc3-syzkaller-ge8d018dd0257 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : gfs2_check_blk_type+0x394/0x598 lr : rgrp_contains_block fs/gfs2/rgrp.h:88 [inline] lr : gfs2_rbm_from_block fs/gfs2/rgrp.c:279 [inline] lr : gfs2_check_blk_type+0x310/0x598 fs/gfs2/rgrp.c:2627 sp : ffff8000210a76a0 x29: ffff8000210a7760 x28: ffff0000c9b87188 x27: dfff800000000000 x26: ffff700004214ed8 x25: ffff8000210a76e0 x24: 0000000000000012 x23: ffff0000c9b871bc x22: 00000000fffffff9 x21: 0000000000000011 x20: 1fffe00019370e37 x19: 1fffe00019370e36 x18: 1fffe0003689b7b6 x17: ffff800015b3d000 x16: ffff8000083069b4 x15: 0000000000000000 x14: 1ffff00002b680b2 x13: dfff800000000000 x12: 0000000000040000 x11: 00000000000036e0 x10: ffff8000285d6000 x9 : ffff80000a3f5df8 x8 : 00000000000036e1 x7 : ffff8000083b0a44 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff80000a38bd0c x2 : 0000000000000001 x1 : 0000000000000011 x0 : 0000000000000012 Call trace: gfs2_check_blk_type+0x394/0x598 gfs2_inode_lookup+0x930/0xa70 fs/gfs2/inode.c:178 gfs2_lookup_by_inum+0x60/0xf8 fs/gfs2/inode.c:250 gfs2_get_dentry fs/gfs2/export.c:139 [inline] gfs2_fh_to_dentry+0x128/0x1f4 fs/gfs2/export.c:162 exportfs_decode_fh_raw+0x114/0x4b4 fs/exportfs/expfs.c:435 exportfs_decode_fh+0x50/0x80 fs/exportfs/expfs.c:575 do_handle_to_path fs/fhandle.c:152 [inline] handle_to_path fs/fhandle.c:207 [inline] do_handle_open+0x56c/0x998 fs/fhandle.c:223 __do_sys_open_by_handle_at fs/fhandle.c:265 [inline] __se_sys_open_by_handle_at fs/fhandle.c:256 [inline] __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:256 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:193 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 irq event stamp: 115102 hardirqs last enabled at (115101): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (115101): [] _raw_spin_unlock_irqrestore+0x44/0xa4 kernel/locking/spinlock.c:194 hardirqs last disabled at (115102): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 softirqs last enabled at (115006): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (115004): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 ---[ end trace 0000000000000000 ]---