VFS: Found a Xenix FS (block size = 512) on device loop3 BUG: sleeping function called from invalid context at fs/buffer.c:1381 in_atomic(): 1, irqs_disabled(): 0, pid: 11361, name: syz-executor.3 3 locks held by syz-executor.3/11361: #0: (sb_writers#15){.+.+}, at: [] sb_start_write include/linux/fs.h:1551 [inline] #0: (sb_writers#15){.+.+}, at: [] mnt_want_write+0x3a/0xb0 fs/namespace.c:386 #1: (&sb->s_type->i_mutex_key#22){+.+.}, at: [] inode_lock include/linux/fs.h:719 [inline] #1: (&sb->s_type->i_mutex_key#22){+.+.}, at: [] do_truncate+0xf0/0x1a0 fs/open.c:61 #2: (pointers_lock){.+.+}, at: [] get_block+0x153/0x1230 fs/sysv/itree.c:217 Preemption disabled at: [< (null)>] (null) CPU: 0 PID: 11361 Comm: syz-executor.3 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6040 __getblk_gfp fs/buffer.c:1381 [inline] __bread_gfp+0x3e/0x2e0 fs/buffer.c:1428 sb_bread include/linux/buffer_head.h:343 [inline] get_branch+0x2ac/0x600 fs/sysv/itree.c:104 get_block+0x176/0x1230 fs/sysv/itree.c:218 block_truncate_page+0x2a8/0x8f0 fs/buffer.c:2944 sysv_truncate+0x1c4/0xd70 fs/sysv/itree.c:383 sysv_setattr+0x115/0x180 fs/sysv/file.c:47 notify_change+0x56b/0xd10 fs/attr.c:315 do_truncate+0xff/0x1a0 fs/open.c:63 vfs_truncate+0x456/0x680 fs/open.c:120 do_sys_truncate.part.0+0xdc/0xf0 fs/open.c:143 do_sys_truncate fs/open.c:137 [inline] SYSC_truncate fs/open.c:155 [inline] SyS_truncate+0x23/0x40 fs/open.c:153 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7fafbad050f9 RSP: 002b:00007fafb9277168 EFLAGS: 00000246 ORIG_RAX: 000000000000004c RAX: ffffffffffffffda RBX: 00007fafbae24f80 RCX: 00007fafbad050f9 RDX: 0000000000000000 RSI: 000000000000317b RDI: 00000000200001c0 RBP: 00007fafbad60ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe024d6e5f R14: 00007fafb9277300 R15: 0000000000022000 VFS: Found a Xenix FS (block size = 512) on device loop3 VFS: Found a Xenix FS (block size = 512) on device loop5 VFS: Found a Xenix FS (block size = 512) on device loop3 VFS: Found a Xenix FS (block size = 512) on device loop5 VFS: Found a Xenix FS (block size = 512) on device loop3 BUG: sleeping function called from invalid context at fs/buffer.c:1381 in_atomic(): 1, irqs_disabled(): 0, pid: 11420, name: syz-executor.5 3 locks held by syz-executor.5/11420: #0: (sb_writers#15){.+.+}, at: [] sb_start_write include/linux/fs.h:1551 [inline] #0: (sb_writers#15){.+.+}, at: [] mnt_want_write+0x3a/0xb0 fs/namespace.c:386 #1: (&sb->s_type->i_mutex_key#22){+.+.}, at: [] inode_lock include/linux/fs.h:719 [inline] #1: (&sb->s_type->i_mutex_key#22){+.+.}, at: [] do_truncate+0xf0/0x1a0 fs/open.c:61 #2: (pointers_lock){++++}, at: [] get_block+0x153/0x1230 fs/sysv/itree.c:217 Preemption disabled at: [< (null)>] (null) CPU: 0 PID: 11420 Comm: syz-executor.5 Tainted: G W 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6040 __getblk_gfp fs/buffer.c:1381 [inline] __bread_gfp+0x3e/0x2e0 fs/buffer.c:1428 sb_bread include/linux/buffer_head.h:343 [inline] get_branch+0x2ac/0x600 fs/sysv/itree.c:104 get_block+0x176/0x1230 fs/sysv/itree.c:218 block_truncate_page+0x2a8/0x8f0 fs/buffer.c:2944 sysv_truncate+0x1c4/0xd70 fs/sysv/itree.c:383 sysv_setattr+0x115/0x180 fs/sysv/file.c:47 notify_change+0x56b/0xd10 fs/attr.c:315 do_truncate+0xff/0x1a0 fs/open.c:63 vfs_truncate+0x456/0x680 fs/open.c:120 do_sys_truncate.part.0+0xdc/0xf0 fs/open.c:143 do_sys_truncate fs/open.c:137 [inline] SYSC_truncate fs/open.c:155 [inline] SyS_truncate+0x23/0x40 fs/open.c:153 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f03e4b990f9 RSP: 002b:00007f03e310b168 EFLAGS: 00000246 ORIG_RAX: 000000000000004c RAX: ffffffffffffffda RBX: 00007f03e4cb8f80 RCX: 00007f03e4b990f9 RDX: 0000000000000000 RSI: 000000000000317b RDI: 00000000200001c0 RBP: 00007f03e4bf4ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffdd19d6bdf R14: 00007f03e310b300 R15: 0000000000022000 VFS: Found a Xenix FS (block size = 512) on device loop5 kauditd_printk_skb: 57 callbacks suppressed audit: type=1804 audit(1675796439.929:174): pid=11468 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir27887596/syzkaller.xKkiYX/52/file0/bus" dev="ramfs" ino=33989 res=1 audit: type=1804 audit(1675796439.939:175): pid=11468 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir27887596/syzkaller.xKkiYX/52/file0/bus" dev="ramfs" ino=33989 res=1 audit: type=1804 audit(1675796439.969:176): pid=11471 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir1875987538/syzkaller.CzmphO/67/file0/bus" dev="ramfs" ino=33993 res=1 audit: type=1804 audit(1675796439.979:177): pid=11471 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir1875987538/syzkaller.CzmphO/67/file0/bus" dev="ramfs" ino=33993 res=1 audit: type=1804 audit(1675796440.519:178): pid=11494 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir27887596/syzkaller.xKkiYX/53/file0/bus" dev="ramfs" ino=34016 res=1 audit: type=1804 audit(1675796440.549:179): pid=11494 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir27887596/syzkaller.xKkiYX/53/file0/bus" dev="ramfs" ino=34016 res=1 audit: type=1804 audit(1675796440.789:180): pid=11506 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir27887596/syzkaller.xKkiYX/54/file0/bus" dev="ramfs" ino=33063 res=1 audit: type=1804 audit(1675796440.819:181): pid=11506 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir27887596/syzkaller.xKkiYX/54/file0/bus" dev="ramfs" ino=33063 res=1 audit: type=1804 audit(1675796441.049:182): pid=11511 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir27887596/syzkaller.xKkiYX/55/file0/bus" dev="ramfs" ino=33073 res=1 audit: type=1804 audit(1675796441.069:183): pid=11515 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir3576308835/syzkaller.KdJxRE/45/file0/bus" dev="ramfs" ino=33075 res=1 kauditd_printk_skb: 38 callbacks suppressed audit: type=1804 audit(1675796444.980:222): pid=11606 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir1870734739/syzkaller.Jh4dwW/47/file0/bus" dev="ramfs" ino=34202 res=1 audit: type=1804 audit(1675796445.050:223): pid=11606 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir1870734739/syzkaller.Jh4dwW/47/file0/bus" dev="ramfs" ino=34202 res=1 audit: type=1804 audit(1675796445.570:224): pid=11615 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir3576308835/syzkaller.KdJxRE/50/file0/bus" dev="ramfs" ino=33260 res=1 audit: type=1804 audit(1675796445.580:225): pid=11616 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir27887596/syzkaller.xKkiYX/60/file0/bus" dev="ramfs" ino=34211 res=1 audit: type=1804 audit(1675796445.610:226): pid=11616 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir27887596/syzkaller.xKkiYX/60/file0/bus" dev="ramfs" ino=34211 res=1 audit: type=1804 audit(1675796445.620:227): pid=11615 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir3576308835/syzkaller.KdJxRE/50/file0/bus" dev="ramfs" ino=33260 res=1 audit: type=1804 audit(1675796445.660:228): pid=11619 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir1875987538/syzkaller.CzmphO/73/file0/bus" dev="ramfs" ino=34213 res=1 audit: type=1804 audit(1675796445.700:229): pid=11619 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir1875987538/syzkaller.CzmphO/73/file0/bus" dev="ramfs" ino=34213 res=1 audit: type=1804 audit(1675796445.760:230): pid=11620 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir2240089028/syzkaller.SoZVdJ/64/file0/bus" dev="ramfs" ino=34215 res=1