loop3: rw=0, want=13466418, limit=128 Buffer I/O error on dev loop3, logical block 13466417, async page read attempt to access beyond end of device loop3: rw=0, want=8073606, limit=128 Buffer I/O error on dev loop3, logical block 8073605, async page read BUG: sleeping function called from invalid context at fs/buffer.c:1381 in_atomic(): 1, irqs_disabled(): 0, pid: 10604, name: syz-executor.3 2 locks held by syz-executor.3/10604: #0: (&iint->mutex){+.+.}, at: [] process_measurement+0x270/0xb20 security/integrity/ima/ima_main.c:225 #1: (pointers_lock){.+.+}, at: [] get_block+0x153/0x1230 fs/sysv/itree.c:217 Preemption disabled at: [< (null)>] (null) CPU: 0 PID: 10604 Comm: syz-executor.3 Not tainted 4.14.301-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6041 __getblk_gfp fs/buffer.c:1381 [inline] __bread_gfp+0x3e/0x2e0 fs/buffer.c:1428 sb_bread include/linux/buffer_head.h:343 [inline] get_branch+0x2ac/0x600 fs/sysv/itree.c:104 get_block+0x176/0x1230 fs/sysv/itree.c:218 block_read_full_page+0x25e/0x8d0 fs/buffer.c:2316 read_pages mm/readahead.c:131 [inline] __do_page_cache_readahead+0x69b/0x940 mm/readahead.c:199 ra_submit mm/internal.h:66 [inline] ondemand_readahead.isra.0+0x514/0xb60 mm/readahead.c:486 page_cache_sync_readahead mm/readahead.c:518 [inline] page_cache_sync_readahead+0xa6/0xf0 mm/readahead.c:503 generic_file_buffered_read mm/filemap.c:2003 [inline] generic_file_read_iter+0xfbc/0x21c0 mm/filemap.c:2273 call_read_iter include/linux/fs.h:1774 [inline] new_sync_read fs/read_write.c:401 [inline] __vfs_read+0x449/0x620 fs/read_write.c:413 integrity_kernel_read+0x11b/0x1b0 security/integrity/iint.c:199 ima_calc_file_hash_tfm security/integrity/ima/ima_crypto.c:381 [inline] ima_calc_file_shash security/integrity/ima/ima_crypto.c:410 [inline] ima_calc_file_hash+0x3ee/0x780 security/integrity/ima/ima_crypto.c:467 ima_collect_measurement+0x39d/0x430 security/integrity/ima/ima_api.c:227 process_measurement+0x78b/0xb20 security/integrity/ima/ima_main.c:264 do_last fs/namei.c:3435 [inline] path_openat+0x10ad/0x2970 fs/namei.c:3571 do_filp_open+0x179/0x3c0 fs/namei.c:3605 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7ffae8e9c0d9 RSP: 002b:00007ffae740e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007ffae8fbbf80 RCX: 00007ffae8e9c0d9 RDX: 0000000000000000 RSI: 000000000000007e RDI: 0000000020000180 RBP: 00007ffae8ef7ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd58bd452f R14: 00007ffae740e300 R15: 0000000000022000 attempt to access beyond end of device loop3: rw=0, want=3245519, limit=128 Buffer I/O error on dev loop3, logical block 3245518, async page read attempt to access beyond end of device loop3: rw=0, want=8769404, limit=128 Buffer I/O error on dev loop3, logical block 8769403, async page read attempt to access beyond end of device loop3: rw=0, want=3245513, limit=128 attempt to access beyond end of device loop3: rw=0, want=8767868, limit=128 attempt to access beyond end of device loop3: rw=0, want=13269810, limit=128 attempt to access beyond end of device loop3: rw=0, want=8073606, limit=128 attempt to access beyond end of device loop3: rw=0, want=3245516, limit=128 attempt to access beyond end of device loop3: rw=0, want=8768636, limit=128 attempt to access beyond end of device loop3: rw=0, want=13466418, limit=128 attempt to access beyond end of device loop3: rw=0, want=8073606, limit=128 audit: type=1800 audit(1670683500.531:2): pid=10604 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.3" name="/" dev="loop3" ino=2 res=0 ====================================================== WARNING: the mand mount option is being deprecated and will be removed in v5.15! ====================================================== hub 9-0:1.0: USB hub found hub 9-0:1.0: 8 ports detected audit: type=1107 audit(1670683501.941:3): pid=10801 uid=0 auid=4294967295 ses=4294967295 msg='u' audit: type=1107 audit(1670683501.971:4): pid=10809 uid=0 auid=4294967295 ses=4294967295 msg='u' netlink: 1236 bytes leftover after parsing attributes in process `syz-executor.5'. unregister_netdevice: waiting for ip6gre0 to become free. Usage count = -1 netlink: 1228 bytes leftover after parsing attributes in process `syz-executor.5'. audit: type=1107 audit(1670683502.422:5): pid=10909 uid=0 auid=4294967295 ses=4294967295 msg='u' netlink: 1236 bytes leftover after parsing attributes in process `syz-executor.0'. audit: type=1804 audit(1670683502.712:6): pid=10982 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir2763613266/syzkaller.8RVDIK/85/file0" dev="sda1" ino=13957 res=1 audit: type=1800 audit(1670683502.982:7): pid=11025 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file1" dev="sda1" ino=13995 res=0 audit: type=1800 audit(1670683503.052:8): pid=11038 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=13957 res=0 audit: type=1800 audit(1670683503.052:9): pid=11039 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=13968 res=0 audit: type=1800 audit(1670683503.112:10): pid=11052 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=13957 res=0 audit: type=1800 audit(1670683503.162:11): pid=11064 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file1" dev="sda1" ino=14036 res=0 audit: type=1800 audit(1670683503.212:12): pid=11072 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=14021 res=0 kauditd_printk_skb: 5 callbacks suppressed audit: type=1800 audit(1670683508.692:18): pid=11691 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name=".pending_reads" dev="sda1" ino=14099 res=0