loop0: detected capacity change from 0 to 32768 ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README Error parsing options; rc = [-22] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt syz.0.0: attempt to access beyond end of device loop0: rw=0, sector=64, nr_sectors = 8 limit=0 syz.0.0: attempt to access beyond end of device loop0: rw=0, sector=120, nr_sectors = 8 limit=0 ERROR: (device loop0): remounting filesystem as read-only ------------[ cut here ]------------ DEBUG_LOCKS_WARN_ON(1) WARNING: CPU: 0 PID: 5107 at kernel/locking/lockdep.c:232 hlock_class kernel/locking/lockdep.c:232 [inline] WARNING: CPU: 0 PID: 5107 at kernel/locking/lockdep.c:232 check_wait_context kernel/locking/lockdep.c:4826 [inline] WARNING: CPU: 0 PID: 5107 at kernel/locking/lockdep.c:232 __lock_acquire+0x58c/0x2050 kernel/locking/lockdep.c:5152 Modules linked in: CPU: 0 UID: 0 PID: 5107 Comm: syz.0.0 Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:hlock_class kernel/locking/lockdep.c:232 [inline] RIP: 0010:check_wait_context kernel/locking/lockdep.c:4826 [inline] RIP: 0010:__lock_acquire+0x58c/0x2050 kernel/locking/lockdep.c:5152 Code: 00 00 83 3d 85 df ac 0e 00 75 23 90 48 c7 c7 e0 c9 0a 8c 48 c7 c6 80 cc 0a 8c e8 9f 7f e5 ff 48 ba 00 00 00 00 00 fc ff df 90 <0f> 0b 90 90 90 31 db 48 81 c3 c4 00 00 00 48 89 d8 48 c1 e8 03 0f RSP: 0018:ffffc9000b33f330 EFLAGS: 00010046 RAX: 5009e1236070a900 RBX: 0000000000000b68 RCX: 0000000000040000 RDX: dffffc0000000000 RSI: 0000000000002e00 RDI: 0000000000002e01 RBP: 0000000000000014 R08: ffffffff8155d402 R09: 1ffff11003f8519a R10: dffffc0000000000 R11: ffffed1003f8519b R12: ffff888000a58000 R13: 0000000000000b68 R14: 1ffff1100014b174 R15: ffff888000a58ba0 FS: 00007ff3fdd176c0(0000) GS:ffff88801fc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000557236723828 CR3: 000000003df50000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162 __wake_up_common_lock+0x25/0x1e0 kernel/sched/wait.c:105 unlock_metapage fs/jfs/jfs_metapage.c:39 [inline] release_metapage+0xb2/0x960 fs/jfs/jfs_metapage.c:763 xtTruncate+0x1006/0x3270 jfs_truncate_nolock+0x2e4/0x390 fs/jfs/inode.c:373 jfs_truncate fs/jfs/inode.c:412 [inline] jfs_write_failed+0x11a/0x190 fs/jfs/inode.c:289 jfs_write_begin+0x64/0x70 fs/jfs/inode.c:301 generic_perform_write+0x344/0x6d0 mm/filemap.c:4054 generic_file_write_iter+0xae/0x310 mm/filemap.c:4181 new_sync_write fs/read_write.c:590 [inline] vfs_write+0xa6d/0xc90 fs/read_write.c:683 ksys_write+0x183/0x2b0 fs/read_write.c:736 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ff3fcf7dff9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff3fdd17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007ff3fd135f80 RCX: 00007ff3fcf7dff9 RDX: 0000000000000018 RSI: 0000000020000080 RDI: 0000000000000004 RBP: 00007ff3fcff0296 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ff3fd135f80 R15: 00007ffd11508688