BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 1, pid: 7652, name: syz-executor1 4 locks held by syz-executor1/7652: #0: (ptrval) (sb_writers#4){.+.+}, at: sb_start_write include/linux/fs.h:1550 [inline] #0: (ptrval) (sb_writers#4){.+.+}, at: mnt_want_write+0x3f/0xc0 fs/namespace.c:386 #1: (ptrval) (&type->i_mutex_dir_key/1){+.+.}, at: inode_lock_nested include/linux/fs.h:748 [inline] #1: (ptrval) (&type->i_mutex_dir_key/1){+.+.}, at: do_rmdir+0x37b/0x610 fs/namei.c:3899 #2: (ptrval) (&type->i_mutex_dir_key){++++}, at: inode_lock include/linux/fs.h:713 [inline] #2: (ptrval) (&type->i_mutex_dir_key){++++}, at: vfs_rmdir+0xe0/0x470 fs/namei.c:3840 #3: (ptrval) (jbd2_handle){.+.+}, at: start_this_handle+0x581/0x1250 fs/jbd2/transaction.c:385 irq event stamp: 375676 hardirqs last enabled at (375675): [] lookup_bh_lru fs/buffer.c:1271 [inline] hardirqs last enabled at (375675): [] __find_get_block+0x2b8/0xe50 fs/buffer.c:1283 hardirqs last disabled at (375676): [] interrupt_entry+0xb5/0xf0 arch/x86/entry/entry_64.S:625 softirqs last enabled at (375544): [] __do_softirq+0x778/0xaf5 kernel/softirq.c:311 softirqs last disabled at (375537): [] invoke_softirq kernel/softirq.c:365 [inline] softirqs last disabled at (375537): [] irq_exit+0x1d1/0x200 kernel/softirq.c:405 CPU: 0 PID: 7652 Comm: syz-executor1 Not tainted 4.17.0-rc2+ #24 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 ___might_sleep.cold.87+0x11f/0x13a kernel/sched/core.c:6188 __might_sleep+0x95/0x190 kernel/sched/core.c:6141 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2b9/0x760 mm/slab.c:3727 kmalloc_array include/linux/slab.h:631 [inline] kcalloc include/linux/slab.h:642 [inline] numa_crng_init drivers/char/random.c:798 [inline] crng_reseed+0x427/0x920 drivers/char/random.c:923 credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708 add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254 handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191 handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206 handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77 do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642 RIP: 0010:pv_queued_spin_unlock arch/x86/include/asm/paravirt.h:679 [inline] RIP: 0010:queued_spin_unlock arch/x86/include/asm/qspinlock.h:35 [inline] RIP: 0010:do_raw_spin_unlock+0x1df/0x2e0 kernel/locking/spinlock_debug.c:135 RSP: 0018:ffff8801a432f6c8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffffd9 RAX: dffffc0000000000 RBX: ffffffff88c126c0 RCX: ffffffff815df73e RDX: 1ffffffff11a3179 RSI: 0000000000000004 RDI: ffffffff88d18bc8 RBP: ffff8801a432f750 R08: fffffbfff11824d9 R09: fffffbfff11824d8 R10: fffffbfff11824d8 R11: ffffffff88c126c3 R12: 1ffff10034865ed9 R13: ffffffff88c126d0 R14: ffffffff88c126c8 R15: 0000000000000001 __raw_spin_unlock include/linux/spinlock_api_smp.h:151 [inline] _raw_spin_unlock+0x22/0x30 kernel/locking/spinlock.c:176 spin_unlock include/linux/spinlock.h:350 [inline] find_inode_nowait+0x113/0x190 fs/inode.c:1379 ext4_update_other_inodes_time fs/ext4/inode.c:5095 [inline] ext4_do_update_inode fs/ext4/inode.c:5221 [inline] ext4_mark_iloc_dirty+0x23e4/0x2e90 fs/ext4/inode.c:5741 ext4_mark_inode_dirty+0x23b/0xb20 fs/ext4/inode.c:5920 ext4_rmdir+0xa14/0xd20 fs/ext4/namei.c:2974 vfs_rmdir+0x251/0x470 fs/namei.c:3851 do_rmdir+0x523/0x610 fs/namei.c:3911 __do_sys_rmdir fs/namei.c:3929 [inline] __se_sys_rmdir fs/namei.c:3927 [inline] __x64_sys_rmdir+0x36/0x40 fs/namei.c:3927 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4556e7 RSP: 002b:00007ffe4c82d1e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000054 RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 00000000004556e7 RDX: 0000000000000000 RSI: 00007ffe4c82ef90 RDI: 00007ffe4c82ef90 RBP: 00007ffe4c82ef90 R08: 0000000000000000 R09: 0000000000000001 R10: 000000000000000a R11: 0000000000000206 R12: 00000000026fb940 R13: 0000000000000000 R14: 000000000000008a R15: 000000000001b18f random: crng init done can: request_module (can-proto-5) failed. can: request_module (can-proto-5) failed. gfs2: gfs2 mount does not exist gfs2: gfs2 mount does not exist tmpfs: No value for mount option '­•eXý˜ø^xyCÖmqÙ¨‹ÿ ƒ×í' tmpfs: No value for mount option '­•eXý˜ø^xyCÖmqÙ¨‹ÿ ƒ×í' IPVS: ftp: loaded support on port[0] = 21 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 9821 Comm: syz-executor1 Tainted: G W 4.17.0-rc2+ #24 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc_track_caller+0x2c4/0x760 mm/slab.c:3733 memdup_user+0x2c/0xa0 mm/util.c:160 map_lookup_elem+0x242/0x970 kernel/bpf/syscall.c:618 __do_sys_bpf kernel/bpf/syscall.c:2088 [inline] __se_sys_bpf kernel/bpf/syscall.c:2062 [inline] __x64_sys_bpf+0x31a/0x4e0 kernel/bpf/syscall.c:2062 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455979 RSP: 002b:00007f869472cc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f869472d6d4 RCX: 0000000000455979 RDX: 0000000000000018 RSI: 00000000200010c0 RDI: 0000000000000001 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 R13: 0000000000000040 R14: 00000000006f46a0 R15: 0000000000000000 xprt_adjust_timeout: rq_timeout = 0! xprt_adjust_timeout: rq_timeout = 0! FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 9888 Comm: syz-executor1 Tainted: G W 4.17.0-rc2+ #24 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2c8/0x760 mm/slab.c:3727 kmalloc include/linux/slab.h:517 [inline] map_lookup_elem+0x3a8/0x970 kernel/bpf/syscall.c:634 __do_sys_bpf kernel/bpf/syscall.c:2088 [inline] __se_sys_bpf kernel/bpf/syscall.c:2062 [inline] __x64_sys_bpf+0x31a/0x4e0 kernel/bpf/syscall.c:2062 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455979 RSP: 002b:00007f869472cc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f869472d6d4 RCX: 0000000000455979 RDX: 0000000000000018 RSI: 00000000200010c0 RDI: 0000000000000001 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 R13: 0000000000000040 R14: 00000000006f46a0 R15: 0000000000000001