Warning: Permanently added '10.128.1.191' (ED25519) to the list of known hosts. 2023/12/09 18:31:35 ignoring optional flag "sandboxArg"="0" 2023/12/09 18:31:35 parsed 1 programs [ 40.397756][ T25] audit: type=1400 audit(1702146695.112:168): avc: denied { getattr } for pid=2116 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 40.421670][ T25] audit: type=1400 audit(1702146695.112:169): avc: denied { read } for pid=2116 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 40.442842][ T25] audit: type=1400 audit(1702146695.112:170): avc: denied { open } for pid=2116 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 40.466429][ T25] audit: type=1400 audit(1702146695.142:171): avc: denied { mounton } for pid=2121 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.491604][ T25] audit: type=1400 audit(1702146695.142:172): avc: denied { mount } for pid=2121 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 40.515382][ T25] audit: type=1400 audit(1702146695.142:173): avc: denied { write } for pid=2121 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.536143][ T25] audit: type=1400 audit(1702146695.142:174): avc: denied { read } for pid=2121 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.556633][ T25] audit: type=1400 audit(1702146695.142:175): avc: denied { read } for pid=1434 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 40.577737][ T25] audit: type=1400 audit(1702146695.142:176): avc: denied { read } for pid=1434 comm="dhcpcd" name="n13" dev="tmpfs" ino=296 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 40.599359][ T25] audit: type=1400 audit(1702146695.142:177): avc: denied { open } for pid=1434 comm="dhcpcd" path="/run/udev/data/n13" dev="tmpfs" ino=296 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 2023/12/09 18:31:36 executed programs: 0 [ 41.552487][ T2121] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 42.694188][ T2545] loop0: detected capacity change from 0 to 32768 [ 42.701641][ T2545] gfs2: fsid=syz:syz: Trying to join cluster "lock_nolock", "syz:syz" [ 42.709964][ T2545] gfs2: fsid=syz:syz: Now mounting FS (format 1801)... [ 42.718338][ T2545] gfs2: fsid=syz:syz.0: journal 0 mapped with 4 extents in 0ms [ 42.726294][ T2094] gfs2: fsid=syz:syz.0: jid=0, already locked for use [ 42.733242][ T2094] gfs2: fsid=syz:syz.0: jid=0: Looking at journal... [ 42.755407][ T2094] gfs2: fsid=syz:syz.0: jid=0: Journal head lookup took 22ms [ 42.762987][ T2094] gfs2: fsid=syz:syz.0: jid=0: Done [ 42.768273][ T2545] gfs2: fsid=syz:syz.0: first mount done, others may mount [ 42.823579][ T2545] gfs2: fsid=syz:syz.0: found 1 quota changes [ 42.833451][ T2130] syz-executor.0: attempt to access beyond end of device [ 42.833451][ T2130] loop0: rw=1, sector=131324, nr_sectors = 4 limit=32768 [ 42.848075][ T2130] gfs2: fsid=syz:syz.0: Error 10 writing to journal, jid=0 [ 42.855429][ T2130] gfs2: fsid=syz:syz.0: fatal: I/O error(s) [ 42.861383][ T2130] gfs2: fsid=syz:syz.0: about to withdraw this file system [ 42.868781][ T2130] BUG: sleeping function called from invalid context at fs/gfs2/util.c:157 [ 42.877471][ T2130] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2130, name: syz-executor.0 [ 42.887083][ T2130] preempt_count: 1, expected: 0 [ 42.892092][ T2130] RCU nest depth: 0, expected: 0 [ 42.897095][ T2130] 5 locks held by syz-executor.0/2130: [ 42.902662][ T2130] #0: ffff88810c6df0e0 (&type->s_umount_key#62){....}-{3:3}, at: deactivate_super+0x2b/0x40 [ 42.912923][ T2130] #1: ffff88810b30ab78 (&sdp->sd_quota_sync_mutex){....}-{3:3}, at: gfs2_quota_sync+0xa7/0x230 [ 42.923521][ T2130] #2: ffff88810b30b058 (&sdp->sd_log_flush_lock){....}-{3:3}, at: gfs2_log_flush+0x47/0xbe0 [ 42.933771][ T2130] #3: ffff88810b30ae80 (&sdp->sd_log_lock){....}-{2:2}, at: gfs2_flush_revokes+0x21/0x40 [ 42.943751][ T2130] #4: ffff88810b30b240 (&sdp->sd_freeze_mutex){....}-{3:3}, at: gfs2_withdraw+0x3e5/0x660 [ 42.953721][ T2130] Preemption disabled at: [ 42.953724][ T2130] [<0000000000000000>] 0x0 [ 42.962617][ T2130] CPU: 1 PID: 2130 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller #0 [ 42.971350][ T2130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 42.981560][ T2130] Call Trace: [ 42.984929][ T2130] [ 42.988017][ T2130] dump_stack_lvl+0x3d/0x60 [ 42.992491][ T2130] __might_resched+0x188/0x1e0 [ 42.997226][ T2130] gfs2_withdraw+0x42a/0x660 [ 43.001896][ T2130] gfs2_ail1_empty+0x2fd/0x310 [ 43.006624][ T2130] ? lock_acquire+0xab/0x180 [ 43.011246][ T2130] gfs2_flush_revokes+0x2c/0x40 [ 43.016067][ T2130] revoke_lo_before_commit+0x16/0x1d0 [ 43.021403][ T2130] gfs2_log_flush+0x61e/0xbe0 [ 43.026046][ T2130] ? do_sync+0x1e9/0x5f0 [ 43.030254][ T2130] do_sync+0x1fe/0x5f0 [ 43.034309][ T2130] gfs2_quota_sync+0x1e5/0x230 [ 43.039048][ T2130] gfs2_sync_fs+0x19/0x40 [ 43.043342][ T2130] sync_filesystem+0x33/0x80 [ 43.047897][ T2130] generic_shutdown_super+0x21/0x110 [ 43.053167][ T2130] kill_block_super+0x15/0x40 [ 43.057998][ T2130] deactivate_locked_super+0x28/0xa0 [ 43.063426][ T2130] cleanup_mnt+0xb0/0x140 [ 43.067826][ T2130] task_work_run+0x55/0x90 [ 43.072207][ T2130] exit_to_user_mode_prepare+0x146/0x150 [ 43.077805][ T2130] syscall_exit_to_user_mode+0x17/0x40 [ 43.083234][ T2130] do_syscall_64+0x4d/0xe0 [ 43.087622][ T2130] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 43.093490][ T2130] RIP: 0033:0x7fb71767de17 [ 43.097870][ T2130] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 43.117784][ T2130] RSP: 002b:00007ffed042e4f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 43.126246][ T2130] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fb71767de17 [ 43.134302][ T2130] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007ffed042e5b0 [ 43.142325][ T2130] RBP: 00007ffed042e5b0 R08: 0000000000000000 R09: 0000000000000000 [ 43.150440][ T2130] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffed042f670 [ 43.158403][ T2130] R13: 00007fb7176c73b9 R14: 000000000000a66c R15: 0000000000000001 [ 43.166693][ T2130] [ 43.169796][ T2130] BUG: scheduling while atomic: syz-executor.0/2130/0x00000002 [ 43.177426][ T2130] 5 locks held by syz-executor.0/2130: [ 43.182867][ T2130] #0: ffff88810c6df0e0 (&type->s_umount_key#62){....}-{3:3}, at: deactivate_super+0x2b/0x40 [ 43.193012][ T2130] #1: ffff88810b30ab78 (&sdp->sd_quota_sync_mutex){....}-{3:3}, at: gfs2_quota_sync+0xa7/0x230 [ 43.203778][ T2130] #2: ffff88810b30b058 (&sdp->sd_log_flush_lock){....}-{3:3}, at: gfs2_log_flush+0x47/0xbe0 [ 43.214011][ T2130] #3: ffff88810b30ae80 (&sdp->sd_log_lock){....}-{2:2}, at: gfs2_flush_revokes+0x21/0x40 [ 43.224175][ T2130] #4: ffff88810b30b240 (&sdp->sd_freeze_mutex){....}-{3:3}, at: gfs2_withdraw+0x3e5/0x660 [ 43.234259][ T2130] Modules linked in: [ 43.238237][ T2130] Preemption disabled at: [ 43.238240][ T2130] [<0000000000000000>] 0x0 [ 43.247046][ T2130] Kernel panic - not syncing: scheduling while atomic: panic_on_warn set ... [ 43.255869][ T2130] Kernel Offset: disabled [ 43.260190][ T2130] Rebooting in 86400 seconds..