syzbot


BUG: sleeping function called from invalid context in __getblk_gfp

Status: upstream: reported C repro on 2023/03/14 21:24
Bug presence: origin:lts-only
[Documentation on labels]
Reported-by: syzbot+996485c5a957b7709bac@syzkaller.appspotmail.com
First crash: 407d, last: 12d
Bug presence (2)
Date Name Commit Repro Result
2024/04/23 linux-6.1.y (ToT) 6741e066ec76 C [report] KASAN: use-after-free Read in sysv_new_inode
2024/04/23 upstream (ToT) 9d1ddab261f3 C Didn't crash
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream BUG: sleeping function called from invalid context in __getblk_gfp fs C error done 3673 120d 514d 26/26 fixed on 2024/04/10 03:59
linux-5.15 BUG: sleeping function called from invalid context in __getblk_gfp origin:upstream missing-backport C error 241 12d 407d 0/3 upstream: reported C repro on 2023/03/14 19:21

Sample crash report:
Buffer I/O error on dev loop0, logical block 13466417, async page read
syz-executor763: attempt to access beyond end of device
loop0: rw=0, sector=16147212, nr_sectors = 2 limit=128
Buffer I/O error on dev loop0, logical block 8073606, async page read
BUG: sleeping function called from invalid context at fs/buffer.c:1331
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4222, name: syz-executor763
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
3 locks held by syz-executor763/4222:
 #0: ffff0000d7b9e460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:393
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3549 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x5ec/0x2548 fs/namei.c:3782
 #2: ffff800015cc3418 (pointers_lock){.+.+}-{2:2}, at: get_block+0x148/0x13b4 fs/sysv/itree.c:221
Preemption disabled at:
[<ffff8000093ffd3c>] get_block+0x148/0x13b4 fs/sysv/itree.c:221
CPU: 1 PID: 4222 Comm: syz-executor763 Not tainted 6.1.79-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call trace:
 dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
 dump_stack+0x1c/0x58 lib/dump_stack.c:113
 __might_resched+0x37c/0x4d8 kernel/sched/core.c:9942
 __might_sleep+0x90/0xe4 kernel/sched/core.c:9871
 __getblk_gfp+0x5c/0x874 fs/buffer.c:1331
 __bread_gfp+0x3c/0x2ec fs/buffer.c:1367
 sb_bread include/linux/buffer_head.h:338 [inline]
 get_branch+0x234/0x55c fs/sysv/itree.c:104
 get_block+0x164/0x13b4 fs/sysv/itree.c:222
 block_read_full_folio+0x2f4/0x98c fs/buffer.c:2271
 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:465
 filemap_read_folio+0x14c/0x39c mm/filemap.c:2461
 do_read_cache_folio+0x24c/0x544 mm/filemap.c:3598
 do_read_cache_page mm/filemap.c:3640 [inline]
 read_cache_page+0x6c/0x180 mm/filemap.c:3649
 read_mapping_page include/linux/pagemap.h:791 [inline]
 dir_get_page fs/sysv/dir.c:58 [inline]
 sysv_find_entry+0x170/0x5a8 fs/sysv/dir.c:146
 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:360
 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38
 lookup_open fs/namei.c:3462 [inline]
 open_last_lookups fs/namei.c:3552 [inline]
 path_openat+0xd3c/0x2548 fs/namei.c:3782
 do_filp_open+0x1bc/0x3cc fs/namei.c:3812
 do_sys_openat2+0x128/0x3d8 fs/open.c:1318
 do_sys_open fs/open.c:1334 [inline]
 __do_sys_openat fs/open.c:1350 [inline]
 __se_sys_openat fs/open.c:1345 [inline]
 __arm64_sys_openat+0x1f0/0x240 fs/open.c:1345
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
syz-executor763: attempt to access beyond end of device
loop0: rw=0, sector=6491548, nr_sectors = 2 limit=128
Buffer I/O error on dev loop0, logical block 3245774, async page read
syz-executor763: attempt to access beyond end of device
loop0: rw=0, sector=17669878, nr_sectors = 2 limit=128
Buffer I/O error on dev loop0, logical block 8834939, async page read
BUG: sleeping function called from invalid context at fs/buffer.c:1331
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4222, name: syz-executor763
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
3 locks held by syz-executor763/4222:
 #0: ffff0000d7b9e460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:393
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3549 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x5ec/0x2548 fs/namei.c:3782
 #2: ffff800015cc3418 (pointers_lock){.+.+}-{2:2}, at: get_block+0x148/0x13b4 fs/sysv/itree.c:221
Preemption disabled at:
[<ffff8000093ffd3c>] get_block+0x148/0x13b4 fs/sysv/itree.c:221
CPU: 1 PID: 4222 Comm: syz-executor763 Tainted: G        W          6.1.79-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call trace:
 dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
 dump_stack+0x1c/0x58 lib/dump_stack.c:113
 __might_resched+0x37c/0x4d8 kernel/sched/core.c:9942
 __might_sleep+0x90/0xe4 kernel/sched/core.c:9871
 __getblk_gfp+0x5c/0x874 fs/buffer.c:1331
 __bread_gfp+0x3c/0x2ec fs/buffer.c:1367
 sb_bread include/linux/buffer_head.h:338 [inline]
 get_branch+0x234/0x55c fs/sysv/itree.c:104
 get_block+0x164/0x13b4 fs/sysv/itree.c:222
 block_read_full_folio+0x2f4/0x98c fs/buffer.c:2271
 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:465
 filemap_read_folio+0x14c/0x39c mm/filemap.c:2461
 do_read_cache_folio+0x24c/0x544 mm/filemap.c:3598
 do_read_cache_page mm/filemap.c:3640 [inline]
 read_cache_page+0x6c/0x180 mm/filemap.c:3649
 read_mapping_page include/linux/pagemap.h:791 [inline]
 dir_get_page fs/sysv/dir.c:58 [inline]
 sysv_find_entry+0x170/0x5a8 fs/sysv/dir.c:146
 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:360
 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38
 lookup_open fs/namei.c:3462 [inline]
 open_last_lookups fs/namei.c:3552 [inline]
 path_openat+0xd3c/0x2548 fs/namei.c:3782
 do_filp_open+0x1bc/0x3cc fs/namei.c:3812
 do_sys_openat2+0x128/0x3d8 fs/open.c:1318
 do_sys_open fs/open.c:1334 [inline]
 __do_sys_openat fs/open.c:1350 [inline]
 __se_sys_openat fs/open.c:1345 [inline]
 __arm64_sys_openat+0x1f0/0x240 fs/open.c:1345
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
BUG: sleeping function called from invalid context at fs/buffer.c:1331
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4222, name: syz-executor763
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
3 locks held by syz-executor763/4222:
 #0: ffff0000d7b9e460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:393
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3549 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x5ec/0x2548 fs/namei.c:3782
 #2: ffff800015cc3418 (pointers_lock){.+.+}-{2:2}, at: get_block+0x148/0x13b4 fs/sysv/itree.c:221
Preemption disabled at:
[<ffff8000093ffd3c>] get_block+0x148/0x13b4 fs/sysv/itree.c:221
CPU: 1 PID: 4222 Comm: syz-executor763 Tainted: G        W          6.1.79-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call trace:
 dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
 dump_stack+0x1c/0x58 lib/dump_stack.c:113
 __might_resched+0x37c/0x4d8 kernel/sched/core.c:9942
 __might_sleep+0x90/0xe4 kernel/sched/core.c:9871
 __getblk_gfp+0x5c/0x874 fs/buffer.c:1331
 __bread_gfp+0x3c/0x2ec fs/buffer.c:1367
 sb_bread include/linux/buffer_head.h:338 [inline]
 get_branch+0x234/0x55c fs/sysv/itree.c:104
 get_block+0x164/0x13b4 fs/sysv/itree.c:222
 block_read_full_folio+0x2f4/0x98c fs/buffer.c:2271
 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:465
 filemap_read_folio+0x14c/0x39c mm/filemap.c:2461
 do_read_cache_folio+0x24c/0x544 mm/filemap.c:3598
 do_read_cache_page mm/filemap.c:3640 [inline]
 read_cache_page+0x6c/0x180 mm/filemap.c:3649
 read_mapping_page include/linux/pagemap.h:791 [inline]
 dir_get_page fs/sysv/dir.c:58 [inline]
 sysv_find_entry+0x170/0x5a8 fs/sysv/dir.c:146
 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:360
 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38
 lookup_open fs/namei.c:3462 [inline]
 open_last_lookups fs/namei.c:3552 [inline]
 path_openat+0xd3c/0x2548 fs/namei.c:3782
 do_filp_open+0x1bc/0x3cc fs/namei.c:3812
 do_sys_openat2+0x128/0x3d8 fs/open.c:1318
 do_sys_open fs/open.c:1334 [inline]
 __do_sys_openat fs/open.c:1350 [inline]
 __se_sys_openat fs/open.c:1345 [inline]
 __arm64_sys_openat+0x1f0/0x240 fs/open.c:1345
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
BUG: sleeping function called from invalid context at fs/buffer.c:1331
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4222, name: syz-executor763
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
3 locks held by syz-executor763/4222:
 #0: ffff0000d7b9e460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:393
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3549 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x5ec/0x2548 fs/namei.c:3782
 #2: ffff800015cc3418 (pointers_lock){.+.+}-{2:2}, at: get_block+0x148/0x13b4 fs/sysv/itree.c:221
Preemption disabled at:
[<ffff8000093ffd3c>] get_block+0x148/0x13b4 fs/sysv/itree.c:221
CPU: 1 PID: 4222 Comm: syz-executor763 Tainted: G        W          6.1.79-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call trace:
 dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
 dump_stack+0x1c/0x58 lib/dump_stack.c:113
 __might_resched+0x37c/0x4d8 kernel/sched/core.c:9942
 __might_sleep+0x90/0xe4 kernel/sched/core.c:9871
 __getblk_gfp+0x5c/0x874 fs/buffer.c:1331
 __bread_gfp+0x3c/0x2ec fs/buffer.c:1367
 sb_bread include/linux/buffer_head.h:338 [inline]
 get_branch+0x234/0x55c fs/sysv/itree.c:104
 get_block+0x164/0x13b4 fs/sysv/itree.c:222
 block_read_full_folio+0x2f4/0x98c fs/buffer.c:2271
 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:465
 filemap_read_folio+0x14c/0x39c mm/filemap.c:2461
 do_read_cache_folio+0x24c/0x544 mm/filemap.c:3598
 do_read_cache_page mm/filemap.c:3640 [inline]
 read_cache_page+0x6c/0x180 mm/filemap.c:3649
 read_mapping_page include/linux/pagemap.h:791 [inline]
 dir_get_page fs/sysv/dir.c:58 [inline]
 sysv_find_entry+0x170/0x5a8 fs/sysv/dir.c:146
 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:360
 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38
 lookup_open fs/namei.c:3462 [inline]
 open_last_lookups fs/namei.c:3552 [inline]
 path_openat+0xd3c/0x2548 fs/namei.c:3782
 do_filp_open+0x1bc/0x3cc fs/namei.c:3812
 do_sys_openat2+0x128/0x3d8 fs/open.c:1318
 do_sys_open fs/open.c:1334 [inline]
 __do_sys_openat fs/open.c:1350 [inline]
 __se_sys_openat fs/open.c:1345 [inline]
 __arm64_sys_openat+0x1f0/0x240 fs/open.c:1345
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
BUG: sleeping function called from invalid context at fs/buffer.c:1331
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4222, name: syz-executor763
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
3 locks held by syz-executor763/4222:
 #0: ffff0000d7b9e460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:393
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3549 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x5ec/0x2548 fs/namei.c:3782
 #2: ffff800015cc3418 (pointers_lock){.+.+}-{2:2}, at: get_block+0x148/0x13b4 fs/sysv/itree.c:221
Preemption disabled at:
[<ffff8000093ffd3c>] get_block+0x148/0x13b4 fs/sysv/itree.c:221
CPU: 1 PID: 4222 Comm: syz-executor763 Tainted: G        W          6.1.79-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call trace:
 dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
 dump_stack+0x1c/0x58 lib/dump_stack.c:113
 __might_resched+0x37c/0x4d8 kernel/sched/core.c:9942
 __might_sleep+0x90/0xe4 kernel/sched/core.c:9871
 __getblk_gfp+0x5c/0x874 fs/buffer.c:1331
 __bread_gfp+0x3c/0x2ec fs/buffer.c:1367
 sb_bread include/linux/buffer_head.h:338 [inline]
 get_branch+0x234/0x55c fs/sysv/itree.c:104
 get_block+0x164/0x13b4 fs/sysv/itree.c:222
 block_read_full_folio+0x2f4/0x98c fs/buffer.c:2271
 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:465
 filemap_read_folio+0x14c/0x39c mm/filemap.c:2461
 do_read_cache_folio+0x24c/0x544 mm/filemap.c:3598
 do_read_cache_page mm/filemap.c:3640 [inline]
 read_cache_page+0x6c/0x180 mm/filemap.c:3649
 read_mapping_page include/linux/pagemap.h:791 [inline]
 dir_get_page fs/sysv/dir.c:58 [inline]
 sysv_find_entry+0x170/0x5a8 fs/sysv/dir.c:146
 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:360
 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38
 lookup_open fs/namei.c:3462 [inline]
 open_last_lookups fs/namei.c:3552 [inline]
 path_openat+0xd3c/0x2548 fs/namei.c:3782
 do_filp_open+0x1bc/0x3cc fs/namei.c:3812
 do_sys_openat2+0x128/0x3d8 fs/open.c:1318
 do_sys_open fs/open.c:1334 [inline]
 __do_sys_openat fs/open.c:1350 [inline]
 __se_sys_openat fs/open.c:1345 [inline]
 __arm64_sys_openat+0x1f0/0x240 fs/open.c:1345
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
BUG: sleeping function called from invalid context at fs/buffer.c:1331
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4222, name: syz-executor763
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
3 locks held by syz-executor763/4222:
 #0: ffff0000d7b9e460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:393
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3549 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x5ec/0x2548 fs/namei.c:3782
 #2: ffff800015cc3418 (pointers_lock){.+.+}-{2:2}, at: get_block+0x148/0x13b4 fs/sysv/itree.c:221
Preemption disabled at:
[<ffff8000093ffd3c>] get_block+0x148/0x13b4 fs/sysv/itree.c:221
CPU: 1 PID: 4222 Comm: syz-executor763 Tainted: G        W          6.1.79-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call trace:
 dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
 dump_stack+0x1c/0x58 lib/dump_stack.c:113
 __might_resched+0x37c/0x4d8 kernel/sched/core.c:9942
 __might_sleep+0x90/0xe4 kernel/sched/core.c:9871
 __getblk_gfp+0x5c/0x874 fs/buffer.c:1331
 __bread_gfp+0x3c/0x2ec fs/buffer.c:1367
 sb_bread include/linux/buffer_head.h:338 [inline]
 get_branch+0x234/0x55c fs/sysv/itree.c:104
 get_block+0x164/0x13b4 fs/sysv/itree.c:222
 block_read_full_folio+0x2f4/0x98c fs/buffer.c:2271
 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:465
 filemap_read_folio+0x14c/0x39c mm/filemap.c:2461
 do_read_cache_folio+0x24c/0x544 mm/filemap.c:3598
 do_read_cache_page mm/filemap.c:3640 [inline]
 read_cache_page+0x6c/0x180 mm/filemap.c:3649
 read_mapping_page include/linux/pagemap.h:791 [inline]
 dir_get_page fs/sysv/dir.c:58 [inline]
 sysv_find_entry+0x170/0x5a8 fs/sysv/dir.c:146
 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:360
 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38
 lookup_open fs/namei.c:3462 [inline]
 open_last_lookups fs/namei.c:3552 [inline]
 path_openat+0xd3c/0x2548 fs/namei.c:3782
 do_filp_open+0x1bc/0x3cc fs/namei.c:3812
 do_sys_openat2+0x128/0x3d8 fs/open.c:1318
 do_sys_open fs/open.c:1334 [inline]
 __do_sys_openat fs/open.c:1350 [inline]
 __se_sys_openat fs/open.c:1345 [inline]
 __arm64_sys_openat+0x1f0/0x240 fs/open.c:1345
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
BUG: sleeping function called from invalid context at fs/buffer.c:1331
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4222, name: syz-executor763
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
3 locks held by syz-executor763/4222:
 #0: ffff0000d7b9e460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:393
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3549 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x5ec/0x2548 fs/namei.c:3782
 #2: ffff800015cc3418 (pointers_lock){.+.+}-{2:2}, at: get_block+0x148/0x13b4 fs/sysv/itree.c:221
Preemption disabled at:
[<ffff8000093ffd3c>] get_block+0x148/0x13b4 fs/sysv/itree.c:221
CPU: 1 PID: 4222 Comm: syz-executor763 Tainted: G        W          6.1.79-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call trace:
 dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
 dump_stack+0x1c/0x58 lib/dump_stack.c:113
 __might_resched+0x37c/0x4d8 kernel/sched/core.c:9942
 __might_sleep+0x90/0xe4 kernel/sched/core.c:9871
 __getblk_gfp+0x5c/0x874 fs/buffer.c:1331
 __bread_gfp+0x3c/0x2ec fs/buffer.c:1367
 sb_bread include/linux/buffer_head.h:338 [inline]
 get_branch+0x234/0x55c fs/sysv/itree.c:104
 get_block+0x164/0x13b4 fs/sysv/itree.c:222
 block_read_full_folio+0x2f4/0x98c fs/buffer.c:2271
 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:465
 filemap_read_folio+0x14c/0x39c mm/filemap.c:2461
 do_read_cache_folio+0x24c/0x544 mm/filemap.c:3598
 do_read_cache_page mm/filemap.c:3640 [inline]
 read_cache_page+0x6c/0x180 mm/filemap.c:3649
 read_mapping_page include/linux/pagemap.h:791 [inline]
 dir_get_page fs/sysv/dir.c:58 [inline]
 sysv_find_entry+0x170/0x5a8 fs/sysv/dir.c:146
 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:360
 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38
 lookup_open fs/namei.c:3462 [inline]
 open_last_lookups fs/namei.c:3552 [inline]
 path_openat+0xd3c/0x2548 fs/namei.c:3782
 do_filp_open+0x1bc/0x3cc fs/namei.c:3812
 do_sys_openat2+0x128/0x3d8 fs/open.c:1318
 do_sys_open fs/open.c:1334 [inline]
 __do_sys_openat fs/open.c:1350 [inline]
 __se_sys_openat fs/open.c:1345 [inline]
 __arm64_sys_openat+0x1f0/0x240 fs/open.c:1345
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
BUG: sleeping function called from invalid context at fs/buffer.c:1331
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4222, name: syz-executor763
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
3 locks held by syz-executor763/4222:
 #0: ffff0000d7b9e460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:393
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3549 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x5ec/0x2548 fs/namei.c:3782
 #2: ffff800015cc3418 (pointers_lock){.+.+}-{2:2}, at: get_block+0x148/0x13b4 fs/sysv/itree.c:221
Preemption disabled at:
[<ffff8000093ffd3c>] get_block+0x148/0x13b4 fs/sysv/itree.c:221
CPU: 1 PID: 4222 Comm: syz-executor763 Tainted: G        W          6.1.79-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call trace:
 dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
 dump_stack+0x1c/0x58 lib/dump_stack.c:113
 __might_resched+0x37c/0x4d8 kernel/sched/core.c:9942
 __might_sleep+0x90/0xe4 kernel/sched/core.c:9871
 __getblk_gfp+0x5c/0x874 fs/buffer.c:1331
 __bread_gfp+0x3c/0x2ec fs/buffer.c:1367
 sb_bread include/linux/buffer_head.h:338 [inline]
 get_branch+0x234/0x55c fs/sysv/itree.c:104
 get_block+0x164/0x13b4 fs/sysv/itree.c:222
 block_read_full_folio+0x2f4/0x98c fs/buffer.c:2271
 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:465
 filemap_read_folio+0x14c/0x39c mm/filemap.c:2461
 do_read_cache_folio+0x24c/0x544 mm/filemap.c:3598
 do_read_cache_page mm/filemap.c:3640 [inline]
 read_cache_page+0x6c/0x180 mm/filemap.c:3649
 read_mapping_page include/linux/pagemap.h:791 [inline]
 dir_get_page fs/sysv/dir.c:58 [inline]
 sysv_find_entry+0x170/0x5a8 fs/sysv/dir.c:146
 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:360
 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38
 lookup_open fs/namei.c:3462 [inline]
 open_last_lookups fs/namei.c:3552 [inline]
 path_openat+0xd3c/0x2548 fs/namei.c:3782
 do_filp_open+0x1bc/0x3cc fs/namei.c:3812
 do_sys_openat2+0x128/0x3d8 fs/open.c:1318
 do_sys_open fs/open.c:1334 [inline]
 __do_sys_openat fs/open.c:1350 [inline]
 __se_sys_openat fs/open.c:1345 [inline]
 __arm64_sys_openat+0x1f0/0x240 fs/open.c:1345
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
BUG: sleeping function called from invalid context at fs/buffer.c:1331
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4222, name: syz-executor763
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
3 locks held by syz-executor763/4222:
 #0: ffff0000d7b9e460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:393
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3549 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x5ec/0x2548 fs/namei.c:3782
 #2: ffff800015cc3418 (pointers_lock){.+.+}-{2:2}, at: get_block+0x148/0x13b4 fs/sysv/itree.c:221
Preemption disabled at:
[<ffff8000093ffd3c>] get_block+0x148/0x13b4 fs/sysv/itree.c:221
CPU: 1 PID: 4222 Comm: syz-executor763 Tainted: G        W          6.1.79-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call trace:
 dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
 dump_stack+0x1c/0x58 lib/dump_stack.c:113
 __might_resched+0x37c/0x4d8 kernel/sched/core.c:9942
 __might_sleep+0x90/0xe4 kernel/sched/core.c:9871
 __getblk_gfp+0x5c/0x874 fs/buffer.c:1331
 __bread_gfp+0x3c/0x2ec fs/buffer.c:1367
 sb_bread include/linux/buffer_head.h:338 [inline]
 get_branch+0x234/0x55c fs/sysv/itree.c:104
 get_block+0x164/0x13b4 fs/sysv/itree.c:222
 block_read_full_folio+0x2f4/0x98c fs/buffer.c:2271
 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:465
 filemap_read_folio+0x14c/0x39c mm/filemap.c:2461
 do_read_cache_folio+0x24c/0x544 mm/filemap.c:3598
 do_read_cache_page mm/filemap.c:3640 [inline]
 read_cache_page+0x6c/0x180 mm/filemap.c:3649
 read_mapping_page include/linux/pagemap.h:791 [inline]
 dir_get_page fs/sysv/dir.c:58 [inline]
 sysv_find_entry+0x170/0x5a8 fs/sysv/dir.c:146
 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:360
 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38
 lookup_open fs/namei.c:3462 [inline]
 open_last_lookups fs/namei.c:3552 [inline]
 path_openat+0xd3c/0x2548 fs/namei.c:3782
 do_filp_open+0x1bc/0x3cc fs/namei.c:3812
 do_sys_openat2+0x128/0x3d8 fs/open.c:1318
 do_sys_open fs/open.c:1334 [inline]
 __do_sys_openat fs/open.c:1350 [inline]
 __se_sys_openat fs/open.c:1345 [inline]
 __arm64_sys_openat+0x1f0/0x240 fs/open.c:1345
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
BUG: sleeping function called from invalid context at fs/buffer.c:1331
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4222, name: syz-executor763
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
3 locks held by syz-executor763/4222:
 #0: ffff0000d7b9e460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:393
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3549 [inline]
 #1: ffff0000e283c188 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x5ec/0x2548 fs/namei.c:3782
 #2: ffff800015cc3418 (pointers_lock){.+.+}-{2:2}, at: get_block+0x148/0x13b4 fs/sysv/itree.c:221
Preemption disabled at:
[<ffff8000093ffd3c>] get_block+0x148/0x13b4 fs/sysv/itree.c:221
CPU: 1 PID: 4222 Comm: syz-executor763 Tainted: G        W          6.1.79-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call trace:
 dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
 dump_stack+0x1c/0x58 lib/dump_stack.c:113
 __might_resched+0x37c/0x4d8 kernel/sched/core.c:9942
 __might_sleep+0x90/0xe4 kernel/sched/core.c:9871
 __getblk_gfp+0x5c/0x874 fs/buffer.c:1331
 __bread_gfp+0x3c/0x2ec fs/buffer.c:1367
 sb_bread include/linux/buffer_head.h:338 [inline]
 get_branch+0x234/0x55c fs/sysv/itree.c:104
 get_block+0x164/0x13b4 fs/sysv/itree.c:222
 block_read_full_folio+0x2f4/0x98c fs/buffer.c:2271
 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:465
 filemap_read_folio+0x14c/0x39c mm/filemap.c:2461
 do_read_cache_folio+0x24c/0x544 mm/filemap.c:3598
 do_read_cache_page mm/filemap.c:3640 [inline]
 read_cache_page+0x6c/0x180 mm/filemap.c:3649
 read_mapping_page include/linux/pagemap.h:791 [inline]
 dir_get_page fs/sysv/dir.c:58 [inline]
 sysv_find_entry+0x170/0x5a8 fs/sysv/dir.c:146
 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:360
 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38
 lookup_open fs/namei.c:3462 [inline]
 open_last_lookups fs/namei.c:3552 [inline]
 path_openat+0xd3c/0x2548 fs/namei.c:3782
 do_filp_open+0x1bc/0x3cc fs/namei.c:3812
 do_sys_openat2+0x128/0x3d8 fs/open.c:1318
 do_sys_open fs/open.c:1334 [inline]
 __do_sys_openat fs/open.c:1350 [inline]
 __se_sys_openat fs/open.c:1345 [inline]
 __arm64_sys_openat+0x1f0/0x240 fs/open.c:1345
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
BUG: sleeping function called from invalid context at fs/buffer.c:1331

Crashes (277):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/03/01 09:10 linux-6.1.y 81e1dc2f7001 352ab904 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/02/26 05:50 linux-6.1.y 81e1dc2f7001 8d446f15 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/01/16 13:05 linux-6.1.y fec3b1451d5f 2a7bcc7f .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/01/16 10:13 linux-6.1.y fec3b1451d5f 2a7bcc7f .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2023/10/07 15:47 linux-6.1.y ecda77b46871 5e837c76 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2023/06/24 04:56 linux-6.1.y e84a4e368abe 79782afc .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2023/05/23 02:45 linux-6.1.y fa74641fb6b9 4bce1a3e .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2023/05/18 18:01 linux-6.1.y fa74641fb6b9 3bb7af1d .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/12 20:56 linux-6.1.y bf1e3b1cb1e0 c8349e48 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/12 10:48 linux-6.1.y bf1e3b1cb1e0 27de0a5c .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/12 01:44 linux-6.1.y bf1e3b1cb1e0 95ed9ece .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/11 13:21 linux-6.1.y bf1e3b1cb1e0 33b9e058 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/10 05:35 linux-6.1.y 347385861c50 171ec371 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/09 17:11 linux-6.1.y 347385861c50 f3234354 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/09 15:25 linux-6.1.y 347385861c50 f3234354 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/09 14:08 linux-6.1.y 347385861c50 f3234354 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/09 12:04 linux-6.1.y 347385861c50 f3234354 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/09 05:55 linux-6.1.y 347385861c50 f3234354 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/08 21:32 linux-6.1.y 347385861c50 53df08b6 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/08 00:01 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/07 23:00 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/07 14:44 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/07 09:38 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/07 06:44 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/07 04:09 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/07 01:09 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/06 22:15 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/06 21:10 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/06 16:25 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/06 14:00 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/06 04:42 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/13 09:05 linux-6.1.y bf1e3b1cb1e0 c8349e48 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/13 03:26 linux-6.1.y bf1e3b1cb1e0 c8349e48 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/13 01:08 linux-6.1.y bf1e3b1cb1e0 c8349e48 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/12 09:37 linux-6.1.y bf1e3b1cb1e0 27de0a5c .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/11 20:45 linux-6.1.y bf1e3b1cb1e0 95ed9ece .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/11 07:21 linux-6.1.y bf1e3b1cb1e0 33b9e058 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/11 05:23 linux-6.1.y bf1e3b1cb1e0 33b9e058 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/11 00:39 linux-6.1.y bf1e3b1cb1e0 4320ec32 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/10 22:25 linux-6.1.y bf1e3b1cb1e0 4320ec32 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/10 19:13 linux-6.1.y bf1e3b1cb1e0 4320ec32 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/10 14:37 linux-6.1.y 347385861c50 4320ec32 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/10 07:20 linux-6.1.y 347385861c50 171ec371 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/09 10:15 linux-6.1.y 347385861c50 f3234354 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/09 09:12 linux-6.1.y 347385861c50 f3234354 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/09 07:15 linux-6.1.y 347385861c50 f3234354 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/08 23:58 linux-6.1.y 347385861c50 53df08b6 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/08 19:02 linux-6.1.y 347385861c50 53df08b6 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/08 17:31 linux-6.1.y 347385861c50 53df08b6 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/08 09:09 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/08 05:04 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/08 03:20 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/07 17:23 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/07 15:55 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/07 13:19 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/07 12:02 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/06 23:15 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/06 20:55 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/06 18:20 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/06 12:49 linux-6.1.y 347385861c50 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2024/04/06 01:39 linux-6.1.y 347385861c50 77230c29 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: sleeping function called from invalid context in __getblk_gfp
2023/03/14 21:24 linux-6.1.y 6449a0ba6843 0d5c4377 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan BUG: sleeping function called from invalid context in __getblk_gfp
* Struck through repros no longer work on HEAD.