====================================
WARNING: syz.0.454/7910 still has locks held!
6.11.0-rc3-next-20240812-syzkaller #0 Not tainted
------------------------------------
1 lock held by syz.0.454/7910:
#0: ffff888011f98f50 (&fi->i_gc_rwsem[READ]){+.+.}-{3:3}, at: f2fs_down_write fs/f2fs/f2fs.h:2196 [inline]
#0: ffff888011f98f50 (&fi->i_gc_rwsem[READ]){+.+.}-{3:3}, at: f2fs_ioc_start_atomic_write+0x2ed/0xac0 fs/f2fs/file.c:2163
stack backtrace:
CPU: 0 UID: 0 PID: 7910 Comm: syz.0.454 Not tainted 6.11.0-rc3-next-20240812-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
do_exit+0x1b67/0x28e0 kernel/exit.c:969
do_group_exit+0x207/0x2c0 kernel/exit.c:1088
get_signal+0x176f/0x1810 kernel/signal.c:2936
arch_do_signal_or_restart+0x96/0x830 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0xc9/0x370 kernel/entry/common.c:218
do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f7ba21779f9
Code: Unable to access opcode bytes at 0x7f7ba21779cf.
RSP: 002b:00007f7ba2fa4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: fffffffffffffffb RBX: 00007f7ba2306208 RCX: 00007f7ba21779f9
RDX: 0000000000000000 RSI: 000000000000f501 RDI: 0000000000000005
RBP: 00007f7ba21e58ee R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000001 R14: 00007f7ba2306208 R15: 00007ffc9069b428
</TASK>