syzbot


BUG: sleeping function called from invalid context in __bread_gfp

Status: upstream: reported C repro on 2022/11/29 08:21
Subsystems: fs
[Documentation on labels]
Reported-by: syzbot+5869fb71f59eac925756@syzkaller.appspotmail.com
Fix commit: 6f861765464f fs: Block writes to mounted block devices
Patched on: [ci-qemu-upstream ci-qemu-upstream-386 ci-qemu2-arm32 ci-qemu2-arm64 ci-qemu2-arm64-compat ci-qemu2-arm64-mte ci-upstream-bpf-kasan-gce ci-upstream-bpf-next-kasan-gce ci-upstream-gce-arm64 ci-upstream-gce-leak ci-upstream-kasan-badwrites-root ci-upstream-kasan-gce ci-upstream-kasan-gce-386 ci-upstream-kasan-gce-root ci-upstream-kasan-gce-selinux-root ci-upstream-kasan-gce-smack-root ci-upstream-kmsan-gce-386-root ci-upstream-kmsan-gce-root ci-upstream-linux-next-kasan-gce-root ci-upstream-net-kasan-gce ci-upstream-net-this-kasan-gce ci2-upstream-fs ci2-upstream-kcsan-gce ci2-upstream-net-next-test-gce ci2-upstream-usb], missing on: [ci-qemu2-riscv64]
First crash: 476d, last: 74d
Cause bisection: failed (error log, bisect log)
  
Fix bisection: fixed by (bisect log) :
commit 6f861765464f43a71462d52026fbddfc858239a5
Author: Jan Kara <jack@suse.cz>
Date: Wed Nov 1 17:43:10 2023 +0000

  fs: Block writes to mounted block devices

  
Discussions (7)
Title Replies (including bot) Last reply
[syzbot] BUG: sleeping function called from invalid context in __bread_gfp 1 (3) 2024/03/08 22:16
[syzbot] Monthly fs report (Dec 2023) 0 (1) 2023/12/12 22:02
[syzbot] Monthly fs report (Nov 2023) 0 (1) 2023/11/11 01:08
[syzbot] Monthly fs report (Oct 2023) 0 (1) 2023/10/10 13:22
[syzbot] Monthly fs report (Aug 2023) 0 (1) 2023/08/08 12:55
[syzbot] Monthly fs report (Jul 2023) 0 (1) 2023/07/10 09:36
[syzbot] Monthly fs report (May 2023) 0 (1) 2023/05/06 14:02
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 BUG: sleeping function called from invalid context in __bread_gfp sysv fat C 154 377d 489d 0/1 upstream: reported C repro on 2022/11/15 20:37
linux-4.14 BUG: sleeping function called from invalid context in __bread_gfp sysv fat C 72 403d 489d 0/1 upstream: reported C repro on 2022/11/15 20:41
Last patch testing requests (10)
Created Duration User Patch Repo Result
2024/01/27 16:04 24m retest repro upstream OK log
2024/01/27 16:04 21m retest repro upstream OK log
2024/01/27 13:50 24m retest repro upstream OK log
2024/01/27 13:50 24m retest repro upstream OK log
2024/01/27 13:50 25m retest repro upstream OK log
2024/01/27 13:50 22m retest repro upstream OK log
2024/01/27 13:50 34m retest repro upstream OK log
2024/01/26 18:19 20m retest repro upstream OK log
2024/01/26 18:19 22m retest repro upstream OK log
2024/01/26 18:19 20m retest repro upstream OK log
Fix bisection attempts (3)
Created Duration User Patch Repo Result
2024/02/24 20:54 5h32m bisect fix upstream job log (1)
2024/01/04 12:46 1h19m bisect fix upstream job log (0) log
2023/12/03 19:36 1h31m bisect fix upstream job log (0) log

Sample crash report:
Buffer I/O error on dev loop0, logical block 8834171, async page read
syz-executor872: attempt to access beyond end of device
loop0: rw=0, sector=26932834, nr_sectors = 2 limit=128
Buffer I/O error on dev loop0, logical block 13466417, async page read
syz-executor872: attempt to access beyond end of device
loop0: rw=0, sector=16147212, nr_sectors = 2 limit=128
Buffer I/O error on dev loop0, logical block 8073606, async page read
BUG: sleeping function called from invalid context at fs/buffer.c:1443
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5015, name: syz-executor872
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
2 locks held by syz-executor872/5015:
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: inode_lock_nested include/linux/fs.h:806 [inline]
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x1c2/0x530 fs/namei.c:3886
 #1: ffffffff8cdb29d8 (pointers_lock){.+.+}-{2:2}, at: get_block+0x196/0x1670 fs/sysv/itree.c:221
Preemption disabled at:
[<0000000000000000>] 0x0
CPU: 0 PID: 5015 Comm: syz-executor872 Not tainted 6.5.0-rc2-syzkaller-00052-gbfa3037d8280 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x125/0x1b0 lib/dump_stack.c:106
 __might_resched+0x3c3/0x5e0 kernel/sched/core.c:10189
 __getblk_gfp fs/buffer.c:1443 [inline]
 __bread_gfp+0x3f/0x310 fs/buffer.c:1479
 sb_bread include/linux/buffer_head.h:351 [inline]
 get_branch+0x2cb/0x660 fs/sysv/itree.c:104
 get_block+0x1b9/0x1670 fs/sysv/itree.c:222
 block_read_full_folio+0x3df/0xae0 fs/buffer.c:2412
 filemap_read_folio+0xe5/0x2b0 mm/filemap.c:2389
 do_read_cache_folio+0x1ff/0x540 mm/filemap.c:3696
 do_read_cache_page mm/filemap.c:3762 [inline]
 read_cache_page+0x5b/0x180 mm/filemap.c:3771
 read_mapping_page include/linux/pagemap.h:776 [inline]
 dir_get_page fs/sysv/dir.c:64 [inline]
 sysv_find_entry+0x1db/0x480 fs/sysv/dir.c:157
 sysv_inode_by_name+0x74/0x1c0 fs/sysv/dir.c:374
 sysv_lookup fs/sysv/namei.c:38 [inline]
 sysv_lookup+0x88/0x100 fs/sysv/namei.c:31
 lookup_one_qstr_excl+0x116/0x180 fs/namei.c:1605
 filename_create+0x1ed/0x530 fs/namei.c:3887
 do_mkdirat+0xb3/0x330 fs/namei.c:4132
 __do_sys_mkdir fs/namei.c:4160 [inline]
 __se_sys_mkdir fs/namei.c:4158 [inline]
 __x64_sys_mkdir+0xf2/0x140 fs/namei.c:4158
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f2d2edff717
Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc2086ed68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d2edff717
RDX: 00000000018084a1 RSI: 00000000000001ff RDI: 0000000020000080
RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140
R13: 0000000000000000 R14: 00007ffc2086edf0 R15: 00000000ffffffff
 </TASK>
syz-executor872: attempt to access beyond end of device
loop0: rw=0, sector=6491548, nr_sectors = 2 limit=128
Buffer I/O error on dev loop0, logical block 3245774, async page read
syz-executor872: attempt to access beyond end of device
loop0: rw=0, sector=17669878, nr_sectors = 2 limit=128
Buffer I/O error on dev loop0, logical block 8834939, async page read
BUG: sleeping function called from invalid context at fs/buffer.c:1443
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5015, name: syz-executor872
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
2 locks held by syz-executor872/5015:
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: inode_lock_nested include/linux/fs.h:806 [inline]
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x1c2/0x530 fs/namei.c:3886
 #1: ffffffff8cdb29d8 (pointers_lock){.+.+}-{2:2}, at: get_block+0x196/0x1670 fs/sysv/itree.c:221
Preemption disabled at:
[<0000000000000000>] 0x0
CPU: 0 PID: 5015 Comm: syz-executor872 Tainted: G        W          6.5.0-rc2-syzkaller-00052-gbfa3037d8280 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x125/0x1b0 lib/dump_stack.c:106
 __might_resched+0x3c3/0x5e0 kernel/sched/core.c:10189
 __getblk_gfp fs/buffer.c:1443 [inline]
 __bread_gfp+0x3f/0x310 fs/buffer.c:1479
 sb_bread include/linux/buffer_head.h:351 [inline]
 get_branch+0x2cb/0x660 fs/sysv/itree.c:104
 get_block+0x1b9/0x1670 fs/sysv/itree.c:222
 block_read_full_folio+0x3df/0xae0 fs/buffer.c:2412
 filemap_read_folio+0xe5/0x2b0 mm/filemap.c:2389
 do_read_cache_folio+0x1ff/0x540 mm/filemap.c:3696
 do_read_cache_page mm/filemap.c:3762 [inline]
 read_cache_page+0x5b/0x180 mm/filemap.c:3771
 read_mapping_page include/linux/pagemap.h:776 [inline]
 dir_get_page fs/sysv/dir.c:64 [inline]
 sysv_find_entry+0x1db/0x480 fs/sysv/dir.c:157
 sysv_inode_by_name+0x74/0x1c0 fs/sysv/dir.c:374
 sysv_lookup fs/sysv/namei.c:38 [inline]
 sysv_lookup+0x88/0x100 fs/sysv/namei.c:31
 lookup_one_qstr_excl+0x116/0x180 fs/namei.c:1605
 filename_create+0x1ed/0x530 fs/namei.c:3887
 do_mkdirat+0xb3/0x330 fs/namei.c:4132
 __do_sys_mkdir fs/namei.c:4160 [inline]
 __se_sys_mkdir fs/namei.c:4158 [inline]
 __x64_sys_mkdir+0xf2/0x140 fs/namei.c:4158
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f2d2edff717
Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc2086ed68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d2edff717
RDX: 00000000018084a1 RSI: 00000000000001ff RDI: 0000000020000080
RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140
R13: 0000000000000000 R14: 00007ffc2086edf0 R15: 00000000ffffffff
 </TASK>
BUG: sleeping function called from invalid context at fs/buffer.c:1443
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5015, name: syz-executor872
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
2 locks held by syz-executor872/5015:
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: inode_lock_nested include/linux/fs.h:806 [inline]
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x1c2/0x530 fs/namei.c:3886
 #1: ffffffff8cdb29d8 (pointers_lock){.+.+}-{2:2}, at: get_block+0x196/0x1670 fs/sysv/itree.c:221
Preemption disabled at:
[<0000000000000000>] 0x0
CPU: 0 PID: 5015 Comm: syz-executor872 Tainted: G        W          6.5.0-rc2-syzkaller-00052-gbfa3037d8280 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x125/0x1b0 lib/dump_stack.c:106
 __might_resched+0x3c3/0x5e0 kernel/sched/core.c:10189
 __getblk_gfp fs/buffer.c:1443 [inline]
 __bread_gfp+0x3f/0x310 fs/buffer.c:1479
 sb_bread include/linux/buffer_head.h:351 [inline]
 get_branch+0x2cb/0x660 fs/sysv/itree.c:104
 get_block+0x1b9/0x1670 fs/sysv/itree.c:222
 block_read_full_folio+0x3df/0xae0 fs/buffer.c:2412
 filemap_read_folio+0xe5/0x2b0 mm/filemap.c:2389
 do_read_cache_folio+0x1ff/0x540 mm/filemap.c:3696
 do_read_cache_page mm/filemap.c:3762 [inline]
 read_cache_page+0x5b/0x180 mm/filemap.c:3771
 read_mapping_page include/linux/pagemap.h:776 [inline]
 dir_get_page fs/sysv/dir.c:64 [inline]
 sysv_find_entry+0x1db/0x480 fs/sysv/dir.c:157
 sysv_inode_by_name+0x74/0x1c0 fs/sysv/dir.c:374
 sysv_lookup fs/sysv/namei.c:38 [inline]
 sysv_lookup+0x88/0x100 fs/sysv/namei.c:31
 lookup_one_qstr_excl+0x116/0x180 fs/namei.c:1605
 filename_create+0x1ed/0x530 fs/namei.c:3887
 do_mkdirat+0xb3/0x330 fs/namei.c:4132
 __do_sys_mkdir fs/namei.c:4160 [inline]
 __se_sys_mkdir fs/namei.c:4158 [inline]
 __x64_sys_mkdir+0xf2/0x140 fs/namei.c:4158
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f2d2edff717
Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc2086ed68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d2edff717
RDX: 00000000018084a1 RSI: 00000000000001ff RDI: 0000000020000080
RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140
R13: 0000000000000000 R14: 00007ffc2086edf0 R15: 00000000ffffffff
 </TASK>
BUG: sleeping function called from invalid context at fs/buffer.c:1443
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5015, name: syz-executor872
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
2 locks held by syz-executor872/5015:
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: inode_lock_nested include/linux/fs.h:806 [inline]
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x1c2/0x530 fs/namei.c:3886
 #1: ffffffff8cdb29d8 (pointers_lock){.+.+}-{2:2}, at: get_block+0x196/0x1670 fs/sysv/itree.c:221
Preemption disabled at:
[<0000000000000000>] 0x0
CPU: 0 PID: 5015 Comm: syz-executor872 Tainted: G        W          6.5.0-rc2-syzkaller-00052-gbfa3037d8280 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x125/0x1b0 lib/dump_stack.c:106
 __might_resched+0x3c3/0x5e0 kernel/sched/core.c:10189
 __getblk_gfp fs/buffer.c:1443 [inline]
 __bread_gfp+0x3f/0x310 fs/buffer.c:1479
 sb_bread include/linux/buffer_head.h:351 [inline]
 get_branch+0x2cb/0x660 fs/sysv/itree.c:104
 get_block+0x1b9/0x1670 fs/sysv/itree.c:222
 block_read_full_folio+0x3df/0xae0 fs/buffer.c:2412
 filemap_read_folio+0xe5/0x2b0 mm/filemap.c:2389
 do_read_cache_folio+0x1ff/0x540 mm/filemap.c:3696
 do_read_cache_page mm/filemap.c:3762 [inline]
 read_cache_page+0x5b/0x180 mm/filemap.c:3771
 read_mapping_page include/linux/pagemap.h:776 [inline]
 dir_get_page fs/sysv/dir.c:64 [inline]
 sysv_find_entry+0x1db/0x480 fs/sysv/dir.c:157
 sysv_inode_by_name+0x74/0x1c0 fs/sysv/dir.c:374
 sysv_lookup fs/sysv/namei.c:38 [inline]
 sysv_lookup+0x88/0x100 fs/sysv/namei.c:31
 lookup_one_qstr_excl+0x116/0x180 fs/namei.c:1605
 filename_create+0x1ed/0x530 fs/namei.c:3887
 do_mkdirat+0xb3/0x330 fs/namei.c:4132
 __do_sys_mkdir fs/namei.c:4160 [inline]
 __se_sys_mkdir fs/namei.c:4158 [inline]
 __x64_sys_mkdir+0xf2/0x140 fs/namei.c:4158
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f2d2edff717
Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc2086ed68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d2edff717
RDX: 00000000018084a1 RSI: 00000000000001ff RDI: 0000000020000080
RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140
R13: 0000000000000000 R14: 00007ffc2086edf0 R15: 00000000ffffffff
 </TASK>
BUG: sleeping function called from invalid context at fs/buffer.c:1443
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5015, name: syz-executor872
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
2 locks held by syz-executor872/5015:
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: inode_lock_nested include/linux/fs.h:806 [inline]
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x1c2/0x530 fs/namei.c:3886
 #1: ffffffff8cdb29d8 (pointers_lock){.+.+}-{2:2}, at: get_block+0x196/0x1670 fs/sysv/itree.c:221
Preemption disabled at:
[<0000000000000000>] 0x0
CPU: 0 PID: 5015 Comm: syz-executor872 Tainted: G        W          6.5.0-rc2-syzkaller-00052-gbfa3037d8280 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x125/0x1b0 lib/dump_stack.c:106
 __might_resched+0x3c3/0x5e0 kernel/sched/core.c:10189
 __getblk_gfp fs/buffer.c:1443 [inline]
 __bread_gfp+0x3f/0x310 fs/buffer.c:1479
 sb_bread include/linux/buffer_head.h:351 [inline]
 get_branch+0x2cb/0x660 fs/sysv/itree.c:104
 get_block+0x1b9/0x1670 fs/sysv/itree.c:222
 block_read_full_folio+0x3df/0xae0 fs/buffer.c:2412
 filemap_read_folio+0xe5/0x2b0 mm/filemap.c:2389
 do_read_cache_folio+0x1ff/0x540 mm/filemap.c:3696
 do_read_cache_page mm/filemap.c:3762 [inline]
 read_cache_page+0x5b/0x180 mm/filemap.c:3771
 read_mapping_page include/linux/pagemap.h:776 [inline]
 dir_get_page fs/sysv/dir.c:64 [inline]
 sysv_find_entry+0x1db/0x480 fs/sysv/dir.c:157
 sysv_inode_by_name+0x74/0x1c0 fs/sysv/dir.c:374
 sysv_lookup fs/sysv/namei.c:38 [inline]
 sysv_lookup+0x88/0x100 fs/sysv/namei.c:31
 lookup_one_qstr_excl+0x116/0x180 fs/namei.c:1605
 filename_create+0x1ed/0x530 fs/namei.c:3887
 do_mkdirat+0xb3/0x330 fs/namei.c:4132
 __do_sys_mkdir fs/namei.c:4160 [inline]
 __se_sys_mkdir fs/namei.c:4158 [inline]
 __x64_sys_mkdir+0xf2/0x140 fs/namei.c:4158
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f2d2edff717
Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc2086ed68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d2edff717
RDX: 00000000018084a1 RSI: 00000000000001ff RDI: 0000000020000080
RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140
R13: 0000000000000000 R14: 00007ffc2086edf0 R15: 00000000ffffffff
 </TASK>
BUG: sleeping function called from invalid context at fs/buffer.c:1443
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5015, name: syz-executor872
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
2 locks held by syz-executor872/5015:
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: inode_lock_nested include/linux/fs.h:806 [inline]
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x1c2/0x530 fs/namei.c:3886
 #1: ffffffff8cdb29d8 (pointers_lock){.+.+}-{2:2}, at: get_block+0x196/0x1670 fs/sysv/itree.c:221
Preemption disabled at:
[<0000000000000000>] 0x0
CPU: 1 PID: 5015 Comm: syz-executor872 Tainted: G        W          6.5.0-rc2-syzkaller-00052-gbfa3037d8280 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x125/0x1b0 lib/dump_stack.c:106
 __might_resched+0x3c3/0x5e0 kernel/sched/core.c:10189
 __getblk_gfp fs/buffer.c:1443 [inline]
 __bread_gfp+0x3f/0x310 fs/buffer.c:1479
 sb_bread include/linux/buffer_head.h:351 [inline]
 get_branch+0x2cb/0x660 fs/sysv/itree.c:104
 get_block+0x1b9/0x1670 fs/sysv/itree.c:222
 block_read_full_folio+0x3df/0xae0 fs/buffer.c:2412
 filemap_read_folio+0xe5/0x2b0 mm/filemap.c:2389
 do_read_cache_folio+0x1ff/0x540 mm/filemap.c:3696
 do_read_cache_page mm/filemap.c:3762 [inline]
 read_cache_page+0x5b/0x180 mm/filemap.c:3771
 read_mapping_page include/linux/pagemap.h:776 [inline]
 dir_get_page fs/sysv/dir.c:64 [inline]
 sysv_find_entry+0x1db/0x480 fs/sysv/dir.c:157
 sysv_inode_by_name+0x74/0x1c0 fs/sysv/dir.c:374
 sysv_lookup fs/sysv/namei.c:38 [inline]
 sysv_lookup+0x88/0x100 fs/sysv/namei.c:31
 lookup_one_qstr_excl+0x116/0x180 fs/namei.c:1605
 filename_create+0x1ed/0x530 fs/namei.c:3887
 do_mkdirat+0xb3/0x330 fs/namei.c:4132
 __do_sys_mkdir fs/namei.c:4160 [inline]
 __se_sys_mkdir fs/namei.c:4158 [inline]
 __x64_sys_mkdir+0xf2/0x140 fs/namei.c:4158
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f2d2edff717
Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc2086ed68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d2edff717
RDX: 00000000018084a1 RSI: 00000000000001ff RDI: 0000000020000080
RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140
R13: 0000000000000000 R14: 00007ffc2086edf0 R15: 00000000ffffffff
 </TASK>
BUG: sleeping function called from invalid context at fs/buffer.c:1443
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5015, name: syz-executor872
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
2 locks held by syz-executor872/5015:
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: inode_lock_nested include/linux/fs.h:806 [inline]
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x1c2/0x530 fs/namei.c:3886
 #1: ffffffff8cdb29d8 (pointers_lock){.+.+}-{2:2}, at: get_block+0x196/0x1670 fs/sysv/itree.c:221
Preemption disabled at:
[<0000000000000000>] 0x0
CPU: 0 PID: 5015 Comm: syz-executor872 Tainted: G        W          6.5.0-rc2-syzkaller-00052-gbfa3037d8280 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x125/0x1b0 lib/dump_stack.c:106
 __might_resched+0x3c3/0x5e0 kernel/sched/core.c:10189
 __getblk_gfp fs/buffer.c:1443 [inline]
 __bread_gfp+0x3f/0x310 fs/buffer.c:1479
 sb_bread include/linux/buffer_head.h:351 [inline]
 get_branch+0x2cb/0x660 fs/sysv/itree.c:104
 get_block+0x1b9/0x1670 fs/sysv/itree.c:222
 block_read_full_folio+0x3df/0xae0 fs/buffer.c:2412
 filemap_read_folio+0xe5/0x2b0 mm/filemap.c:2389
 do_read_cache_folio+0x1ff/0x540 mm/filemap.c:3696
 do_read_cache_page mm/filemap.c:3762 [inline]
 read_cache_page+0x5b/0x180 mm/filemap.c:3771
 read_mapping_page include/linux/pagemap.h:776 [inline]
 dir_get_page fs/sysv/dir.c:64 [inline]
 sysv_find_entry+0x1db/0x480 fs/sysv/dir.c:157
 sysv_inode_by_name+0x74/0x1c0 fs/sysv/dir.c:374
 sysv_lookup fs/sysv/namei.c:38 [inline]
 sysv_lookup+0x88/0x100 fs/sysv/namei.c:31
 lookup_one_qstr_excl+0x116/0x180 fs/namei.c:1605
 filename_create+0x1ed/0x530 fs/namei.c:3887
 do_mkdirat+0xb3/0x330 fs/namei.c:4132
 __do_sys_mkdir fs/namei.c:4160 [inline]
 __se_sys_mkdir fs/namei.c:4158 [inline]
 __x64_sys_mkdir+0xf2/0x140 fs/namei.c:4158
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f2d2edff717
Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc2086ed68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d2edff717
RDX: 00000000018084a1 RSI: 00000000000001ff RDI: 0000000020000080
RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140
R13: 0000000000000000 R14: 00007ffc2086edf0 R15: 00000000ffffffff
 </TASK>
BUG: sleeping function called from invalid context at fs/buffer.c:1443
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5015, name: syz-executor872
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
2 locks held by syz-executor872/5015:
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: inode_lock_nested include/linux/fs.h:806 [inline]
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x1c2/0x530 fs/namei.c:3886
 #1: ffffffff8cdb29d8 (pointers_lock){.+.+}-{2:2}, at: get_block+0x196/0x1670 fs/sysv/itree.c:221
Preemption disabled at:
[<0000000000000000>] 0x0
CPU: 0 PID: 5015 Comm: syz-executor872 Tainted: G        W          6.5.0-rc2-syzkaller-00052-gbfa3037d8280 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x125/0x1b0 lib/dump_stack.c:106
 __might_resched+0x3c3/0x5e0 kernel/sched/core.c:10189
 __getblk_gfp fs/buffer.c:1443 [inline]
 __bread_gfp+0x3f/0x310 fs/buffer.c:1479
 sb_bread include/linux/buffer_head.h:351 [inline]
 get_branch+0x2cb/0x660 fs/sysv/itree.c:104
 get_block+0x1b9/0x1670 fs/sysv/itree.c:222
 block_read_full_folio+0x3df/0xae0 fs/buffer.c:2412
 filemap_read_folio+0xe5/0x2b0 mm/filemap.c:2389
 do_read_cache_folio+0x1ff/0x540 mm/filemap.c:3696
 do_read_cache_page mm/filemap.c:3762 [inline]
 read_cache_page+0x5b/0x180 mm/filemap.c:3771
 read_mapping_page include/linux/pagemap.h:776 [inline]
 dir_get_page fs/sysv/dir.c:64 [inline]
 sysv_find_entry+0x1db/0x480 fs/sysv/dir.c:157
 sysv_inode_by_name+0x74/0x1c0 fs/sysv/dir.c:374
 sysv_lookup fs/sysv/namei.c:38 [inline]
 sysv_lookup+0x88/0x100 fs/sysv/namei.c:31
 lookup_one_qstr_excl+0x116/0x180 fs/namei.c:1605
 filename_create+0x1ed/0x530 fs/namei.c:3887
 do_mkdirat+0xb3/0x330 fs/namei.c:4132
 __do_sys_mkdir fs/namei.c:4160 [inline]
 __se_sys_mkdir fs/namei.c:4158 [inline]
 __x64_sys_mkdir+0xf2/0x140 fs/namei.c:4158
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f2d2edff717
Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc2086ed68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d2edff717
RDX: 00000000018084a1 RSI: 00000000000001ff RDI: 0000000020000080
RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140
R13: 0000000000000000 R14: 00007ffc2086edf0 R15: 00000000ffffffff
 </TASK>
BUG: sleeping function called from invalid context at fs/buffer.c:1443
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5015, name: syz-executor872
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
2 locks held by syz-executor872/5015:
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: inode_lock_nested include/linux/fs.h:806 [inline]
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x1c2/0x530 fs/namei.c:3886
 #1: ffffffff8cdb29d8 (pointers_lock){.+.+}-{2:2}, at: get_block+0x196/0x1670 fs/sysv/itree.c:221
Preemption disabled at:
[<0000000000000000>] 0x0
CPU: 0 PID: 5015 Comm: syz-executor872 Tainted: G        W          6.5.0-rc2-syzkaller-00052-gbfa3037d8280 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x125/0x1b0 lib/dump_stack.c:106
 __might_resched+0x3c3/0x5e0 kernel/sched/core.c:10189
 __getblk_gfp fs/buffer.c:1443 [inline]
 __bread_gfp+0x3f/0x310 fs/buffer.c:1479
 sb_bread include/linux/buffer_head.h:351 [inline]
 get_branch+0x2cb/0x660 fs/sysv/itree.c:104
 get_block+0x1b9/0x1670 fs/sysv/itree.c:222
 block_read_full_folio+0x3df/0xae0 fs/buffer.c:2412
 filemap_read_folio+0xe5/0x2b0 mm/filemap.c:2389
 do_read_cache_folio+0x1ff/0x540 mm/filemap.c:3696
 do_read_cache_page mm/filemap.c:3762 [inline]
 read_cache_page+0x5b/0x180 mm/filemap.c:3771
 read_mapping_page include/linux/pagemap.h:776 [inline]
 dir_get_page fs/sysv/dir.c:64 [inline]
 sysv_find_entry+0x1db/0x480 fs/sysv/dir.c:157
 sysv_inode_by_name+0x74/0x1c0 fs/sysv/dir.c:374
 sysv_lookup fs/sysv/namei.c:38 [inline]
 sysv_lookup+0x88/0x100 fs/sysv/namei.c:31
 lookup_one_qstr_excl+0x116/0x180 fs/namei.c:1605
 filename_create+0x1ed/0x530 fs/namei.c:3887
 do_mkdirat+0xb3/0x330 fs/namei.c:4132
 __do_sys_mkdir fs/namei.c:4160 [inline]
 __se_sys_mkdir fs/namei.c:4158 [inline]
 __x64_sys_mkdir+0xf2/0x140 fs/namei.c:4158
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f2d2edff717
Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc2086ed68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d2edff717
RDX: 00000000018084a1 RSI: 00000000000001ff RDI: 0000000020000080
RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140
R13: 0000000000000000 R14: 00007ffc2086edf0 R15: 00000000ffffffff
 </TASK>
BUG: sleeping function called from invalid context at fs/buffer.c:1443
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5015, name: syz-executor872
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
2 locks held by syz-executor872/5015:
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: inode_lock_nested include/linux/fs.h:806 [inline]
 #0: ffff888071787c18 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x1c2/0x530 fs/namei.c:3886
 #1: ffffffff8cdb29d8 (pointers_lock){.+.+}-{2:2}, at: get_block+0x196/0x1670 fs/sysv/itree.c:221
Preemption disabled at:
[<0000000000000000>] 0x0
CPU: 0 PID: 5015 Comm: syz-executor872 Tainted: G        W          6.5.0-rc2-syzkaller-00052-gbfa3037d8280 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x125/0x1b0 lib/dump_stack.c:106
 __might_resched+0x3c3/0x5e0 kernel/sched/core.c:10189
 __getblk_gfp fs/buffer.c:1443 [inline]
 __bread_gfp+0x3f/0x310 fs/buffer.c:1479
 sb_bread include/linux/buffer_head.h:351 [inline]
 get_branch+0x2cb/0x660 fs/sysv/itree.c:104
 get_block+0x1b9/0x1670 fs/sysv/itree.c:222
 block_read_full_folio+0x3df/0xae0 fs/buffer.c:2412
 filemap_read_folio+0xe5/0x2b0 mm/filemap.c:2389
 do_read_cache_folio+0x1ff/0x540 mm/filemap.c:3696
 do_read_cache_page mm/filemap.c:3762 [inline]
 read_cache_page+0x5b/0x180 mm/filemap.c:3771
 read_mapping_page include/linux/pagemap.h:776 [inline]
 dir_get_page fs/sysv/dir.c:64 [inline]
 sysv_find_entry+0x1db/0x480 fs/sysv/dir.c:157
 sysv_inode_by_name+0x74/0x1c0 fs/sysv/dir.c:374
 sysv_lookup fs/sysv/namei.c:38 [inline]
 sysv_lookup+0x88/0x100 fs/sysv/namei.c:31
 lookup_one_qstr_excl+0x116/0x180 fs/namei.c:1605
 filename_create+0x1ed/0x530 fs/namei.c:3887
 do_mkdirat+0xb3/0x330 fs/namei.c:4132
 __do_sys_mkdir fs/namei.c:4160 [inline]
 __se_sys_mkdir fs/namei.c:4158 [inline]
 __x64_sys_mkdir+0xf2/0x140 fs/namei.c:4158
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f2d2edff717
Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc2086ed68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d2edff717
RDX: 00000000018084a1 RSI: 00000000000001ff RDI: 0000000020000080
RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000140
R13: 0000000000000000 R14: 00007ffc2086edf0 R15: 00000000ffffffff
 </TASK>

Crashes (359):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/07/20 15:28 upstream bfa3037d8280 7b630fdb .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/06/30 05:40 upstream e8f75c0270d9 7b33cf8f .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/06/25 14:53 upstream a92b7d26c743 09ffe269 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/06/23 21:39 upstream 8a28a0b6f1a1 09ffe269 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/06/21 05:49 upstream 99ec1ed7c2ed 09ffe269 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/06/14 16:24 upstream b6dad5178cea d2ee9228 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2022/12/20 02:24 upstream 2f26e424552e c52b2efb .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2022/12/12 17:10 upstream 830b3c68c1fb 67be1ae7 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2022/12/12 13:43 upstream 830b3c68c1fb 67be1ae7 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/08/05 12:02 linux-next bdffb18b5dd8 4ffcc9ef .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/08/03 14:28 linux-next fb4327106e52 39a91c18 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2022/11/29 07:58 linux-next 9e46a7996732 ca9683b8 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/06/21 08:47 upstream 99ec1ed7c2ed 09ffe269 .config console log report syz [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2022/12/20 04:08 upstream 2f26e424552e c52b2efb .config console log report syz [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2022/11/29 10:05 upstream ca57f02295f1 ca9683b8 .config console log report syz [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/01/16 07:25 linux-next 0a093b2893c7 a63719e7 .config console log report syz [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/31 19:16 upstream 5a6a09e97199 58499c95 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/31 17:08 upstream 5a6a09e97199 58499c95 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/29 08:41 upstream 2af9b20dbb39 3c418d72 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/25 05:12 upstream d88520ad73b7 17e6d526 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/23 02:38 upstream fe3cfe869d5e 361b23dc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/22 12:03 upstream 1acfd2bd3f0d 361b23dc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/21 08:36 upstream c3200081020d 361b23dc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/20 20:15 upstream ce55c22ec8b2 a42250d2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/18 21:46 upstream dd72f9c7e512 342b9c55 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/18 13:03 upstream 06dc10eae55b 342b9c55 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/17 01:41 upstream 58720809f527 6388bc36 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/16 16:44 upstream 58720809f527 6388bc36 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/14 19:01 upstream 727fb8376504 6388bc36 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/12 22:59 upstream 401644852d0b fc170927 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/11 15:34 upstream 1c8b86a3799f 83165b57 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/10 13:01 upstream 94f6f0550c62 c9be5398 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/09 22:24 upstream 94f6f0550c62 3c53c7d9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/09 03:46 upstream 37faf07bf90a 5e837c76 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/08 21:51 upstream b9ddbb0cde2a 5e837c76 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/08 20:06 upstream b9ddbb0cde2a 5e837c76 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/06 06:54 upstream f291209eca5e db17ad9f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/06 03:57 upstream f291209eca5e db17ad9f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/05 10:08 upstream ba7d997a2a29 b7d7ff54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/05 05:52 upstream ba7d997a2a29 b7d7ff54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/03 12:52 upstream ce36c8b14987 65faba36 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/02 22:48 upstream 8a749fd1a872 50b20e75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/02 11:00 upstream 8a749fd1a872 8e26a358 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/01 14:12 upstream 3b517966c561 8e26a358 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/09/28 14:56 upstream 633b47cb009d c2ab1e5d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/09/28 06:56 upstream 633b47cb009d 2895a507 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/09/27 03:13 upstream 50768a425b46 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/09/26 10:08 upstream 6465e260f487 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/09/26 01:06 upstream 6465e260f487 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/09/24 21:46 upstream 3aba70aed91f 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/09/24 13:15 upstream 3aba70aed91f 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/09/23 13:41 upstream d90b0276af8f 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/09/22 07:35 upstream 27bbf45eae9c 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
2023/10/29 19:51 upstream 2af9b20dbb39 3c418d72 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in __bread_gfp
2023/10/22 06:22 upstream 4d7b04c0cda3 361b23dc .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in __bread_gfp
2023/10/16 20:30 upstream 58720809f527 342b9c55 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in __bread_gfp
2023/10/15 13:50 upstream 9a3dad63edbe f757a323 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in __bread_gfp
2023/10/08 20:08 upstream b9ddbb0cde2a 5e837c76 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in __bread_gfp
2023/10/02 19:48 upstream 8a749fd1a872 0c7326f3 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in __bread_gfp
2023/09/28 21:03 upstream 9ed22ae6be81 0aebb3ae .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in __bread_gfp
2023/09/28 19:51 upstream 9ed22ae6be81 0aebb3ae .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in __bread_gfp
2023/09/28 13:05 upstream 633b47cb009d 0aebb3ae .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in __bread_gfp
2023/09/27 00:43 upstream 50768a425b46 0b6a67ac .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in __bread_gfp
2023/10/18 02:01 upstream 06dc10eae55b 342b9c55 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: sleeping function called from invalid context in __bread_gfp
2023/10/17 03:49 upstream 213f891525c2 342b9c55 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: sleeping function called from invalid context in __bread_gfp
2023/10/16 18:56 upstream 58720809f527 342b9c55 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: sleeping function called from invalid context in __bread_gfp
2023/10/12 20:18 upstream 401644852d0b 6388bc36 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: sleeping function called from invalid context in __bread_gfp
2023/10/02 06:09 upstream e81a2dabc3f3 8e26a358 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: sleeping function called from invalid context in __bread_gfp
2023/09/28 06:59 upstream 633b47cb009d c2ab1e5d .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: sleeping function called from invalid context in __bread_gfp
2022/11/28 22:05 upstream b7b275e60bcd 247de55b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in __bread_gfp
2023/09/08 02:34 linux-next cd04b2fab5ee 72324844 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root BUG: sleeping function called from invalid context in __bread_gfp
* Struck through repros no longer work on HEAD.