Buffer I/O error on dev loop5, logical block 8768635, async page read Buffer I/O error on dev loop5, logical block 13466417, async page read Buffer I/O error on dev loop5, logical block 8073605, async page read BUG: sleeping function called from invalid context at fs/buffer.c:1437 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 16440, name: syz-executor.5 preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by syz-executor.5/16440: #0: ffff0000ce01e410 (sb_writers#29){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:403 #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:802 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3561 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: path_openat+0x5f0/0x27f8 fs/namei.c:3794 #2: ffff80008e7d44b8 (pointers_lock#2){.+.+}-{2:2}, at: get_block+0x144/0x1320 fs/sysv/itree.c:221 Preemption disabled at: [] get_block+0x144/0x1320 fs/sysv/itree.c:221 CPU: 1 PID: 16440 Comm: syz-executor.5 Not tainted 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 __might_resched+0x374/0x4d0 kernel/sched/core.c:10187 __might_sleep+0x90/0xe4 kernel/sched/core.c:10116 __getblk_gfp+0x5c/0x720 fs/buffer.c:1437 __bread_gfp+0x3c/0x2ec fs/buffer.c:1473 sb_bread include/linux/buffer_head.h:326 [inline] get_branch+0x234/0x55c fs/sysv/itree.c:104 get_block+0x15c/0x1320 fs/sysv/itree.c:222 block_read_full_folio+0x3f8/0xd84 fs/buffer.c:2400 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:466 filemap_read_folio+0x14c/0x39c mm/filemap.c:2382 do_read_cache_folio+0x114/0x548 mm/filemap.c:3742 do_read_cache_page+0x4c/0x260 mm/filemap.c:3808 read_cache_page+0x68/0x84 mm/filemap.c:3817 read_mapping_page include/linux/pagemap.h:860 [inline] dir_get_page fs/sysv/dir.c:64 [inline] sysv_find_entry+0x174/0x570 fs/sysv/dir.c:157 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:374 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38 lookup_open fs/namei.c:3474 [inline] open_last_lookups fs/namei.c:3564 [inline] path_openat+0xc54/0x27f8 fs/namei.c:3794 do_filp_open+0x1bc/0x3cc fs/namei.c:3824 do_sys_openat2+0x124/0x1b8 fs/open.c:1422 do_sys_open fs/open.c:1437 [inline] __do_sys_openat fs/open.c:1453 [inline] __se_sys_openat fs/open.c:1448 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1448 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 Buffer I/O error on dev loop5, logical block 3245518, async page read Buffer I/O error on dev loop5, logical block 8769403, async page read BUG: sleeping function called from invalid context at fs/buffer.c:1437 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 16440, name: syz-executor.5 preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by syz-executor.5/16440: #0: ffff0000ce01e410 (sb_writers#29){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:403 #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:802 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3561 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: path_openat+0x5f0/0x27f8 fs/namei.c:3794 #2: ffff80008e7d44b8 (pointers_lock#2){.+.+}-{2:2}, at: get_block+0x144/0x1320 fs/sysv/itree.c:221 Preemption disabled at: [] get_block+0x144/0x1320 fs/sysv/itree.c:221 CPU: 0 PID: 16440 Comm: syz-executor.5 Tainted: G W 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 __might_resched+0x374/0x4d0 kernel/sched/core.c:10187 __might_sleep+0x90/0xe4 kernel/sched/core.c:10116 __getblk_gfp+0x5c/0x720 fs/buffer.c:1437 __bread_gfp+0x3c/0x2ec fs/buffer.c:1473 sb_bread include/linux/buffer_head.h:326 [inline] get_branch+0x234/0x55c fs/sysv/itree.c:104 get_block+0x15c/0x1320 fs/sysv/itree.c:222 block_read_full_folio+0x3f8/0xd84 fs/buffer.c:2400 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:466 filemap_read_folio+0x14c/0x39c mm/filemap.c:2382 do_read_cache_folio+0x114/0x548 mm/filemap.c:3742 do_read_cache_page+0x4c/0x260 mm/filemap.c:3808 read_cache_page+0x68/0x84 mm/filemap.c:3817 read_mapping_page include/linux/pagemap.h:860 [inline] dir_get_page fs/sysv/dir.c:64 [inline] sysv_find_entry+0x174/0x570 fs/sysv/dir.c:157 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:374 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38 lookup_open fs/namei.c:3474 [inline] open_last_lookups fs/namei.c:3564 [inline] path_openat+0xc54/0x27f8 fs/namei.c:3794 do_filp_open+0x1bc/0x3cc fs/namei.c:3824 do_sys_openat2+0x124/0x1b8 fs/open.c:1422 do_sys_open fs/open.c:1437 [inline] __do_sys_openat fs/open.c:1453 [inline] __se_sys_openat fs/open.c:1448 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1448 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 BUG: sleeping function called from invalid context at fs/buffer.c:1437 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 16440, name: syz-executor.5 preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by syz-executor.5/16440: #0: ffff0000ce01e410 (sb_writers#29){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:403 #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:802 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3561 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: path_openat+0x5f0/0x27f8 fs/namei.c:3794 #2: ffff80008e7d44b8 (pointers_lock#2){.+.+}-{2:2}, at: get_block+0x144/0x1320 fs/sysv/itree.c:221 Preemption disabled at: [] get_block+0x144/0x1320 fs/sysv/itree.c:221 CPU: 1 PID: 16440 Comm: syz-executor.5 Tainted: G W 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 __might_resched+0x374/0x4d0 kernel/sched/core.c:10187 __might_sleep+0x90/0xe4 kernel/sched/core.c:10116 __getblk_gfp+0x5c/0x720 fs/buffer.c:1437 __bread_gfp+0x3c/0x2ec fs/buffer.c:1473 sb_bread include/linux/buffer_head.h:326 [inline] get_branch+0x234/0x55c fs/sysv/itree.c:104 get_block+0x15c/0x1320 fs/sysv/itree.c:222 block_read_full_folio+0x3f8/0xd84 fs/buffer.c:2400 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:466 filemap_read_folio+0x14c/0x39c mm/filemap.c:2382 do_read_cache_folio+0x114/0x548 mm/filemap.c:3742 do_read_cache_page+0x4c/0x260 mm/filemap.c:3808 read_cache_page+0x68/0x84 mm/filemap.c:3817 read_mapping_page include/linux/pagemap.h:860 [inline] dir_get_page fs/sysv/dir.c:64 [inline] sysv_find_entry+0x174/0x570 fs/sysv/dir.c:157 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:374 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38 lookup_open fs/namei.c:3474 [inline] open_last_lookups fs/namei.c:3564 [inline] path_openat+0xc54/0x27f8 fs/namei.c:3794 do_filp_open+0x1bc/0x3cc fs/namei.c:3824 do_sys_openat2+0x124/0x1b8 fs/open.c:1422 do_sys_open fs/open.c:1437 [inline] __do_sys_openat fs/open.c:1453 [inline] __se_sys_openat fs/open.c:1448 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1448 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 BUG: sleeping function called from invalid context at fs/buffer.c:1437 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 16440, name: syz-executor.5 preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by syz-executor.5/16440: #0: ffff0000ce01e410 (sb_writers#29){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:403 #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:802 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3561 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: path_openat+0x5f0/0x27f8 fs/namei.c:3794 #2: ffff80008e7d44b8 (pointers_lock#2){.+.+}-{2:2}, at: get_block+0x144/0x1320 fs/sysv/itree.c:221 Preemption disabled at: [] get_block+0x144/0x1320 fs/sysv/itree.c:221 CPU: 0 PID: 16440 Comm: syz-executor.5 Tainted: G W 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 __might_resched+0x374/0x4d0 kernel/sched/core.c:10187 __might_sleep+0x90/0xe4 kernel/sched/core.c:10116 __getblk_gfp+0x5c/0x720 fs/buffer.c:1437 __bread_gfp+0x3c/0x2ec fs/buffer.c:1473 sb_bread include/linux/buffer_head.h:326 [inline] get_branch+0x234/0x55c fs/sysv/itree.c:104 get_block+0x15c/0x1320 fs/sysv/itree.c:222 block_read_full_folio+0x3f8/0xd84 fs/buffer.c:2400 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:466 filemap_read_folio+0x14c/0x39c mm/filemap.c:2382 do_read_cache_folio+0x114/0x548 mm/filemap.c:3742 do_read_cache_page+0x4c/0x260 mm/filemap.c:3808 read_cache_page+0x68/0x84 mm/filemap.c:3817 read_mapping_page include/linux/pagemap.h:860 [inline] dir_get_page fs/sysv/dir.c:64 [inline] sysv_find_entry+0x174/0x570 fs/sysv/dir.c:157 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:374 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38 lookup_open fs/namei.c:3474 [inline] open_last_lookups fs/namei.c:3564 [inline] path_openat+0xc54/0x27f8 fs/namei.c:3794 do_filp_open+0x1bc/0x3cc fs/namei.c:3824 do_sys_openat2+0x124/0x1b8 fs/open.c:1422 do_sys_open fs/open.c:1437 [inline] __do_sys_openat fs/open.c:1453 [inline] __se_sys_openat fs/open.c:1448 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1448 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 BUG: sleeping function called from invalid context at fs/buffer.c:1437 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 16440, name: syz-executor.5 preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by syz-executor.5/16440: #0: ffff0000ce01e410 (sb_writers#29){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:403 #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:802 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3561 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: path_openat+0x5f0/0x27f8 fs/namei.c:3794 #2: ffff80008e7d44b8 (pointers_lock#2){.+.+}-{2:2}, at: get_block+0x144/0x1320 fs/sysv/itree.c:221 Preemption disabled at: [] get_block+0x144/0x1320 fs/sysv/itree.c:221 CPU: 0 PID: 16440 Comm: syz-executor.5 Tainted: G W 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 __might_resched+0x374/0x4d0 kernel/sched/core.c:10187 __might_sleep+0x90/0xe4 kernel/sched/core.c:10116 __getblk_gfp+0x5c/0x720 fs/buffer.c:1437 __bread_gfp+0x3c/0x2ec fs/buffer.c:1473 sb_bread include/linux/buffer_head.h:326 [inline] get_branch+0x234/0x55c fs/sysv/itree.c:104 get_block+0x15c/0x1320 fs/sysv/itree.c:222 block_read_full_folio+0x3f8/0xd84 fs/buffer.c:2400 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:466 filemap_read_folio+0x14c/0x39c mm/filemap.c:2382 do_read_cache_folio+0x114/0x548 mm/filemap.c:3742 do_read_cache_page+0x4c/0x260 mm/filemap.c:3808 read_cache_page+0x68/0x84 mm/filemap.c:3817 read_mapping_page include/linux/pagemap.h:860 [inline] dir_get_page fs/sysv/dir.c:64 [inline] sysv_find_entry+0x174/0x570 fs/sysv/dir.c:157 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:374 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38 lookup_open fs/namei.c:3474 [inline] open_last_lookups fs/namei.c:3564 [inline] path_openat+0xc54/0x27f8 fs/namei.c:3794 do_filp_open+0x1bc/0x3cc fs/namei.c:3824 do_sys_openat2+0x124/0x1b8 fs/open.c:1422 do_sys_open fs/open.c:1437 [inline] __do_sys_openat fs/open.c:1453 [inline] __se_sys_openat fs/open.c:1448 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1448 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 BUG: sleeping function called from invalid context at fs/buffer.c:1437 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 16440, name: syz-executor.5 preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by syz-executor.5/16440: #0: ffff0000ce01e410 (sb_writers#29){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:403 #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:802 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3561 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: path_openat+0x5f0/0x27f8 fs/namei.c:3794 #2: ffff80008e7d44b8 (pointers_lock#2){.+.+}-{2:2}, at: get_block+0x144/0x1320 fs/sysv/itree.c:221 Preemption disabled at: [] get_block+0x144/0x1320 fs/sysv/itree.c:221 CPU: 1 PID: 16440 Comm: syz-executor.5 Tainted: G W 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 __might_resched+0x374/0x4d0 kernel/sched/core.c:10187 __might_sleep+0x90/0xe4 kernel/sched/core.c:10116 __getblk_gfp+0x5c/0x720 fs/buffer.c:1437 __bread_gfp+0x3c/0x2ec fs/buffer.c:1473 sb_bread include/linux/buffer_head.h:326 [inline] get_branch+0x234/0x55c fs/sysv/itree.c:104 get_block+0x15c/0x1320 fs/sysv/itree.c:222 block_read_full_folio+0x3f8/0xd84 fs/buffer.c:2400 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:466 filemap_read_folio+0x14c/0x39c mm/filemap.c:2382 do_read_cache_folio+0x114/0x548 mm/filemap.c:3742 do_read_cache_page+0x4c/0x260 mm/filemap.c:3808 read_cache_page+0x68/0x84 mm/filemap.c:3817 read_mapping_page include/linux/pagemap.h:860 [inline] dir_get_page fs/sysv/dir.c:64 [inline] sysv_find_entry+0x174/0x570 fs/sysv/dir.c:157 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:374 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38 lookup_open fs/namei.c:3474 [inline] open_last_lookups fs/namei.c:3564 [inline] path_openat+0xc54/0x27f8 fs/namei.c:3794 do_filp_open+0x1bc/0x3cc fs/namei.c:3824 do_sys_openat2+0x124/0x1b8 fs/open.c:1422 do_sys_open fs/open.c:1437 [inline] __do_sys_openat fs/open.c:1453 [inline] __se_sys_openat fs/open.c:1448 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1448 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 BUG: sleeping function called from invalid context at fs/buffer.c:1437 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 16440, name: syz-executor.5 preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by syz-executor.5/16440: #0: ffff0000ce01e410 (sb_writers#29){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:403 #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:802 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3561 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: path_openat+0x5f0/0x27f8 fs/namei.c:3794 #2: ffff80008e7d44b8 (pointers_lock#2){.+.+}-{2:2}, at: get_block+0x144/0x1320 fs/sysv/itree.c:221 Preemption disabled at: [] get_block+0x144/0x1320 fs/sysv/itree.c:221 CPU: 0 PID: 16440 Comm: syz-executor.5 Tainted: G W 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 __might_resched+0x374/0x4d0 kernel/sched/core.c:10187 __might_sleep+0x90/0xe4 kernel/sched/core.c:10116 __getblk_gfp+0x5c/0x720 fs/buffer.c:1437 __bread_gfp+0x3c/0x2ec fs/buffer.c:1473 sb_bread include/linux/buffer_head.h:326 [inline] get_branch+0x234/0x55c fs/sysv/itree.c:104 get_block+0x15c/0x1320 fs/sysv/itree.c:222 block_read_full_folio+0x3f8/0xd84 fs/buffer.c:2400 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:466 filemap_read_folio+0x14c/0x39c mm/filemap.c:2382 do_read_cache_folio+0x114/0x548 mm/filemap.c:3742 do_read_cache_page+0x4c/0x260 mm/filemap.c:3808 read_cache_page+0x68/0x84 mm/filemap.c:3817 read_mapping_page include/linux/pagemap.h:860 [inline] dir_get_page fs/sysv/dir.c:64 [inline] sysv_find_entry+0x174/0x570 fs/sysv/dir.c:157 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:374 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38 lookup_open fs/namei.c:3474 [inline] open_last_lookups fs/namei.c:3564 [inline] path_openat+0xc54/0x27f8 fs/namei.c:3794 do_filp_open+0x1bc/0x3cc fs/namei.c:3824 do_sys_openat2+0x124/0x1b8 fs/open.c:1422 do_sys_open fs/open.c:1437 [inline] __do_sys_openat fs/open.c:1453 [inline] __se_sys_openat fs/open.c:1448 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1448 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 BUG: sleeping function called from invalid context at include/linux/pagemap.h:1040 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 16440, name: syz-executor.5 preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by syz-executor.5/16440: #0: ffff0000ce01e410 (sb_writers#29){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:403 #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:802 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3561 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: path_openat+0x5f0/0x27f8 fs/namei.c:3794 #2: ffff80008e7d44b8 (pointers_lock#2){.+.+}-{2:2}, at: get_block+0x144/0x1320 fs/sysv/itree.c:221 Preemption disabled at: [] get_block+0x144/0x1320 fs/sysv/itree.c:221 CPU: 0 PID: 16440 Comm: syz-executor.5 Tainted: G W 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 __might_resched+0x374/0x4d0 kernel/sched/core.c:10187 __might_sleep+0x90/0xe4 kernel/sched/core.c:10116 folio_lock include/linux/pagemap.h:1040 [inline] __filemap_get_folio+0xb4/0x8b8 mm/filemap.c:1882 grow_dev_page fs/buffer.c:1058 [inline] grow_buffers fs/buffer.c:1118 [inline] __getblk_slow fs/buffer.c:1145 [inline] __getblk_gfp+0x1e0/0x720 fs/buffer.c:1439 __bread_gfp+0x3c/0x2ec fs/buffer.c:1473 sb_bread include/linux/buffer_head.h:326 [inline] get_branch+0x234/0x55c fs/sysv/itree.c:104 get_block+0x15c/0x1320 fs/sysv/itree.c:222 block_read_full_folio+0x3f8/0xd84 fs/buffer.c:2400 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:466 filemap_read_folio+0x14c/0x39c mm/filemap.c:2382 do_read_cache_folio+0x114/0x548 mm/filemap.c:3742 do_read_cache_page+0x4c/0x260 mm/filemap.c:3808 read_cache_page+0x68/0x84 mm/filemap.c:3817 read_mapping_page include/linux/pagemap.h:860 [inline] dir_get_page fs/sysv/dir.c:64 [inline] sysv_find_entry+0x174/0x570 fs/sysv/dir.c:157 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:374 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38 lookup_open fs/namei.c:3474 [inline] open_last_lookups fs/namei.c:3564 [inline] path_openat+0xc54/0x27f8 fs/namei.c:3794 do_filp_open+0x1bc/0x3cc fs/namei.c:3824 do_sys_openat2+0x124/0x1b8 fs/open.c:1422 do_sys_open fs/open.c:1437 [inline] __do_sys_openat fs/open.c:1453 [inline] __se_sys_openat fs/open.c:1448 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1448 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 BUG: sleeping function called from invalid context at fs/buffer.c:1437 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 16440, name: syz-executor.5 preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by syz-executor.5/16440: #0: ffff0000ce01e410 (sb_writers#29){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:403 #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:802 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3561 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: path_openat+0x5f0/0x27f8 fs/namei.c:3794 #2: ffff80008e7d44b8 (pointers_lock#2){.+.+}-{2:2}, at: get_block+0x144/0x1320 fs/sysv/itree.c:221 Preemption disabled at: [] get_block+0x144/0x1320 fs/sysv/itree.c:221 CPU: 0 PID: 16440 Comm: syz-executor.5 Tainted: G W 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 __might_resched+0x374/0x4d0 kernel/sched/core.c:10187 __might_sleep+0x90/0xe4 kernel/sched/core.c:10116 __getblk_gfp+0x5c/0x720 fs/buffer.c:1437 __bread_gfp+0x3c/0x2ec fs/buffer.c:1473 sb_bread include/linux/buffer_head.h:326 [inline] get_branch+0x234/0x55c fs/sysv/itree.c:104 get_block+0x15c/0x1320 fs/sysv/itree.c:222 block_read_full_folio+0x3f8/0xd84 fs/buffer.c:2400 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:466 filemap_read_folio+0x14c/0x39c mm/filemap.c:2382 do_read_cache_folio+0x114/0x548 mm/filemap.c:3742 do_read_cache_page+0x4c/0x260 mm/filemap.c:3808 read_cache_page+0x68/0x84 mm/filemap.c:3817 read_mapping_page include/linux/pagemap.h:860 [inline] dir_get_page fs/sysv/dir.c:64 [inline] sysv_find_entry+0x174/0x570 fs/sysv/dir.c:157 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:374 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38 lookup_open fs/namei.c:3474 [inline] open_last_lookups fs/namei.c:3564 [inline] path_openat+0xc54/0x27f8 fs/namei.c:3794 do_filp_open+0x1bc/0x3cc fs/namei.c:3824 do_sys_openat2+0x124/0x1b8 fs/open.c:1422 do_sys_open fs/open.c:1437 [inline] __do_sys_openat fs/open.c:1453 [inline] __se_sys_openat fs/open.c:1448 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1448 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 BUG: sleeping function called from invalid context at fs/buffer.c:1437 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 16440, name: syz-executor.5 preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by syz-executor.5/16440: #0: ffff0000ce01e410 (sb_writers#29){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:403 #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:802 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3561 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: path_openat+0x5f0/0x27f8 fs/namei.c:3794 #2: ffff80008e7d44b8 (pointers_lock#2){.+.+}-{2:2}, at: get_block+0x144/0x1320 fs/sysv/itree.c:221 Preemption disabled at: [] get_block+0x144/0x1320 fs/sysv/itree.c:221 CPU: 0 PID: 16440 Comm: syz-executor.5 Tainted: G W 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 __might_resched+0x374/0x4d0 kernel/sched/core.c:10187 __might_sleep+0x90/0xe4 kernel/sched/core.c:10116 __getblk_gfp+0x5c/0x720 fs/buffer.c:1437 __bread_gfp+0x3c/0x2ec fs/buffer.c:1473 sb_bread include/linux/buffer_head.h:326 [inline] get_branch+0x234/0x55c fs/sysv/itree.c:104 get_block+0x15c/0x1320 fs/sysv/itree.c:222 block_read_full_folio+0x3f8/0xd84 fs/buffer.c:2400 sysv_read_folio+0x28/0x38 fs/sysv/itree.c:466 filemap_read_folio+0x14c/0x39c mm/filemap.c:2382 do_read_cache_folio+0x114/0x548 mm/filemap.c:3742 do_read_cache_page+0x4c/0x260 mm/filemap.c:3808 read_cache_page+0x68/0x84 mm/filemap.c:3817 read_mapping_page include/linux/pagemap.h:860 [inline] dir_get_page fs/sysv/dir.c:64 [inline] sysv_find_entry+0x174/0x570 fs/sysv/dir.c:157 sysv_inode_by_name+0xa0/0x330 fs/sysv/dir.c:374 sysv_lookup+0x74/0xe4 fs/sysv/namei.c:38 lookup_open fs/namei.c:3474 [inline] open_last_lookups fs/namei.c:3564 [inline] path_openat+0xc54/0x27f8 fs/namei.c:3794 do_filp_open+0x1bc/0x3cc fs/namei.c:3824 do_sys_openat2+0x124/0x1b8 fs/open.c:1422 do_sys_open fs/open.c:1437 [inline] __do_sys_openat fs/open.c:1453 [inline] __se_sys_openat fs/open.c:1448 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1448 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 BUG: sleeping function called from invalid context at fs/buffer.c:1437 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 16440, name: syz-executor.5 preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by syz-executor.5/16440: #0: ffff0000ce01e410 (sb_writers#29){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:403 #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:802 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: open_last_lookups fs/namei.c:3561 [inline] #1: ffff000137490188 (&type->i_mutex_dir_key#19){+.+.}-{3:3}, at: path_openat+0x5f0/0x27f8 fs/namei.c:3794