BUG: sleeping function called from invalid context at ./include/linux/sched/mm.h:321 in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 9262, name: syz.8.331 preempt_count: 0, expected: 0 RCU nest depth: 1, expected: 0 4 locks held by syz.8.331/9262: #0: ffff888031f54478 (&f->f_pos_lock){+.+.}-{4:4}, at: fdget_pos+0x247/0x310 fs/file.c:1213 #1: ffff88805d3a92c0 (&ovl_i_mutex_dir_key[depth]){++++}-{4:4}, at: wrap_directory_iterator+0x5a/0xd0 fs/readdir.c:54 #2: ffff888031c28148 (&type->i_mutex_dir_key#26){++++}-{4:4}, at: iterate_dir+0x4a6/0x760 fs/readdir.c:101 #3: ffffffff8ed3dfe0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline] #3: ffffffff8ed3dfe0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline] #3: ffffffff8ed3dfe0 (rcu_read_lock){....}-{1:3}, at: afs_dynroot_readdir+0x466/0xbe0 fs/afs/dynroot.c:351 CPU: 1 UID: 0 PID: 9262 Comm: syz.8.331 Not tainted 6.15.0-rc1-syzkaller-00095-g2eb959eeecc6 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 __might_resched+0x558/0x6c0 kernel/sched/core.c:8818 might_alloc include/linux/sched/mm.h:321 [inline] slab_pre_alloc_hook mm/slub.c:4102 [inline] slab_alloc_node mm/slub.c:4180 [inline] __do_kmalloc_node mm/slub.c:4330 [inline] __kmalloc_noprof+0xd0/0x4d0 mm/slub.c:4343 kmalloc_noprof include/linux/slab.h:909 [inline] ovl_cache_entry_new+0x39/0x7b0 fs/overlayfs/readdir.c:152 ovl_cache_entry_add_rb fs/overlayfs/readdir.c:188 [inline] ovl_fill_merge+0x416/0x830 fs/overlayfs/readdir.c:266 dir_emit include/linux/fs.h:3861 [inline] afs_dynroot_readdir_cells fs/afs/dynroot.c:310 [inline] afs_dynroot_readdir+0x814/0xbe0 fs/afs/dynroot.c:352 iterate_dir+0x5a9/0x760 fs/readdir.c:108 ovl_dir_read+0xfe/0x570 fs/overlayfs/readdir.c:313 ovl_dir_read_merged+0x315/0x5e0 fs/overlayfs/readdir.c:369 ovl_cache_get fs/overlayfs/readdir.c:422 [inline] ovl_iterate+0x1196/0x21c0 fs/overlayfs/readdir.c:783 wrap_directory_iterator+0x91/0xd0 fs/readdir.c:65 iterate_dir+0x5a9/0x760 fs/readdir.c:108 __do_sys_getdents64 fs/readdir.c:403 [inline] __se_sys_getdents64+0x1e4/0x4c0 fs/readdir.c:389 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fc00ad8d169 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fc008bf6038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 RAX: ffffffffffffffda RBX: 00007fc00afa5fa0 RCX: 00007fc00ad8d169 RDX: 0000000000001000 RSI: 0000200000000f80 RDI: 0000000000000006 RBP: 00007fc00ae0e730 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fc00afa5fa0 R15: 00007fff9d8e1af8