DEBUG_RWSEMS_WARN_ON((rwsem_owner(sem) != current) && !rws DEBUG_RWSEMS_WARN_ON((rwsem_owner(sem) != current) && !rwsem_test_oflags(sem, RWSEM_NONSPINNABLE)): count = 0x0, magic = 0xffff0000e93b61d0, owner = 0x0, curr 0xffff0000d4be8000, list empty WARNING: kernel/locking/rwsem.c:1381 at __up_write kernel/locking/rwsem.c:1380 [inline], CPU#0: syz.0.178/7406 WARNING: kernel/locking/rwsem.c:1381 at up_write+0x5ac/0x5e0 kernel/locking/rwsem.c:1643, CPU#0: syz.0.178/7406 Modules linked in: CPU: 0 UID: 0 PID: 7406 Comm: syz.0.178 Not tainted syzkaller #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 63400005 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : __up_write kernel/locking/rwsem.c:1380 [inline] pc : up_write+0x5ac/0x5e0 kernel/locking/rwsem.c:1643 lr : __up_write kernel/locking/rwsem.c:1380 [inline] lr : up_write+0x5ac/0x5e0 kernel/locking/rwsem.c:1643 sp : ffff8000a37f72b0 x29: ffff8000a37f72c0 x28: ffff7000146fee6c x27: ffff80008b3e2100 x26: dfff800000000000 x25: 1fffe0001d276c3b x24: ffff0000e93b6228 x23: 0000000000000000 x22: 0000000000000000 x21: ffff0000d4be8000 x20: ffff0000e93b61d0 x19: ffff0000e93b61d0 x18: 1fffe0003377d090 x17: ffff80008f86e000 x16: ffff800082e5e68c x15: 0000000000000001 x14: 1fffe0003377fb48 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000080000 x10: 0000000000000003 x9 : 29c5f2cf54010700 x8 : 29c5f2cf54010700 x7 : ffff80008049ea88 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000007 x1 : ffff80008b5a9ce0 x0 : 0000000000000001 Call trace: __up_write kernel/locking/rwsem.c:1380 [inline] (P) up_write+0x5ac/0x5e0 kernel/locking/rwsem.c:1643 (P) inode_unlock include/linux/fs.h:1037 [inline] end_dirop+0x78/0x94 fs/namei.c:2888 end_creating_keep include/linux/namei.h:147 [inline] ovl_workdir_create+0x46c/0x768 fs/overlayfs/super.c:346 ovl_make_workdir fs/overlayfs/super.c:682 [inline] ovl_get_workdir fs/overlayfs/super.c:840 [inline] ovl_fill_super_creds fs/overlayfs/super.c:1453 [inline] ovl_fill_super+0x13f4/0x4cdc fs/overlayfs/super.c:1567 vfs_get_super fs/super.c:1324 [inline] get_tree_nodev+0xb4/0x144 fs/super.c:1343 ovl_get_tree+0x28/0x38 fs/overlayfs/params.c:708 vfs_get_tree+0x90/0x28c fs/super.c:1751 fc_mount fs/namespace.c:1199 [inline] do_new_mount_fc fs/namespace.c:3636 [inline] do_new_mount+0x284/0x944 fs/namespace.c:3712 path_mount+0x5b4/0xdfc fs/namespace.c:4022 do_mount fs/namespace.c:4035 [inline] __do_sys_mount fs/namespace.c:4224 [inline] __se_sys_mount fs/namespace.c:4201 [inline] __arm64_sys_mount+0x3e8/0x468 fs/namespace.c:4201 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0xe8/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x26c arch/arm64/kernel/entry-common.c:724 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:743 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 irq event stamp: 1498 hardirqs last enabled at (1497): [] raw_spin_rq_unlock_irq kernel/sched/sched.h:1570 [inline] hardirqs last enabled at (1497): [] finish_lock_switch+0xb0/0x1c0 kernel/sched/core.c:4995 hardirqs last disabled at (1498): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:412 softirqs last enabled at (956): [] softirq_handle_end kernel/softirq.c:468 [inline] softirqs last enabled at (956): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:650 softirqs last disabled at (823): [] __do_softirq+0x14/0x20 kernel/softirq.c:656 ---[ end trace 0000000000000000 ]---