ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. INFO: task segctord:15406 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. segctord D30088 15406 2 0x80000000 overlayfs: unrecognized mount option "nfs_export=off\" or missing value Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 overlayfs: failed to resolve '': -2 ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:589 [inline] rwsem_down_write_failed+0x3aa/0x760 kernel/locking/rwsem-xadd.c:618 ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. call_rwsem_down_write_failed+0x13/0x20 arch/x86/lib/rwsem.S:117 REISERFS (device loop2): found reiserfs format "3.6" with non-standard journal __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x4f/0x90 kernel/locking/rwsem.c:72 REISERFS (device loop2): using ordered data mode nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 reiserfs: using flush barriers REISERFS (device loop2): journal params: device loop2, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 nilfs_segctor_thread_construct fs/nilfs2/segment.c:2479 [inline] nilfs_segctor_thread+0x3c0/0xf50 fs/nilfs2/segment.c:2563 REISERFS (device loop2): checking transaction log (loop2) ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. REISERFS (device loop2): Using rupasov hash to sort names ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. REISERFS (device loop2): Created .reiserfs_priv - reserved for xattr storage. ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Showing all locks held in the system: 1 lock held by khungtaskd/1570: #0: 00000000121c0f0f (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by systemd-udevd/4697: 1 lock held by in:imklog/7798: #0: 000000008097241f (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 3 locks held by kworker/u4:7/9471: 4 locks held by kworker/u4:8/9510: 6 locks held by syz-executor.1/15391: 1 lock held by segctord/15406: #0: 0000000018e1e66b (&nilfs->ns_segctor_sem){++++}, at: nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 3 locks held by kworker/u4:13/25791: 1 lock held by systemd-udevd/28197: 1 lock held by syz-executor.2/28276: #0: 00000000730c790c (&type->s_umount_key#85){++++}, at: iterate_supers+0xdb/0x290 fs/super.c:631 1 lock held by syz-executor.2/28282: #0: 00000000730c790c (&type->s_umount_key#85){++++}, at: iterate_supers+0xdb/0x290 fs/super.c:631 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4690 Comm: systemd-journal Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:check_kcov_mode kernel/kcov.c:67 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x14/0x50 kernel/kcov.c:101 Code: 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 65 48 8b 04 25 c0 df 01 00 65 8b 15 cc 59 9f 7e <81> e2 00 01 1f 00 75 2b 8b 90 60 13 00 00 83 fa 02 75 20 48 8b 88 RSP: 0018:ffff8880a136fa28 EFLAGS: 00000286 RAX: ffff8880a1366500 RBX: dffffc0000000000 RCX: 1ffff1101426df67 RDX: 0000000080000000 RSI: ffffffff816c36e5 RDI: ffffc90001a95041 RBP: ffff8880a136fb00 R08: 0000000000000000 R09: 000000007fff0000 R10: 0000000000000004 R11: 0000000000000000 R12: ffffffff886fb460 R13: ffffed101426df62 R14: ffffc90001a95048 R15: ffff8880a136fb38 FS: 00007ff422cdc8c0(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff41ffcd000 CR3: 00000000a139e000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ___bpf_prog_run+0x45/0x4e80 kernel/bpf/core.c:1065