INFO: task segctord:15104 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. segctord D30088 15104 2 0x80000000 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:589 [inline] rwsem_down_write_failed+0x3aa/0x760 kernel/locking/rwsem-xadd.c:618 call_rwsem_down_write_failed+0x13/0x20 arch/x86/lib/rwsem.S:117 __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x4f/0x90 kernel/locking/rwsem.c:72 nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 nilfs_segctor_thread_construct fs/nilfs2/segment.c:2479 [inline] nilfs_segctor_thread+0x3c0/0xf50 fs/nilfs2/segment.c:2563 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 INFO: task segctord:15273 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. segctord D29872 15273 2 0x80000000 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:589 [inline] rwsem_down_write_failed+0x3aa/0x760 kernel/locking/rwsem-xadd.c:618 call_rwsem_down_write_failed+0x13/0x20 arch/x86/lib/rwsem.S:117 __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x4f/0x90 kernel/locking/rwsem.c:72 nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 nilfs_segctor_thread_construct fs/nilfs2/segment.c:2479 [inline] nilfs_segctor_thread+0x3c0/0xf50 fs/nilfs2/segment.c:2563 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Showing all locks held in the system: 1 lock held by khungtaskd/1570: #0: 0000000032140c14 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7845: #0: 0000000067a71bec (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 6 locks held by syz-executor.5/15098: 1 lock held by segctord/15104: #0: 00000000108911b6 (&nilfs->ns_segctor_sem){++++}, at: nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 6 locks held by syz-executor.1/15268: 1 lock held by segctord/15273: #0: 00000000044e9bb8 (&nilfs->ns_segctor_sem){++++}, at: nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 2 locks held by kworker/u4:8/16595: 1 lock held by syz-executor.1/22971: #0: 000000006d125bb3 (&rq->lock){-.-.}, at: rq_lock kernel/sched/sched.h:1826 [inline] #0: 000000006d125bb3 (&rq->lock){-.-.}, at: __schedule+0x1f9/0x2040 kernel/sched/core.c:3455 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 23081 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:rcu_dynticks_curr_cpu_in_eqs kernel/rcu/tree.c:348 [inline] RIP: 0010:rcu_is_watching+0x38/0xc0 kernel/rcu/tree.c:1025 Code: 2e 94 25 02 48 c7 c3 c0 2a 02 00 48 ba 00 00 00 00 00 fc ff df 89 c0 48 8d 3c c5 00 af cf 89 48 89 f9 48 c1 e9 03 80 3c 11 00 <75> 6d 48 03 1c c5 00 af cf 89 be 04 00 00 00 48 8d 6b 10 48 89 ef RSP: 0018:ffff8880af2a7930 EFLAGS: 00000046 RAX: 0000000000000001 RBX: 0000000000022ac0 RCX: 1ffffffff139f5e1 RDX: dffffc0000000000 RSI: ffffffff83771e31 RDI: ffffffff89cfaf08 RBP: ffff888097056640 R08: ffff8880ba12b278 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000001 R12: ffff888097056640 R13: ffff8880b46324c0 R14: ffff8880af2a0000 R15: ffff8880ba12b0c0 FS: 0000555555d36400(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffd13575ff8 CR3: 000000003ef7d000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_read_lock_sched_held+0xc6/0x1d0 kernel/rcu/update.c:113 trace_sched_switch include/trace/events/sched.h:138 [inline] __schedule+0x16a0/0x2040 kernel/sched/core.c:3514 preempt_schedule_notrace+0x92/0x110 kernel/sched/core.c:3715 ___preempt_schedule_notrace+0x16/0x2e rcu_read_unlock_sched_notrace include/linux/rcupdate.h:771 [inline] trace_block_touch_buffer include/trace/events/block.h:45 [inline] touch_buffer fs/buffer.c:58 [inline] __find_get_block+0x4da/0xde0 fs/buffer.c:1299 sb_find_get_block include/linux/buffer_head.h:346 [inline] recently_deleted fs/ext4/ialloc.c:684 [inline] find_inode_bit+0x213/0x520 fs/ext4/ialloc.c:724 __ext4_new_inode+0x160c/0x5a20 fs/ext4/ialloc.c:916 ext4_symlink+0x3f5/0xc00 fs/ext4/namei.c:3176 vfs_symlink+0x453/0x6c0 fs/namei.c:4129 do_symlinkat+0x258/0x2c0 fs/namei.c:4156 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1d9027cf47 Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 0a 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd5aa9f1b8 EFLAGS: 00000202 ORIG_RAX: 000000000000010a RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1d9027cf47 RDX: 00007f1d902d8b8a RSI: 00000000ffffff9c RDI: 00007f1d902d7713 RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd5aa9ec30 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd5aa9f280 audit: type=1804 audit(1668691320.103:277): pid=23092 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir3984346864/syzkaller.GDOZTY/111/bus" dev="sda1" ino=14881 res=1