INFO: task kcompactd0:1657 blocked for more than 143 seconds. Not tainted 5.13.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kcompactd0 state:D stack:27600 pid: 1657 ppid: 2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:4683 [inline] __schedule+0x934/0x2710 kernel/sched/core.c:5940 schedule+0xd3/0x270 kernel/sched/core.c:6019 io_schedule+0xba/0x130 kernel/sched/core.c:8007 wait_on_page_bit_common+0x537/0xe60 mm/filemap.c:1301 lock_page include/linux/pagemap.h:626 [inline] __unmap_and_move mm/migrate.c:1024 [inline] unmap_and_move mm/migrate.c:1174 [inline] migrate_pages+0xa5a/0x3940 mm/migrate.c:1448 compact_zone+0x1ab9/0x3850 mm/compaction.c:2401 kcompactd_do_work+0x2c9/0x730 mm/compaction.c:2816 kcompactd+0x262/0xd10 mm/compaction.c:2911 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Showing all locks held in the system: 3 locks held by kworker/u4:0/9: #0: ffff8880b9d35a58 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested kernel/sched/core.c:460 [inline] #0: ffff8880b9d35a58 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock kernel/sched/sched.h:1307 [inline] #0: ffff8880b9d35a58 (&rq->__lock){-.-.}-{2:2}, at: rq_lock kernel/sched/sched.h:1610 [inline] #0: ffff8880b9d35a58 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x22d/0x2710 kernel/sched/core.c:5854 #1: ffff8880b9d1f988 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x16a/0x480 kernel/sched/psi.c:871 #2: ffff888030280d00 (&wdev->mtx){+.+.}-{3:3}, at: sdata_lock net/mac80211/ieee80211_i.h:1004 [inline] #2: ffff888030280d00 (&wdev->mtx){+.+.}-{3:3}, at: ieee80211_ibss_work+0x93/0xe80 net/mac80211/ibss.c:1683 4 locks held by kworker/u4:2/56: 1 lock held by khungtaskd/1650: #0: ffffffff8c17bb80 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446 1 lock held by khugepaged/1660: 1 lock held by kswapd0/2152: 1 lock held by kswapd1/2153: 2 locks held by systemd-journal/4862: 2 locks held by rsyslogd/8135: 2 locks held by in:imklog/8146: 2 locks held by cron/8138: 2 locks held by syz-fuzzer/8452: ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1650 Comm: khungtaskd Not tainted 5.13.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:96 nmi_cpu_backtrace.cold+0x44/0xd7 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:209 [inline] watchdog+0xd4b/0xfb0 kernel/hung_task.c:294 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 8146 Comm: in:imklog Not tainted 5.13.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:check_kcov_mode kernel/kcov.c:163 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0xd/0x60 kernel/kcov.c:197 Code: ff ff ba 08 00 00 00 4d 8b 03 48 0f bd ca 49 8b 45 00 48 63 c9 e9 64 ff ff ff 0f 1f 00 65 8b 05 89 65 8c 7e 89 c1 48 8b 34 24 <81> e1 00 01 00 00 65 48 8b 14 25 00 f0 01 00 a9 00 01 ff 00 74 0e RSP: 0018:ffffc9000bfbef10 EFLAGS: 00000046 RAX: 0000000080000001 RBX: ffff888140144000 RCX: 0000000080000001 RDX: 0000000000000000 RSI: ffffffff819fd840 RDI: 0000000000000003 RBP: ffffea000536df80 R08: 0000000000000000 R09: 000000000536df00 R10: ffffffff819fd832 R11: 0000000000000000 R12: 0000000000000000 R13: ffff88823fff8000 R14: ffffea000536df90 R15: ffffea000536df80 FS: 00007f9fab54b700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c01e3fc0b1 CR3: 0000000037567000 CR4: 0000000000350ee0 Call Trace: PageMemcgKmem include/linux/memcontrol.h:538 [inline] page_memcg+0x50/0x430 include/linux/memcontrol.h:452 page_matches_lruvec include/linux/memcontrol.h:1504 [inline] move_pages_to_lru+0x533/0x2160 mm/vmscan.c:2066 shrink_inactive_list mm/vmscan.c:2148 [inline] shrink_list mm/vmscan.c:2367 [inline] shrink_lruvec+0xbbf/0x2230 mm/vmscan.c:2662 shrink_node_memcgs mm/vmscan.c:2850 [inline] shrink_node+0x868/0x1df0 mm/vmscan.c:2967 shrink_zones mm/vmscan.c:3170 [inline] do_try_to_free_pages+0x388/0x14b0 mm/vmscan.c:3225 try_to_free_pages+0x29f/0x750 mm/vmscan.c:3464 __perform_reclaim mm/page_alloc.c:4617 [inline] __alloc_pages_direct_reclaim mm/page_alloc.c:4638 [inline] __alloc_pages_slowpath.constprop.0+0x828/0x21b0 mm/page_alloc.c:5042 __alloc_pages+0x41f/0x500 mm/page_alloc.c:5399 alloc_pages+0x18c/0x2a0 mm/mempolicy.c:2272 __page_cache_alloc mm/filemap.c:1005 [inline] __page_cache_alloc+0x303/0x3a0 mm/filemap.c:990 pagecache_get_page+0x389/0x18c0 mm/filemap.c:1885 filemap_fault+0x15bf/0x24e0 mm/filemap.c:2992 ext4_filemap_fault+0x87/0xc0 fs/ext4/inode.c:6194 __do_fault+0x10d/0x4e0 mm/memory.c:3729 do_read_fault mm/memory.c:4033 [inline] do_fault mm/memory.c:4161 [inline] handle_pte_fault mm/memory.c:4420 [inline] __handle_mm_fault+0x2c11/0x5320 mm/memory.c:4555 handle_mm_fault+0x1c8/0x7f0 mm/memory.c:4653 do_user_addr_fault+0x483/0x1210 arch/x86/mm/fault.c:1390 handle_page_fault arch/x86/mm/fault.c:1475 [inline] exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1531 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568 RIP: 0033:0x7f9fabf7b73f Code: Unable to access opcode bytes at RIP 0x7f9fabf7b715. RSP: 002b:00007f9fab52a590 EFLAGS: 00010207 RAX: 0000000000000045 RBX: 0000000000000000 RCX: 00007f9fadb8e22d RDX: 0000000000000045 RSI: 00007f9fab52ada0 RDI: 0000000000000000 RBP: 000056297b5039d0 R08: 0000000000000000 R09: 0000000000000000 R10: 6e65203a316e6170 R11: 0000000000000000 R12: 00007f9fab52ada0 R13: 0000000000001fa0 R14: 0000000000001f9f R15: 00007f9fab52ae30