new mount options do not match the existing superblock, will be ignored new mount options do not match the existing superblock, will be ignored new mount options do not match the existing superblock, will be ignored INFO: task syz-executor.2:21668 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 new mount options do not match the existing superblock, will be ignored "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. new mount options do not match the existing superblock, will be ignored syz-executor.2 D28384 21668 8118 0x00000004 Call Trace: new mount options do not match the existing superblock, will be ignored context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 new mount options do not match the existing superblock, will be ignored new mount options do not match the existing superblock, will be ignored new mount options do not match the existing superblock, will be ignored schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 new mount options do not match the existing superblock, will be ignored __mutex_lock_common kernel/locking/mutex.c:1016 [inline] __mutex_lock+0x5f0/0x1190 kernel/locking/mutex.c:1078 new mount options do not match the existing superblock, will be ignored new mount options do not match the existing superblock, will be ignored pipe_lock_nested fs/pipe.c:77 [inline] pipe_lock fs/pipe.c:85 [inline] pipe_wait+0x1bd/0x1e0 fs/pipe.c:133 new mount options do not match the existing superblock, will be ignored new mount options do not match the existing superblock, will be ignored new mount options do not match the existing superblock, will be ignored new mount options do not match the existing superblock, will be ignored pipe_write+0x5c3/0xf80 fs/pipe.c:500 call_write_iter include/linux/fs.h:1821 [inline] new_sync_write fs/read_write.c:474 [inline] __vfs_write+0x51b/0x770 fs/read_write.c:487 vfs_write+0x1f3/0x540 fs/read_write.c:549 ksys_write+0x12b/0x2a0 fs/read_write.c:599 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f40686d85a9 Code: Bad RIP value. RSP: 002b:00007f4066c09168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007f40687f9120 RCX: 00007f40686d85a9 RDX: 00000000fffffecc RSI: 0000000020000000 RDI: 0000000000000004 RBP: 00007f40687337b0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd9ae3653f R14: 00007f4066c09300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1572: #0: 00000000c2153a49 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7789: new mount options do not match the existing superblock, will be ignored #0: 00000000fc20b235 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 1 lock held by syz-executor.0/8114: 2 locks held by kworker/u4:12/13058: 1 lock held by syz-executor.2/21668: new mount options do not match the existing superblock, will be ignored #0: 00000000a83ebcf3 (&pipe->mutex/1){+.+.}, at: pipe_lock_nested fs/pipe.c:77 [inline] #0: 00000000a83ebcf3 (&pipe->mutex/1){+.+.}, at: pipe_lock fs/pipe.c:85 [inline] #0: 00000000a83ebcf3 (&pipe->mutex/1){+.+.}, at: pipe_wait+0x1bd/0x1e0 fs/pipe.c:133 new mount options do not match the existing superblock, will be ignored 2 locks held by syz-executor.2/21680: 1 lock held by syz-executor.1/23369: #0: 00000000f7eb5102 (&pipe->mutex/1){+.+.}, at: pipe_lock_nested fs/pipe.c:77 [inline] #0: 00000000f7eb5102 (&pipe->mutex/1){+.+.}, at: pipe_lock fs/pipe.c:85 [inline] #0: 00000000f7eb5102 (&pipe->mutex/1){+.+.}, at: pipe_wait+0x1bd/0x1e0 fs/pipe.c:133 2 locks held by syz-executor.1/23370: #0: 00000000f7eb5102 (&pipe->mutex/1){+.+.}, at: pipe_lock_nested fs/pipe.c:77 [inline] #0: 00000000f7eb5102 (&pipe->mutex/1){+.+.}, at: pipe_lock fs/pipe.c:85 [inline] #0: 00000000f7eb5102 (&pipe->mutex/1){+.+.}, at: pipe_wait+0x1bd/0x1e0 fs/pipe.c:133 #1: 00000000d4a8207b (&table[i].mutex){+.+.}, at: nfnl_lock net/netfilter/nfnetlink.c:62 [inline] #1: 00000000d4a8207b (&table[i].mutex){+.+.}, at: nfnetlink_rcv_msg+0x98d/0xf60 net/netfilter/nfnetlink.c:228 3 locks held by syz-executor.2/25658: ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1572 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4694 Comm: systemd-journal Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x50 kernel/kcov.c:100 Code: e8 11 dd 35 00 e9 ab fe ff ff 4c 89 ef e8 04 dd 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 <65> 48 8b 04 25 c0 df 01 00 65 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 RSP: 0018:ffff8880a08b7908 EFLAGS: 00000046 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 1ffff11027fff6e3 RSI: ffffffff83772099 RDI: ffffffff8871ebe0 RBP: ffffffff8871ebe0 R08: 0000000000000000 R09: ffffed1027fff788 R10: ffff88813fffbc43 R11: 0000000000000000 R12: 0000000000000000 R13: fffffffffffffffe R14: ffff88813fffb6c0 R15: 000000000002ea68 FS: 00007f86fd18e8c0(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f86fa9c0000 CR3: 00000000a0d32000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __this_cpu_preempt_check+0x9/0x20 lib/smp_processor_id.c:62 __mod_zone_page_state+0x46/0xf0 mm/vmstat.c:323 __mod_zone_freepage_state include/linux/vmstat.h:382 [inline] rmqueue mm/page_alloc.c:3039 [inline] get_page_from_freelist+0x254b/0x4170 mm/page_alloc.c:3373 __alloc_pages_nodemask+0x387/0x2890 mm/page_alloc.c:4399 __alloc_pages include/linux/gfp.h:496 [inline] __alloc_pages_node include/linux/gfp.h:509 [inline] kmem_getpages mm/slab.c:1412 [inline] cache_grow_begin+0xa4/0x8a0 mm/slab.c:2682 cache_alloc_refill+0x273/0x340 mm/slab.c:3049 ____cache_alloc mm/slab.c:3132 [inline] __do_cache_alloc mm/slab.c:3354 [inline] slab_alloc mm/slab.c:3389 [inline] kmem_cache_alloc+0x346/0x370 mm/slab.c:3557 getname_flags+0xce/0x590 fs/namei.c:140 getname fs/namei.c:211 [inline] user_path_create fs/namei.c:3696 [inline] do_mkdirat+0x8d/0x2d0 fs/namei.c:3834 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f86fc449687 Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffcb1374218 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007ffcb1377280 RCX: 00007f86fc449687 RDX: 0000000000000000 RSI: 00000000000001ed RDI: 0000563c80bfb8a0 RBP: 00007ffcb1374250 R08: 0000563c7f4b73e5 R09: 0000000000000018 R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 R13: 0000000000000001 R14: 0000563c80bfb8a0 R15: 00007ffcb1374890