INFO: task syz-executor.4:23596 blocked for more than 143 seconds. Not tainted 5.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.4 state:D stack:26232 pid:23596 ppid: 8424 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:4972 [inline] __schedule+0xa9a/0x4940 kernel/sched/core.c:6253 schedule+0xd2/0x260 kernel/sched/core.c:6326 rwsem_down_write_slowpath+0x761/0x1130 kernel/locking/rwsem.c:1117 __down_write_common kernel/locking/rwsem.c:1272 [inline] __down_write_common kernel/locking/rwsem.c:1269 [inline] __down_write kernel/locking/rwsem.c:1281 [inline] down_write+0x135/0x150 kernel/locking/rwsem.c:1528 inode_lock include/linux/fs.h:783 [inline] lock_mount+0x8a/0x2e0 fs/namespace.c:2242 do_new_mount_fc fs/namespace.c:2931 [inline] do_new_mount fs/namespace.c:2990 [inline] path_mount+0x14c6/0x1fa0 fs/namespace.c:3318 do_mount fs/namespace.c:3331 [inline] __do_sys_mount fs/namespace.c:3539 [inline] __se_sys_mount fs/namespace.c:3516 [inline] __x64_sys_mount+0x27f/0x300 fs/namespace.c:3516 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fa869c4dae9 RSP: 002b:00007fa867181188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa869d610e0 RCX: 00007fa869c4dae9 RDX: 0000000020000140 RSI: 0000000020000200 RDI: 0000000000000000 RBP: 00007fa869ca7f6d R08: 0000000020000580 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe8195ea7f R14: 00007fa867181300 R15: 0000000000022000 Showing all locks held in the system: 2 locks held by kworker/0:0/5: #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: arch_atomic_long_set include/linux/atomic/atomic-long.h:41 [inline] #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: atomic_long_set include/linux/atomic/atomic-instrumented.h:1198 [inline] #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:635 [inline] #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:662 [inline] #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x896/0x1690 kernel/workqueue.c:2269 #1: ffffc90000ca7db0 ((work_completion)(&m->wq)){+.+.}-{0:0}, at: process_one_work+0x8ca/0x1690 kernel/workqueue.c:2273 1 lock held by khungtaskd/27: #0: ffffffff8bb83ae0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6458 1 lock held by in:imklog/6209: #0: ffff88807f45e370 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990 2 locks held by syz-executor.4/23556: #0: ffff888022f76460 (sb_writers#24){.+.+}-{0:0}, at: path_setxattr+0xb2/0x1c0 fs/xattr.c:593 #1: ffff888084a94860 (&sb->s_type->i_mutex_key#28){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:783 [inline] #1: ffff888084a94860 (&sb->s_type->i_mutex_key#28){+.+.}-{3:3}, at: vfs_setxattr+0x11c/0x330 fs/xattr.c:300 1 lock held by syz-executor.4/23596: #0: ffff888084a94860 (&sb->s_type->i_mutex_key#28){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:783 [inline] #0: ffff888084a94860 (&sb->s_type->i_mutex_key#28){+.+.}-{3:3}, at: lock_mount+0x8a/0x2e0 fs/namespace.c:2242 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.16.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1ae/0x220 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xc1d/0xf50 kernel/hung_task.c:295 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 55 Comm: kworker/u4:3 Not tainted 5.16.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:__get_immv32 arch/x86/lib/insn.c:550 [inline] RIP: 0010:insn_get_immediate.part.0+0x1692/0x1c50 arch/x86/lib/insn.c:666 Code: 03 00 00 c6 43 3d 02 e9 5a fa ff ff e8 67 71 67 fd 4c 8d 63 68 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 80 3c 02 00 <0f> 85 5a 05 00 00 4c 8d 6b 60 4c 8b 73 68 48 b8 00 00 00 00 00 fc RSP: 0018:ffffc90001a2f9b8 EFLAGS: 00000246 RAX: dffffc0000000000 RBX: ffffc90001a2fa60 RCX: 0000000000000000 RDX: 1ffff92000345f59 RSI: ffffffff84107679 RDI: 0000000000000003 RBP: 000000000000b000 R08: ffffffff8a0936e0 R09: ffffffff84106517 R10: 0000000000000003 R11: 0000000000000008 R12: ffffc90001a2fac8 R13: 0000000000000008 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc2f6e17058 CR3: 000000000b88e000 CR4: 0000000000350ee0 Call Trace: insn_get_immediate arch/x86/lib/insn.c:631 [inline] insn_get_length arch/x86/lib/insn.c:707 [inline] insn_decode+0x406/0x4e0 arch/x86/lib/insn.c:747 arch_jump_entry_size+0xa0/0x110 arch/x86/kernel/jump_label.c:24 __jump_label_patch+0x7c/0x1b0 arch/x86/kernel/jump_label.c:45 arch_jump_label_transform_queue+0x63/0x100 arch/x86/kernel/jump_label.c:137 __jump_label_update+0x12e/0x400 kernel/jump_label.c:451 jump_label_update+0x1d5/0x430 kernel/jump_label.c:830 static_key_disable_cpuslocked+0x152/0x1b0 kernel/jump_label.c:207 static_key_disable+0x16/0x20 kernel/jump_label.c:215 toggle_allocation_gate mm/kfence/core.c:746 [inline] toggle_allocation_gate+0x183/0x390 mm/kfence/core.c:724 process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298 worker_thread+0x658/0x11f0 kernel/workqueue.c:2445 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 00 00 add %al,(%rax) 2: c6 43 3d 02 movb $0x2,0x3d(%rbx) 6: e9 5a fa ff ff jmpq 0xfffffa65 b: e8 67 71 67 fd callq 0xfd677177 10: 4c 8d 63 68 lea 0x68(%rbx),%r12 14: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1b: fc ff df 1e: 4c 89 e2 mov %r12,%rdx 21: 48 c1 ea 03 shr $0x3,%rdx 25: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) * 29: 0f 85 5a 05 00 00 jne 0x589 <-- trapping instruction 2f: 4c 8d 6b 60 lea 0x60(%rbx),%r13 33: 4c 8b 73 68 mov 0x68(%rbx),%r14 37: 48 rex.W 38: b8 00 00 00 00 mov $0x0,%eax 3d: 00 fc add %bh,%ah