INFO: task syz-executor.4:23596 blocked for more than 143 seconds.
Not tainted 5.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.4 state:D stack:26232 pid:23596 ppid: 8424 flags:0x00004004
Call Trace:
context_switch kernel/sched/core.c:4972 [inline]
__schedule+0xa9a/0x4940 kernel/sched/core.c:6253
schedule+0xd2/0x260 kernel/sched/core.c:6326
rwsem_down_write_slowpath+0x761/0x1130 kernel/locking/rwsem.c:1117
__down_write_common kernel/locking/rwsem.c:1272 [inline]
__down_write_common kernel/locking/rwsem.c:1269 [inline]
__down_write kernel/locking/rwsem.c:1281 [inline]
down_write+0x135/0x150 kernel/locking/rwsem.c:1528
inode_lock include/linux/fs.h:783 [inline]
lock_mount+0x8a/0x2e0 fs/namespace.c:2242
do_new_mount_fc fs/namespace.c:2931 [inline]
do_new_mount fs/namespace.c:2990 [inline]
path_mount+0x14c6/0x1fa0 fs/namespace.c:3318
do_mount fs/namespace.c:3331 [inline]
__do_sys_mount fs/namespace.c:3539 [inline]
__se_sys_mount fs/namespace.c:3516 [inline]
__x64_sys_mount+0x27f/0x300 fs/namespace.c:3516
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fa869c4dae9
RSP: 002b:00007fa867181188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fa869d610e0 RCX: 00007fa869c4dae9
RDX: 0000000020000140 RSI: 0000000020000200 RDI: 0000000000000000
RBP: 00007fa869ca7f6d R08: 0000000020000580 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffe8195ea7f R14: 00007fa867181300 R15: 0000000000022000
Showing all locks held in the system:
2 locks held by kworker/0:0/5:
#0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]
#0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: arch_atomic_long_set include/linux/atomic/atomic-long.h:41 [inline]
#0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: atomic_long_set include/linux/atomic/atomic-instrumented.h:1198 [inline]
#0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:635 [inline]
#0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:662 [inline]
#0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x896/0x1690 kernel/workqueue.c:2269
#1: ffffc90000ca7db0 ((work_completion)(&m->wq)){+.+.}-{0:0}, at: process_one_work+0x8ca/0x1690 kernel/workqueue.c:2273
1 lock held by khungtaskd/27:
#0: ffffffff8bb83ae0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6458
1 lock held by in:imklog/6209:
#0: ffff88807f45e370 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990
2 locks held by syz-executor.4/23556:
#0: ffff888022f76460 (sb_writers#24){.+.+}-{0:0}, at: path_setxattr+0xb2/0x1c0 fs/xattr.c:593
#1: ffff888084a94860 (&sb->s_type->i_mutex_key#28){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:783 [inline]
#1: ffff888084a94860 (&sb->s_type->i_mutex_key#28){+.+.}-{3:3}, at: vfs_setxattr+0x11c/0x330 fs/xattr.c:300
1 lock held by syz-executor.4/23596:
#0: ffff888084a94860 (&sb->s_type->i_mutex_key#28){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:783 [inline]
#0: ffff888084a94860 (&sb->s_type->i_mutex_key#28){+.+.}-{3:3}, at: lock_mount+0x8a/0x2e0 fs/namespace.c:2242
=============================================
NMI backtrace for cpu 0
CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.16.0-rc1-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:105
nmi_trigger_cpumask_backtrace+0x1ae/0x220 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline]
watchdog+0xc1d/0xf50 kernel/hung_task.c:295
kthread+0x405/0x4f0 kernel/kthread.c:327
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 55 Comm: kworker/u4:3 Not tainted 5.16.0-rc1-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:__get_immv32 arch/x86/lib/insn.c:550 [inline]
RIP: 0010:insn_get_immediate.part.0+0x1692/0x1c50 arch/x86/lib/insn.c:666
Code: 03 00 00 c6 43 3d 02 e9 5a fa ff ff e8 67 71 67 fd 4c 8d 63 68 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 80 3c 02 00 <0f> 85 5a 05 00 00 4c 8d 6b 60 4c 8b 73 68 48 b8 00 00 00 00 00 fc
RSP: 0018:ffffc90001a2f9b8 EFLAGS: 00000246
RAX: dffffc0000000000 RBX: ffffc90001a2fa60 RCX: 0000000000000000
RDX: 1ffff92000345f59 RSI: ffffffff84107679 RDI: 0000000000000003
RBP: 000000000000b000 R08: ffffffff8a0936e0 R09: ffffffff84106517
R10: 0000000000000003 R11: 0000000000000008 R12: ffffc90001a2fac8
R13: 0000000000000008 R14: 0000000000000000 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc2f6e17058 CR3: 000000000b88e000 CR4: 0000000000350ee0
Call Trace:
insn_get_immediate arch/x86/lib/insn.c:631 [inline]
insn_get_length arch/x86/lib/insn.c:707 [inline]
insn_decode+0x406/0x4e0 arch/x86/lib/insn.c:747
arch_jump_entry_size+0xa0/0x110 arch/x86/kernel/jump_label.c:24
__jump_label_patch+0x7c/0x1b0 arch/x86/kernel/jump_label.c:45
arch_jump_label_transform_queue+0x63/0x100 arch/x86/kernel/jump_label.c:137
__jump_label_update+0x12e/0x400 kernel/jump_label.c:451
jump_label_update+0x1d5/0x430 kernel/jump_label.c:830
static_key_disable_cpuslocked+0x152/0x1b0 kernel/jump_label.c:207
static_key_disable+0x16/0x20 kernel/jump_label.c:215
toggle_allocation_gate mm/kfence/core.c:746 [inline]
toggle_allocation_gate+0x183/0x390 mm/kfence/core.c:724
process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298
worker_thread+0x658/0x11f0 kernel/workqueue.c:2445
kthread+0x405/0x4f0 kernel/kthread.c:327
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
----------------
Code disassembly (best guess), 1 bytes skipped:
0: 00 00 add %al,(%rax)
2: c6 43 3d 02 movb $0x2,0x3d(%rbx)
6: e9 5a fa ff ff jmpq 0xfffffa65
b: e8 67 71 67 fd callq 0xfd677177
10: 4c 8d 63 68 lea 0x68(%rbx),%r12
14: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
1b: fc ff df
1e: 4c 89 e2 mov %r12,%rdx
21: 48 c1 ea 03 shr $0x3,%rdx
25: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1)
* 29: 0f 85 5a 05 00 00 jne 0x589 <-- trapping instruction
2f: 4c 8d 6b 60 lea 0x60(%rbx),%r13
33: 4c 8b 73 68 mov 0x68(%rbx),%r14
37: 48 rex.W
38: b8 00 00 00 00 mov $0x0,%eax
3d: 00 fc add %bh,%ah