INFO: task syz-executor.0:2551 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.0 D28648 2551 8139 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x20a/0x390 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:83 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 __do_page_fault+0x97f/0xd60 arch/x86/mm/fault.c:1348 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1205 RIP: 0033:0x7f8f647f2e3a Code: Bad RIP value. RSP: 002b:00007ffd7ba14a00 EFLAGS: 00010246 RAX: 0000000020000380 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 361900b4118aaf62 RSI: 0000000000000000 RDI: 00005555570c02e8 RBP: 00007ffd7ba14af8 R08: 0000000000000000 R09: 0000000000000000 R10: 00007f8f643c8928 R11: 0000000000000246 R12: 00000000000b97fd R13: 00007ffd7ba14b20 R14: 00007f8f64973120 R15: 0000000000000032 INFO: task syz-executor.0:2555 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.0 D28232 2555 8139 0x80000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x20a/0x390 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:83 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 exit_mm kernel/exit.c:512 [inline] do_exit+0x6e4/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f8f648530a9 Code: Bad RIP value. RSP: 002b:00007f8f62dc5218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f8f64972f88 RCX: 00007f8f648530a9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f8f64972f88 RBP: 00007f8f64972f80 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f64972f8c R13: 00007ffd7ba149bf R14: 00007f8f62dc5300 R15: 0000000000022000 INFO: task syz-executor.0:2558 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.0 D29760 2558 8139 0x80000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x20a/0x390 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:83 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 exit_mm kernel/exit.c:512 [inline] do_exit+0x6e4/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f8f648530a9 Code: Bad RIP value. RSP: 002b:00007f8f62d83218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f8f64973128 RCX: 00007f8f648530a9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f8f64973128 RBP: 00007f8f64973120 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f6497312c R13: 00007ffd7ba149bf R14: 00007f8f62d83300 R15: 0000000000022000 INFO: task syz-executor.0:2559 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.0 D28928 2559 8139 0x80000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x20a/0x390 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:83 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 exit_mm kernel/exit.c:512 [inline] do_exit+0x6e4/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f8f648530a9 Code: Bad RIP value. RSP: 002b:00007f8f62d62218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f8f649731f8 RCX: 00007f8f648530a9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f8f649731f8 RBP: 00007f8f649731f0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f649731fc R13: 00007ffd7ba149bf R14: 00007f8f62d62300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by systemd/1: #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mmap kernel/fork.c:435 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mm kernel/fork.c:1285 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_mm kernel/fork.c:1341 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_process.part.0+0x2bb3/0x8260 kernel/fork.c:1913 1 lock held by khungtaskd/1570: #0: 00000000527d2e6a (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by systemd-udevd/4697: #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mmap kernel/fork.c:435 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mm kernel/fork.c:1285 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_mm kernel/fork.c:1341 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_process.part.0+0x2bb3/0x8260 kernel/fork.c:1913 1 lock held by in:imklog/7801: #0: 0000000027f8f782 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 1 lock held by syz-executor.3/8132: #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mmap kernel/fork.c:435 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mm kernel/fork.c:1285 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_mm kernel/fork.c:1341 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_process.part.0+0x2bb3/0x8260 kernel/fork.c:1913 1 lock held by syz-executor.2/8138: #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mmap kernel/fork.c:435 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mm kernel/fork.c:1285 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_mm kernel/fork.c:1341 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_process.part.0+0x2bb3/0x8260 kernel/fork.c:1913 1 lock held by syz-executor.1/8140: #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mmap kernel/fork.c:435 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mm kernel/fork.c:1285 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_mm kernel/fork.c:1341 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_process.part.0+0x2bb3/0x8260 kernel/fork.c:1913 1 lock held by syz-executor.0/2551: #0: 00000000e1faf96d (&mm->mmap_sem){++++}, at: __do_page_fault+0x97f/0xd60 arch/x86/mm/fault.c:1348 1 lock held by syz-executor.0/2555: #0: 00000000e1faf96d (&mm->mmap_sem){++++}, at: exit_mm kernel/exit.c:512 [inline] #0: 00000000e1faf96d (&mm->mmap_sem){++++}, at: do_exit+0x6e4/0x2be0 kernel/exit.c:857 2 locks held by syz-executor.0/2557: 1 lock held by syz-executor.0/2558: #0: 00000000e1faf96d (&mm->mmap_sem){++++}, at: exit_mm kernel/exit.c:512 [inline] #0: 00000000e1faf96d (&mm->mmap_sem){++++}, at: do_exit+0x6e4/0x2be0 kernel/exit.c:857 1 lock held by syz-executor.0/2559: #0: 00000000e1faf96d (&mm->mmap_sem){++++}, at: exit_mm kernel/exit.c:512 [inline] #0: 00000000e1faf96d (&mm->mmap_sem){++++}, at: do_exit+0x6e4/0x2be0 kernel/exit.c:857 1 lock held by syz-executor.0/2670: #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mmap kernel/fork.c:435 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mm kernel/fork.c:1285 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_mm kernel/fork.c:1341 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_process.part.0+0x2bb3/0x8260 kernel/fork.c:1913 1 lock held by syz-executor.4/4467: #0: 00000000f81e8ccb (event_mutex){+.+.}, at: perf_trace_destroy+0x23/0xf0 kernel/trace/trace_event_perf.c:236 5 locks held by syz-executor.5/4504: #0: 00000000b172f193 (&pmus_srcu){....}, at: perf_event_alloc.part.0+0xe6c/0x2eb0 kernel/events/core.c:10185 #1: 00000000f81e8ccb (event_mutex){+.+.}, at: perf_uprobe_init+0x15a/0x200 kernel/trace/trace_event_perf.c:329 #2: 00000000172e9c09 (&uprobe->register_rwsem){+.+.}, at: __uprobe_register kernel/events/uprobes.c:925 [inline] #2: 00000000172e9c09 (&uprobe->register_rwsem){+.+.}, at: uprobe_register+0x34b/0x730 kernel/events/uprobes.c:944 #3: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: percpu_down_write+0x62/0x3f0 kernel/locking/percpu-rwsem.c:145 #4: 00000000e1faf96d (&mm->mmap_sem){++++}, at: register_for_each_vma+0x6bb/0xe40 kernel/events/uprobes.c:808 1 lock held by syz-executor.4/4560: #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mmap kernel/fork.c:435 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mm kernel/fork.c:1285 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_mm kernel/fork.c:1341 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_process.part.0+0x2bb3/0x8260 kernel/fork.c:1913 1 lock held by syz-executor.5/4561: #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mmap kernel/fork.c:435 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: dup_mm kernel/fork.c:1285 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_mm kernel/fork.c:1341 [inline] #0: 00000000fc74dbdd (&dup_mmap_sem){++++}, at: copy_process.part.0+0x2bb3/0x8260 kernel/fork.c:1913 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 8137 Comm: kworker/u4:1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Workqueue: bat_events batadv_nc_worker RIP: 0010:check_preemption_disabled+0x4/0x280 lib/smp_processor_id.c:12 Code: 21 fe e9 d5 f1 ff ff e8 2a 88 c0 fd 48 8b 3c 24 e8 81 44 21 fe e9 87 f7 ff ff 90 90 90 90 90 90 90 90 90 90 90 90 41 57 41 56 <41> 55 49 89 f5 41 54 55 48 89 fd 53 e8 6b 67 eb fd 65 44 8b 25 23 RSP: 0018:ffff8880a1687b00 EFLAGS: 00000093 RAX: ffff88809c85e340 RBX: 0000607f45cb0c40 RCX: 0000000000000005 RDX: 0000000000000000 RSI: ffffffff88b3e0e0 RDI: ffffffff88b3e120 RBP: ffff8880a1687bf0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff89f6d360 R13: ffffffff89f85fa0 R14: ffffffff814a7850 R15: ffff8880a1687bc8 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb6b1bbd000 CR3: 00000000afa6a000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: perf_trace_lock+0xe2/0x4b0 include/trace/events/lock.h:39 trace_lock_release include/trace/events/lock.h:58 [inline] lock_release+0x4e8/0x8b0 kernel/locking/lockdep.c:3926 rcu_lock_release include/linux/rcupdate.h:247 [inline] rcu_read_unlock include/linux/rcupdate.h:681 [inline] batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:423 [inline] batadv_nc_worker+0x66c/0xd50 net/batman-adv/network-coding.c:730 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415