audit: type=1804 audit(1667914216.807:388): pid=10035 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3717195250/syzkaller.Yk84fV/13/bus" dev="sda1" ino=14431 res=1 INFO: task segctord:940 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. segctord D30088 940 2 0x80000000 Call Trace: audit: type=1804 audit(1667914217.277:389): pid=10037 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3717195250/syzkaller.Yk84fV/13/bus" dev="sda1" ino=14431 res=1 context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:589 [inline] rwsem_down_write_failed+0x3aa/0x760 kernel/locking/rwsem-xadd.c:618 audit: type=1804 audit(1667914217.507:390): pid=10026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir2537296448/syzkaller.HYwho2/405/bus" dev="sda1" ino=14386 res=1 audit: type=1804 audit(1667914217.667:391): pid=10036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3335026473/syzkaller.OD0iuA/412/bus" dev="sda1" ino=14417 res=1 call_rwsem_down_write_failed+0x13/0x20 arch/x86/lib/rwsem.S:117 __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x4f/0x90 kernel/locking/rwsem.c:72 nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 nilfs_segctor_thread_construct fs/nilfs2/segment.c:2479 [inline] nilfs_segctor_thread+0x3c0/0xf50 fs/nilfs2/segment.c:2563 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Showing all locks held in the system: 3 locks held by kworker/u4:2/84: 1 lock held by khungtaskd/1570: #0: 000000009c70b833 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7783: 2 locks held by rs:main Q:Reg/7785: 7 locks held by syz-executor.5/935: 1 lock held by segctord/940: #0: 000000007be1ba69 (&nilfs->ns_segctor_sem){++++}, at: nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 2 locks held by kworker/u4:15/5279: 1 lock held by syz-executor.5/8665: 1 lock held by syz-executor.3/10046: 2 locks held by syz-executor.0/10052: #0: 000000002bdce2ce (sb_writers#3){.+.+}, at: file_start_write include/linux/fs.h:2779 [inline] #0: 000000002bdce2ce (sb_writers#3){.+.+}, at: do_sendfile+0x97d/0xc30 fs/read_write.c:1446 #1: 000000001a56e8ba (&rq->lock){-.-.}, at: rq_lock kernel/sched/sched.h:1826 [inline] #1: 000000001a56e8ba (&rq->lock){-.-.}, at: __schedule+0x1f9/0x2040 kernel/sched/core.c:3455 2 locks held by syz-executor.4/10051: TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. #0: 000000007c429df9 (sk_lock-AF_PACKET){+.+.}, at: lock_sock include/net/sock.h:1512 [inline] #0: 000000007c429df9 (sk_lock-AF_PACKET){+.+.}, at: packet_do_bind+0x2f/0xc10 net/packet/af_packet.c:3107 #1: 00000000f039da96 (rcu_preempt_state.exp_mutex){+.+.}, at: exp_funnel_lock kernel/rcu/tree_exp.h:297 [inline] #1: 00000000f039da96 (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x4dc/0x6f0 kernel/rcu/tree_exp.h:667 2 locks held by syz-executor.4/10053: #0: 0000000088466057 (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 0000000088466057 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 #1: 00000000f039da96 (rcu_preempt_state.exp_mutex){+.+.}, at: exp_funnel_lock kernel/rcu/tree_exp.h:329 [inline] #1: 00000000f039da96 (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x256/0x6f0 kernel/rcu/tree_exp.h:667 2 locks held by syz-executor.5/10062: 2 locks held by syz-executor.1/10063: 2 locks held by syz-executor.1/10078: kauditd_printk_skb: 3 callbacks suppressed audit: type=1804 audit(1667914219.877:395): pid=10064 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3335026473/syzkaller.OD0iuA/413/bus" dev="sda1" ino=14439 res=1 ============================================= TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. NMI backtrace for cpu 0 CPU: 0 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 10049 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:native_apic_mem_write+0x8/0x10 arch/x86/include/asm/apic.h:109 Code: 3d cc 17 3d 0b 01 7f 02 5d c3 89 ef 5d e9 f5 fe c9 06 48 c7 c7 00 97 65 8c e8 84 e2 6f 00 eb df 66 90 89 ff 89 b7 00 c0 5f ff 0f 1f 80 00 00 00 00 48 b8 00 00 00 00 00 fc ff df 53 89 fb 48 RSP: 0000:ffff8880ba107e98 EFLAGS: 00000046 RAX: dffffc0000000000 RBX: ffffffff89cfb1a0 RCX: 0000000000000020 RDX: 1ffffffff139f636 RSI: 000000000000008c RDI: 0000000000000380 RBP: ffff8880ba11e2c0 R08: ffffffff8c665058 R09: 0000000000000000 R10: 0000000000000007 R11: ffffffff8c66505b R12: 000000000000008c R13: 0000000000000000 R14: ffff8880ba124cc0 R15: ffff8880ba124d30 FS: 0000555556b13400(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe4fd795000 CR3: 0000000097e1f000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: apic_write arch/x86/include/asm/apic.h:389 [inline] lapic_next_event+0x4d/0x80 arch/x86/kernel/apic/apic.c:460 clockevents_program_event+0x234/0x350 kernel/time/clockevents.c:344 tick_program_event+0xac/0x140 kernel/time/tick-oneshot.c:48 hrtimer_interrupt+0x40a/0x9e0 kernel/time/hrtimer.c:1598 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1071 [inline] smp_apic_timer_interrupt+0x10c/0x550 arch/x86/kernel/apic/apic.c:1096 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0033:0x7f6660b9167d Code: 48 39 cf 72 2f 48 83 e8 08 48 39 d1 73 14 0f 1f 80 00 00 00 00 48 8b 50 f8 48 83 e8 08 48 39 ca 77 f3 48 39 c3 73 3e 48 89 13 <48> 8b 50 f8 48 89 38 49 8b 0e 48 8b 3e 48 83 c3 08 48 83 c6 08 eb RSP: 002b:00007fff1ec2ed80 EFLAGS: 00000283 ORIG_RAX: ffffffffffffff13 RAX: 00007f66606ad360 RBX: 00007f66606ad240 RCX: ffffffff83771e05 RDX: ffffffff83771e05 RSI: 00007f66606ad248 RDI: ffffffff83771e05 RBP: 00007f66606ad138 R08: 00007f66606ad478 R09: 000000003253460c R10: 001b02b6ade68446 R11: 0000000000000001 R12: 00007f66606ad130 R13: 00007f66606ad240 R14: 00007f66606ad128 R15: 0000000000000013 audit: type=1804 audit(1667914219.937:396): pid=10075 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir3845928738/syzkaller.7vdx2m/12/bus" dev="sda1" ino=14411 res=1