INFO: task syz-executor209:10469 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor209 D28648 10469 8113 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x20a/0x390 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:83 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 __do_page_fault+0x97f/0xd60 arch/x86/mm/fault.c:1348 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1205 RIP: 0033:0x7f113bfadce0 Code: Bad RIP value. RSP: 002b:00007ffcdb31c068 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000064 RCX: 0000000000000000 RDX: 00007ffcdb31c080 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000032 R08: 00007ffcdb376000 R09: 0000007d69d503a0 R10: 0002be630d7ec935 R11: 0000000000000001 R12: 00007ffcdb31c0e0 R13: 00007f113bff441c R14: 00007ffcdb31c100 R15: 00007f113bf294a0 INFO: task syz-executor209:10470 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor209 D28080 10470 8113 0x80000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x20a/0x390 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:83 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 exit_mm kernel/exit.c:512 [inline] do_exit+0x6e4/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f113bf6cb39 Code: Bad RIP value. RSP: 002b:00007f113bf1e318 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f113bff4408 RCX: 00007f113bf6cb39 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f113bff4408 RBP: 00007f113bff4400 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f113bfc2074 R13: 00007ffcdb31c02f R14: 00007f113bf1e400 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1570: #0: 00000000154639ae (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7806: #0: 000000004ab0fee3 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 1 lock held by syz-executor209/10469: #0: 000000001f368e24 (&mm->mmap_sem){++++}, at: __do_page_fault+0x97f/0xd60 arch/x86/mm/fault.c:1348 1 lock held by syz-executor209/10470: #0: 000000001f368e24 (&mm->mmap_sem){++++}, at: exit_mm kernel/exit.c:512 [inline] #0: 000000001f368e24 (&mm->mmap_sem){++++}, at: do_exit+0x6e4/0x2be0 kernel/exit.c:857 1 lock held by syz-executor209/10471: ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 10471 Comm: syz-executor209 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:kasan_mem_to_shadow include/linux/kasan.h:28 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/kasan.c:210 [inline] RIP: 0010:memory_is_poisoned mm/kasan/kasan.c:241 [inline] RIP: 0010:check_memory_region_inline mm/kasan/kasan.c:257 [inline] RIP: 0010:check_memory_region+0x3c/0x170 mm/kasan/kasan.c:267 Code: ff 44 0f b6 c2 48 39 c7 0f 86 20 01 00 00 4c 8d 54 37 ff 41 54 48 b8 00 00 00 00 00 fc ff df 4d 89 d1 55 48 89 fd 49 c1 e9 03 <48> c1 ed 03 53 49 01 c1 48 01 c5 49 8d 59 01 48 89 e8 48 89 da 48 RSP: 0018:ffff888090fdf998 EFLAGS: 00000a07 RAX: dffffc0000000000 RBX: dffffc0000000000 RCX: ffffffff88188864 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8880900370f0 RBP: ffff8880900370f0 R08: 0000000000000000 R09: 1ffff11012006e1e R10: ffff8880900370f7 R11: 0000000000000000 R12: 0000000000000000 R13: ffff8880900370f0 R14: 0000000000000001 R15: ffffffff8178e153 FS: 00007f113befd700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055555659e2b8 CR3: 00000000aa62a000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: atomic64_read include/asm-generic/atomic-instrumented.h:27 [inline] atomic_long_read include/asm-generic/atomic-long.h:47 [inline] __mutex_trylock_or_owner kernel/locking/mutex.c:84 [inline] __mutex_trylock kernel/locking/mutex.c:125 [inline] __mutex_lock_common kernel/locking/mutex.c:939 [inline] __mutex_lock+0xe4/0x1190 kernel/locking/mutex.c:1078 perf_mmap+0x693/0x1810 kernel/events/core.c:5713 call_mmap include/linux/fs.h:1826 [inline] mmap_region+0xc94/0x16b0 mm/mmap.c:1757 do_mmap+0x8e8/0x1080 mm/mmap.c:1530 do_mmap_pgoff include/linux/mm.h:2329 [inline] vm_mmap_pgoff+0x197/0x200 mm/util.c:357 ksys_mmap_pgoff+0x298/0x5a0 mm/mmap.c:1580 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f113bf6cb39 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f113befd308 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f113bff4418 RCX: 00007f113bf6cb39 RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000020395000 RBP: 00007f113bff4410 R08: 0000000000000003 R09: 0000000000000000 R10: 0000000000000011 R11: 0000000000000246 R12: 00007f113bfc2074 R13: 00007ffcdb31c02f R14: 00007f113befd400 R15: 0000000000022000 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 44 0f b6 c2 movzbl %dl,%r8d 4: 48 39 c7 cmp %rax,%rdi 7: 0f 86 20 01 00 00 jbe 0x12d d: 4c 8d 54 37 ff lea -0x1(%rdi,%rsi,1),%r10 12: 41 54 push %r12 14: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1b: fc ff df 1e: 4d 89 d1 mov %r10,%r9 21: 55 push %rbp 22: 48 89 fd mov %rdi,%rbp 25: 49 c1 e9 03 shr $0x3,%r9 * 29: 48 c1 ed 03 shr $0x3,%rbp <-- trapping instruction 2d: 53 push %rbx 2e: 49 01 c1 add %rax,%r9 31: 48 01 c5 add %rax,%rbp 34: 49 8d 59 01 lea 0x1(%r9),%rbx 38: 48 89 e8 mov %rbp,%rax 3b: 48 89 da mov %rbx,%rdx 3e: 48 rex.W