INFO: task segctord:4283 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 IPVS: ftp: loaded support on port[0] = 21 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. segctord D30128 4283 2 0x80000000 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:589 [inline] rwsem_down_write_failed+0x3aa/0x760 kernel/locking/rwsem-xadd.c:618 call_rwsem_down_write_failed+0x13/0x20 arch/x86/lib/rwsem.S:117 __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x4f/0x90 kernel/locking/rwsem.c:72 nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 nilfs_segctor_thread_construct fs/nilfs2/segment.c:2479 [inline] nilfs_segctor_thread+0x3c0/0xf50 fs/nilfs2/segment.c:2563 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 INFO: task segctord:4386 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. segctord D30320 4386 2 0x80000000 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:589 [inline] rwsem_down_write_failed+0x3aa/0x760 kernel/locking/rwsem-xadd.c:618 call_rwsem_down_write_failed+0x13/0x20 arch/x86/lib/rwsem.S:117 __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x4f/0x90 kernel/locking/rwsem.c:72 nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 nilfs_segctor_thread_construct fs/nilfs2/segment.c:2479 [inline] nilfs_segctor_thread+0x3c0/0xf50 fs/nilfs2/segment.c:2563 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Showing all locks held in the system: 1 lock held by khungtaskd/1571: #0: 00000000e6546415 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7786: #0: 0000000023f9fd60 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 3 locks held by kworker/u4:7/9495: 6 locks held by syz-executor.4/4274: 1 lock held by segctord/4283: #0: 0000000019d1be48 (&nilfs->ns_segctor_sem){++++}, at: nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 6 locks held by syz-executor.3/4379: 1 lock held by segctord/4386: #0: 0000000010031dfe (&nilfs->ns_segctor_sem){++++}, at: nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1571 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4274 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:unwind_next_frame+0x541/0x1400 arch/x86/kernel/unwind_orc.c:435 Code: 4c 89 c7 83 e7 07 40 38 fe 40 0f 9e c7 40 84 f6 40 0f 95 c6 40 84 f7 0f 85 a8 0b 00 00 48 89 ce 83 e6 07 40 38 f2 40 0f 9e c6 <84> d2 0f 95 c2 40 84 d6 0f 85 8d 0b 00 00 83 e0 0f 3c 09 0f 87 d8 RSP: 0018:ffff888058546a58 EFLAGS: 00000093 RAX: 0000000000000015 RBX: 1ffff1100b0a8d54 RCX: ffffffff8b9a936b RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffff8b9a936a R09: ffffffff8b9a9336 R10: ffff888058546be7 R11: 0000000000074071 R12: ffff888058546bd0 R13: ffff888058546bbd R14: ffff888058546b88 R15: ffffffff8b9a9366 FS: 00007f986709e700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055a740cdb8b8 CR3: 0000000064cf4000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __save_stack_trace+0x9f/0x190 arch/x86/kernel/stacktrace.c:44 save_stack mm/kasan/kasan.c:448 [inline] set_track mm/kasan/kasan.c:460 [inline] __kasan_slab_free+0x126/0x1f0 mm/kasan/kasan.c:521 __cache_free mm/slab.c:3503 [inline] kmem_cache_free+0x7f/0x260 mm/slab.c:3765 nilfs_btree_free_path fs/nilfs2/btree.c:52 [inline] nilfs_btree_lookup+0xcd/0x110 fs/nilfs2/btree.c:686 nilfs_bmap_lookup_at_level+0xcd/0x3e0 fs/nilfs2/bmap.c:69 nilfs_bmap_lookup fs/nilfs2/bmap.h:170 [inline] nilfs_mdt_submit_block.constprop.0+0x1a5/0xaa0 fs/nilfs2/mdt.c:142 nilfs_mdt_read_block+0x96/0x3e0 fs/nilfs2/mdt.c:175 nilfs_mdt_get_block+0xe6/0xd40 fs/nilfs2/mdt.c:250 nilfs_palloc_get_block+0xc4/0x2b0 fs/nilfs2/alloc.c:216 nilfs_palloc_get_entry_block+0x17b/0x230 fs/nilfs2/alloc.c:318 nilfs_dat_translate+0x7e/0x480 fs/nilfs2/dat.c:391 nilfs_bmap_lookup_at_level+0x237/0x3e0 fs/nilfs2/bmap.c:75 nilfs_bmap_lookup fs/nilfs2/bmap.h:170 [inline] nilfs_mdt_submit_block.constprop.0+0x1a5/0xaa0 fs/nilfs2/mdt.c:142 nilfs_mdt_read_block+0x96/0x3e0 fs/nilfs2/mdt.c:175 nilfs_mdt_get_block+0xe6/0xd40 fs/nilfs2/mdt.c:250 nilfs_palloc_get_block+0xc4/0x2b0 fs/nilfs2/alloc.c:216 nilfs_palloc_get_entry_block+0x17b/0x230 fs/nilfs2/alloc.c:318 nilfs_ifile_create_inode+0xea/0x240 fs/nilfs2/ifile.c:66 nilfs_new_inode+0x1dc/0x760 fs/nilfs2/inode.c:353 nilfs_create fs/nilfs2/namei.c:85 [inline] nilfs_create+0xfe/0x2f0 fs/nilfs2/namei.c:75 lookup_open+0x893/0x1a20 fs/namei.c:3235 do_last fs/namei.c:3327 [inline] path_openat+0x1094/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f9868b2b639 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f986709e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f9868c4bf80 RCX: 00007f9868b2b639 RDX: 000000000000275a RSI: 0000000020000080 RDI: ffffffffffffff9c RBP: 00007f9868b86ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff27bbb98f R14: 00007f986709e300 R15: 0000000000022000