INFO: task syz-executor658:9289 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor658 D28648 9289 8147 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x20a/0x390 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:83 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 __do_page_fault+0x97f/0xd60 arch/x86/mm/fault.c:1348 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1205 RIP: 0033:0x7f4e078fa140 Code: Bad RIP value. RSP: 002b:00007ffcb9d695d8 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 0000000000000064 RCX: 0000000000000000 RDX: 00007ffcb9d69620 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000032 R08: 0000015dd6bce65a R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4e079584bc R13: 00007ffcb9d69680 R14: 00007ffcb9d696a0 R15: 00007f4e0788b750 INFO: task syz-executor658:9301 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor658 D29000 9301 8147 0x80000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x20a/0x390 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:83 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 exit_mm kernel/exit.c:512 [inline] do_exit+0x6e4/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f4e078d7119 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f4e0785d218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f4e079584b8 RCX: 00007f4e078d7119 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f4e079584b8 RBP: 00007f4e079584b0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4e079584bc R13: 00007ffcb9d695cf R14: 00007f4e0785d300 R15: 0000000000022000 Showing all locks held in the system: 3 locks held by kworker/0:1/14: #0: 0000000011f76d27 (&rq->lock){-.-.}, at: rq_lock kernel/sched/sched.h:1826 [inline] #0: 0000000011f76d27 (&rq->lock){-.-.}, at: __schedule+0x1f9/0x2040 kernel/sched/core.c:3455 #1: 00000000c28259f4 (rcu_read_lock){....}, at: trace_sched_stat_runtime include/trace/events/sched.h:428 [inline] #1: 00000000c28259f4 (rcu_read_lock){....}, at: update_curr+0x2c3/0x870 kernel/sched/fair.c:857 #2: 00000000bde789f8 (rcu_preempt_state.exp_wake_mutex){+.+.}, at: rcu_exp_wait_wake+0x197/0x480 kernel/rcu/tree_exp.h:605 2 locks held by kworker/1:1/33: #0: 00000000a4bd290c ((wq_completion)"rcu_gp"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000fa14e2f4 ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 1 lock held by khungtaskd/1571: #0: 00000000c28259f4 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7825: #0: 00000000a31afaec (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 1 lock held by syz-executor658/9289: #0: 0000000053398ec6 (&mm->mmap_sem){++++}, at: __do_page_fault+0x97f/0xd60 arch/x86/mm/fault.c:1348 1 lock held by syz-executor658/9293: 1 lock held by syz-executor658/9301: #0: 0000000053398ec6 (&mm->mmap_sem){++++}, at: exit_mm kernel/exit.c:512 [inline] #0: 0000000053398ec6 (&mm->mmap_sem){++++}, at: do_exit+0x6e4/0x2be0 kernel/exit.c:857 1 lock held by syz-executor658/16847: #0: 00000000c2b2bd7d (&mm->mmap_sem){++++}, at: vm_mmap_pgoff+0x152/0x200 mm/util.c:355 3 locks held by syz-executor658/16849: #0: 00000000c2b2bd7d (&mm->mmap_sem){++++}, at: vm_mmap_pgoff+0x152/0x200 mm/util.c:355 #1: 00000000a7abf231 (&event->mmap_mutex){+.+.}, at: perf_mmap+0x693/0x1810 kernel/events/core.c:5713 #2: 000000005c45c48d (rcu_preempt_state.exp_mutex){+.+.}, at: exp_funnel_lock kernel/rcu/tree_exp.h:329 [inline] #2: 000000005c45c48d (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x256/0x6f0 kernel/rcu/tree_exp.h:667 1 lock held by syz-executor658/16848: #0: 00000000eb159489 (&mm->mmap_sem){++++}, at: vm_mmap_pgoff+0x152/0x200 mm/util.c:355 2 locks held by syz-executor658/16852: #0: 00000000eb159489 (&mm->mmap_sem){++++}, at: vm_mmap_pgoff+0x152/0x200 mm/util.c:355 #1: 000000000d52896e (&event->mmap_mutex){+.+.}, at: perf_mmap+0x693/0x1810 kernel/events/core.c:5713 1 lock held by syz-executor658/16851: #0: 00000000d6f71157 (&mm->mmap_sem){++++}, at: vm_mmap_pgoff+0x152/0x200 mm/util.c:355 2 locks held by syz-executor658/16854: #0: 00000000d6f71157 (&mm->mmap_sem){++++}, at: vm_mmap_pgoff+0x152/0x200 mm/util.c:355 #1: 00000000f9a448d5 (&event->mmap_mutex){+.+.}, at: perf_mmap+0x693/0x1810 kernel/events/core.c:5713 1 lock held by syz-executor658/16853: #0: 00000000936a9ba8 (&mm->mmap_sem){++++}, at: vm_mmap_pgoff+0x152/0x200 mm/util.c:355 2 locks held by syz-executor658/16855: #0: 00000000936a9ba8 (&mm->mmap_sem){++++}, at: vm_mmap_pgoff+0x152/0x200 mm/util.c:355 #1: 00000000ee97739b (&event->mmap_mutex){+.+.}, at: perf_mmap+0x693/0x1810 kernel/events/core.c:5713 1 lock held by syz-executor658/16856: #0: 00000000c647f1d4 (&mm->mmap_sem){++++}, at: vm_mmap_pgoff+0x152/0x200 mm/util.c:355 2 locks held by syz-executor658/16857: #0: 00000000c647f1d4 (&mm->mmap_sem){++++}, at: vm_mmap_pgoff+0x152/0x200 mm/util.c:355 #1: 000000003c03f35a (&event->mmap_mutex){+.+.}, at: perf_mmap+0x693/0x1810 kernel/events/core.c:5713 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1571 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 14 Comm: kworker/0:1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: (null) (rcu_gp) RIP: 0010:rcu_lockdep_current_cpu_online+0x144/0x1b0 kernel/rcu/tree.c:1087 Code: 45 68 48 85 c3 0f 84 33 ff ff ff bf 01 00 00 00 e8 31 2d f0 ff 65 8b 05 aa 9f b0 7e 85 c0 74 2e b8 01 00 00 00 48 83 c4 08 5b <5d> 41 5c 41 5d c3 bf 01 00 00 00 e8 0c 2d f0 ff 65 8b 15 85 9f b0 RSP: 0018:ffff8880b5a97bd8 EFLAGS: 00000092 RAX: 0000000000000001 RBX: ffffffff8a45f160 RCX: 0000000000000000 RDX: 0000000000000004 RSI: ffffffff83771e31 RDI: 0000000000000001 RBP: dffffc0000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: ffffffff8c66501b R12: ffffffff89f88280 R13: ffffffff89f88280 R14: 0000000000000009 R15: ffff8880b5a82380 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000130 CR3: 00000000b2cc0000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_read_lock_sched_held+0xd3/0x1d0 kernel/rcu/update.c:115 trace_sched_stat_runtime include/trace/events/sched.h:428 [inline] update_curr+0x5f3/0x870 kernel/sched/fair.c:857 dequeue_entity+0x1d/0x2800 kernel/sched/fair.c:4048 dequeue_task_fair+0x68/0x1b60 kernel/sched/fair.c:5241 __schedule+0x2d6/0x2040 kernel/sched/core.c:3467 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 worker_thread+0x14c/0x1130 kernel/workqueue.c:2317 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 ---------------- Code disassembly (best guess), 2 bytes skipped: 0: 48 85 c3 test %rax,%rbx 3: 0f 84 33 ff ff ff je 0xffffff3c 9: bf 01 00 00 00 mov $0x1,%edi e: e8 31 2d f0 ff callq 0xfff02d44 13: 65 8b 05 aa 9f b0 7e mov %gs:0x7eb09faa(%rip),%eax # 0x7eb09fc4 1a: 85 c0 test %eax,%eax 1c: 74 2e je 0x4c 1e: b8 01 00 00 00 mov $0x1,%eax 23: 48 83 c4 08 add $0x8,%rsp 27: 5b pop %rbx * 28: 5d pop %rbp <-- trapping instruction 29: 41 5c pop %r12 2b: 41 5d pop %r13 2d: c3 retq 2e: bf 01 00 00 00 mov $0x1,%edi 33: e8 0c 2d f0 ff callq 0xfff02d44 38: 65 gs 39: 8b .byte 0x8b 3a: 15 .byte 0x15 3b: 85 .byte 0x85 3c: 9f lahf 3d: b0 .byte 0xb0