INFO: task syz-executor.0:9433 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.0 D26288 9433 8122 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 audit: type=1800 audit(1677026323.332:2037): pid=15429 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="loop1" ino=7 res=0 xlog_grant_head_wait+0x13b/0xcd0 fs/xfs/xfs_log.c:263 xlog_grant_head_check+0x3c8/0x420 fs/xfs/xfs_log.c:325 xfs_log_reserve+0x347/0xa70 fs/xfs/xfs_log.c:454 xfs_trans_reserve+0x63a/0x9c0 fs/xfs/xfs_trans.c:197 xfs_trans_alloc+0x2f7/0x700 fs/xfs/xfs_trans.c:289 xlog_finish_defer_ops fs/xfs/xfs_log_recover.c:4841 [inline] xlog_recover_process_intents+0x274/0x430 fs/xfs/xfs_log_recover.c:4947 xlog_recover_finish+0x5f/0x230 fs/xfs/xfs_log_recover.c:5839 xfs_log_mount_finish+0x135/0x450 fs/xfs/xfs_log.c:778 xfs_mountfs+0x1032/0x1bf0 fs/xfs/xfs_mount.c:974 XFS (loop2): unknown mount option [`]. xfs_fs_fill_super+0xd0e/0x1540 fs/xfs/xfs_super.c:1720 mount_bdev+0x2fc/0x3b0 fs/super.c:1158 mount_fs+0xa3/0x310 fs/super.c:1261 vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2492 [inline] do_mount+0x115c/0x2f50 fs/namespace.c:2822 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa36b64462a Code: Bad RIP value. RSP: 002b:00007fa369bb4f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 000000000000bb96 RCX: 00007fa36b64462a RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 00007fa369bb4fe0 RBP: 00007fa369bb5020 R08: 00007fa369bb5020 R09: 000000000080401d R10: 000000000080401d R11: 0000000000000202 R12: 00000000200000c0 R13: 0000000020000000 R14: 00007fa369bb4fe0 R15: 0000000020000100 Showing all locks held in the system: 3 locks held by kworker/u4:4/626: 1 lock held by khungtaskd/1571: #0: 000000001c5c078f (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7750: #0: 00000000fd6e7e9a (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 2 locks held by syz-executor.0/9433: #0: 00000000381e3e18 (&type->s_umount_key#53/1){+.+.}, at: alloc_super fs/super.c:226 [inline] #0: 00000000381e3e18 (&type->s_umount_key#53/1){+.+.}, at: sget_userns+0x20b/0xcd0 fs/super.c:519 #1: 00000000ce719750 (sb_internal#3){.+.+}, at: sb_start_intwrite include/linux/fs.h:1626 [inline] #1: 00000000ce719750 (sb_internal#3){.+.+}, at: xfs_trans_alloc+0x4fc/0x700 fs/xfs/xfs_trans.c:271 2 locks held by syz-executor.2/15488: 2 locks held by syz-executor.5/15519: #0: 000000000d56fc3f (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 000000000d56fc3f (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 #1: 000000006cc7f947 (rcu_preempt_state.exp_mutex){+.+.}, at: exp_funnel_lock kernel/rcu/tree_exp.h:297 [inline] #1: 000000006cc7f947 (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x4dc/0x6f0 kernel/rcu/tree_exp.h:667 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1571 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 626 Comm: kworker/u4:4 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Workqueue: bat_events batadv_nc_worker RIP: 0010:trace_event_get_offsets_lock_acquire include/trace/events/lock.h:13 [inline] RIP: 0010:perf_trace_lock_acquire+0xab/0x530 include/trace/events/lock.h:13 Code: 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 48 8d 46 18 48 89 85 40 ff ff ff 48 c1 e8 03 80 3c 10 00 0f 85 4f 03 00 00 49 8b 7d 18 <48> c7 c0 80 14 6a 88 48 85 ff 48 0f 44 f8 e8 72 60 a5 06 49 8d 7c RSP: 0018:ffff8880b4167ad0 EFLAGS: 00000046 RAX: 1ffff11014ed6b1d RBX: ffff88809e8d5aa8 RCX: 0000000000000000 RDX: dffffc0000000000 RSI: ffff8880a76b58d0 RDI: ffffffff896e9620 RBP: ffff8880b4167bb8 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000004 R11: 0000000000000000 R12: ffffffff89f6d420 R13: ffff8880a76b58d0 R14: 0000000000000000 R15: ffff8880b4167b90 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c022e5b000 CR3: 00000000a2dab000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: trace_lock_acquire include/trace/events/lock.h:13 [inline] lock_acquire+0x298/0x3c0 kernel/locking/lockdep.c:3907 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:168 spin_lock_bh include/linux/spinlock.h:334 [inline] batadv_nc_purge_paths+0xdc/0x310 net/batman-adv/network-coding.c:453 batadv_nc_worker+0x6fa/0xd50 net/batman-adv/network-coding.c:731 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415