INFO: task syz-executor.2:1638 blocked for more than 143 seconds. Not tainted 5.16.0-rc4-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.2 state:D stack:27128 pid: 1638 ppid: 12737 flags:0x20004004 Call Trace: context_switch kernel/sched/core.c:4972 [inline] __schedule+0xa9a/0x4940 kernel/sched/core.c:6253 schedule+0xd2/0x260 kernel/sched/core.c:6326 rwsem_down_read_slowpath+0x589/0xa70 kernel/locking/rwsem.c:1041 __down_read_common kernel/locking/rwsem.c:1223 [inline] __down_read kernel/locking/rwsem.c:1232 [inline] down_read+0xe2/0x440 kernel/locking/rwsem.c:1472 mmap_read_lock include/linux/mmap_lock.h:117 [inline] exit_mm kernel/exit.c:483 [inline] do_exit+0xa0a/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 __do_fast_syscall_32+0x72/0xf0 arch/x86/entry/common.c:181 do_fast_syscall_32+0x2f/0x70 arch/x86/entry/common.c:203 entry_SYSENTER_compat_after_hwframe+0x4d/0x5c RIP: 0023:0xf6eaa549 RSP: 002b:00000000f5ea45fc EFLAGS: 00000296 ORIG_RAX: 0000000000000127 RAX: 0000000000000004 RBX: 00000000ffffff9c RCX: 0000000020000280 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 INFO: task syz-executor.2:1643 blocked for more than 144 seconds. Not tainted 5.16.0-rc4-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.2 state:D stack:28464 pid: 1643 ppid: 12737 flags:0x20004004 Call Trace: context_switch kernel/sched/core.c:4972 [inline] __schedule+0xa9a/0x4940 kernel/sched/core.c:6253 schedule+0xd2/0x260 kernel/sched/core.c:6326 rwsem_down_read_slowpath+0x589/0xa70 kernel/locking/rwsem.c:1041 __down_read_common kernel/locking/rwsem.c:1223 [inline] __down_read kernel/locking/rwsem.c:1232 [inline] down_read+0xe2/0x440 kernel/locking/rwsem.c:1472 mmap_read_lock include/linux/mmap_lock.h:117 [inline] exit_mm kernel/exit.c:483 [inline] do_exit+0xa0a/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 __do_fast_syscall_32+0x72/0xf0 arch/x86/entry/common.c:181 do_fast_syscall_32+0x2f/0x70 arch/x86/entry/common.c:203 entry_SYSENTER_compat_after_hwframe+0x4d/0x5c RIP: 0023:0xf6eaa549 RSP: 002b:00000000f5e8367c EFLAGS: 00000296 ORIG_RAX: 00000000000000f0 RAX: fffffffffffffe00 RBX: 00000000f7007028 RCX: 0000000000000080 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000f700702c RBP: 0000000000000081 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 INFO: task syz-executor.2:1646 blocked for more than 145 seconds. Not tainted 5.16.0-rc4-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.2 state:D stack:29560 pid: 1646 ppid: 12737 flags:0x20004004 Call Trace: context_switch kernel/sched/core.c:4972 [inline] __schedule+0xa9a/0x4940 kernel/sched/core.c:6253 schedule+0xd2/0x260 kernel/sched/core.c:6326 rwsem_down_read_slowpath+0x589/0xa70 kernel/locking/rwsem.c:1041 __down_read_common kernel/locking/rwsem.c:1223 [inline] __down_read kernel/locking/rwsem.c:1232 [inline] down_read+0xe2/0x440 kernel/locking/rwsem.c:1472 mmap_read_lock include/linux/mmap_lock.h:117 [inline] exit_mm kernel/exit.c:483 [inline] do_exit+0xa0a/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 __do_fast_syscall_32+0x72/0xf0 arch/x86/entry/common.c:181 do_fast_syscall_32+0x2f/0x70 arch/x86/entry/common.c:203 entry_SYSENTER_compat_after_hwframe+0x4d/0x5c RIP: 0023:0xf6eaa549 RSP: 002b:00000000f5e6267c EFLAGS: 00000296 ORIG_RAX: 00000000000000f0 RAX: fffffffffffffe00 RBX: 00000000f70070a8 RCX: 0000000000000080 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000f70070ac RBP: 0000000000000081 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Showing all locks held in the system: 1 lock held by khungtaskd/27: #0: ffffffff8bb83d20 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6458 1 lock held by in:imklog/6217: #0: ffff8880233a74f0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:994 2 locks held by agetty/6450: #0: ffff88801c3c7098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:252 #1: ffffc90002a8c2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xcf0/0x1230 drivers/tty/n_tty.c:2113 3 locks held by kworker/u4:5/8289: 1 lock held by syz-executor.1/23995: #0: ffff888041e28460 (sb_writers#3){.+.+}-{0:0}, at: __do_splice+0x134/0x250 fs/splice.c:1144 1 lock held by syz-executor.1/24005: #0: ffff888041e28460 (sb_writers#3){.+.+}-{0:0}, at: __do_splice+0x134/0x250 fs/splice.c:1144 4 locks held by syz-executor.4/30505: 1 lock held by syz-executor.2/1635: 1 lock held by syz-executor.2/1638: #0: ffff888018ba5528 (&mm->mmap_lock#2){++++}-{3:3}, at: mmap_read_lock include/linux/mmap_lock.h:117 [inline] #0: ffff888018ba5528 (&mm->mmap_lock#2){++++}-{3:3}, at: exit_mm kernel/exit.c:483 [inline] #0: ffff888018ba5528 (&mm->mmap_lock#2){++++}-{3:3}, at: do_exit+0xa0a/0x2b40 kernel/exit.c:819 1 lock held by syz-executor.2/1643: #0: ffff888018ba5528 (&mm->mmap_lock#2){++++}-{3:3}, at: mmap_read_lock include/linux/mmap_lock.h:117 [inline] #0: ffff888018ba5528 (&mm->mmap_lock#2){++++}-{3:3}, at: exit_mm kernel/exit.c:483 [inline] #0: ffff888018ba5528 (&mm->mmap_lock#2){++++}-{3:3}, at: do_exit+0xa0a/0x2b40 kernel/exit.c:819 1 lock held by syz-executor.2/1646: #0: ffff888018ba5528 (&mm->mmap_lock#2){++++}-{3:3}, at: mmap_read_lock include/linux/mmap_lock.h:117 [inline] #0: ffff888018ba5528 (&mm->mmap_lock#2){++++}-{3:3}, at: exit_mm kernel/exit.c:483 [inline] #0: ffff888018ba5528 (&mm->mmap_lock#2){++++}-{3:3}, at: do_exit+0xa0a/0x2b40 kernel/exit.c:819 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.16.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xc1d/0xf50 kernel/hung_task.c:295 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 8289 Comm: kworker/u4:5 Not tainted 5.16.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:strlen+0x4d/0x90 lib/string.c:487 Code: 07 38 d0 7f 04 84 c0 75 48 80 7d 00 00 74 39 48 bb 00 00 00 00 00 fc ff df 48 89 e8 48 83 c0 01 48 89 c2 48 89 c1 48 c1 ea 03 <83> e1 07 0f b6 14 1a 38 ca 7f 04 84 d2 75 1f 80 38 00 75 de 48 83 RSP: 0000:ffffc9000e95f820 EFLAGS: 00000a03 RAX: ffffffff89a95f2d RBX: dffffc0000000000 RCX: ffffffff89a95f2d RDX: 1ffffffff1352be5 RSI: ffff888010dba138 RDI: ffffffff89a95f20 RBP: ffffffff89a95f20 R08: 0000000000000000 R09: ffffffff8d912e57 R10: fffffbfff1b225ca R11: 000000000000003f R12: ffff888010dba138 R13: ffffffff8ba81020 R14: ffff888010dba138 R15: ffffc9000e95f8f0 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000054 CR3: 000000000b88e000 CR4: 00000000003526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: strlen include/linux/fortify-string.h:102 [inline] trace_event_get_offsets_lock include/trace/events/lock.h:39 [inline] perf_trace_lock+0xb1/0x4d0 include/trace/events/lock.h:39 trace_lock_release include/trace/events/lock.h:58 [inline] lock_release+0x4a8/0x720 kernel/locking/lockdep.c:5648 __raw_spin_unlock include/linux/spinlock_api_smp.h:141 [inline] _raw_spin_unlock+0x12/0x40 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:389 [inline] __text_poke+0x5d4/0x8c0 arch/x86/kernel/alternative.c:1059 text_poke_bp_batch+0x3d7/0x560 arch/x86/kernel/alternative.c:1361 text_poke_flush arch/x86/kernel/alternative.c:1451 [inline] text_poke_flush arch/x86/kernel/alternative.c:1448 [inline] text_poke_finish+0x16/0x30 arch/x86/kernel/alternative.c:1458 arch_jump_label_transform_apply+0x13/0x20 arch/x86/kernel/jump_label.c:146 jump_label_update+0x1d5/0x430 kernel/jump_label.c:830 static_key_enable_cpuslocked+0x1b1/0x260 kernel/jump_label.c:177 static_key_enable+0x16/0x20 kernel/jump_label.c:190 toggle_allocation_gate mm/kfence/core.c:732 [inline] toggle_allocation_gate+0x100/0x390 mm/kfence/core.c:724 process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298 worker_thread+0x658/0x11f0 kernel/workqueue.c:2445 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 38 d0 cmp %dl,%al 2: 7f 04 jg 0x8 4: 84 c0 test %al,%al 6: 75 48 jne 0x50 8: 80 7d 00 00 cmpb $0x0,0x0(%rbp) c: 74 39 je 0x47 e: 48 bb 00 00 00 00 00 movabs $0xdffffc0000000000,%rbx 15: fc ff df 18: 48 89 e8 mov %rbp,%rax 1b: 48 83 c0 01 add $0x1,%rax 1f: 48 89 c2 mov %rax,%rdx 22: 48 89 c1 mov %rax,%rcx 25: 48 c1 ea 03 shr $0x3,%rdx * 29: 83 e1 07 and $0x7,%ecx <-- trapping instruction 2c: 0f b6 14 1a movzbl (%rdx,%rbx,1),%edx 30: 38 ca cmp %cl,%dl 32: 7f 04 jg 0x38 34: 84 d2 test %dl,%dl 36: 75 1f jne 0x57 38: 80 38 00 cmpb $0x0,(%rax) 3b: 75 de jne 0x1b 3d: 48 rex.W 3e: 83 .byte 0x83