INFO: task syz-executor516:8629 can't die for more than 143 seconds. syz-executor516 D27424 8629 8628 0x00004004 Call Trace: context_switch kernel/sched/core.c:2842 [inline] __schedule+0x755/0x1580 kernel/sched/core.c:3468 schedule+0xa8/0x270 kernel/sched/core.c:3532 rwsem_down_read_slowpath+0x4cc/0xf90 kernel/locking/rwsem.c:1079 __down_read kernel/locking/rwsem.c:1304 [inline] down_read+0x1f4/0x3f0 kernel/locking/rwsem.c:1447 do_user_addr_fault arch/x86/mm/fault.c:1389 [inline] __do_page_fault+0xa72/0xdc0 arch/x86/mm/fault.c:1504 do_page_fault+0x71/0x5e1 arch/x86/mm/fault.c:1535 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1161 RIP: 0033:0x4ab79d Code: Bad RIP value. RSP: 002b:00007ffe31de0a50 EFLAGS: 00010206 RAX: 00000000004ab8c0 RBX: 0000000000000001 RCX: 00000000006e0330 RDX: 0000000000407620 RSI: 0000000000000000 RDI: 00000000004ccb90 RBP: 00007ffe31de0a70 R08: 000000037ffffa00 R09: 000000037ffffa00 R10: 00007ffe31de0ae0 R11: 0000000000000000 R12: 0000000000000001 R13: 00000000006e0320 R14: 000000000000002d R15: 20c49ba5e353f7cf INFO: task syz-executor516:8629 blocked for more than 143 seconds. Not tainted 5.2.0-rc6-next-20190625 #22 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor516 D27424 8629 8628 0x00004004 Call Trace: context_switch kernel/sched/core.c:2842 [inline] __schedule+0x755/0x1580 kernel/sched/core.c:3468 schedule+0xa8/0x270 kernel/sched/core.c:3532 rwsem_down_read_slowpath+0x4cc/0xf90 kernel/locking/rwsem.c:1079 __down_read kernel/locking/rwsem.c:1304 [inline] down_read+0x1f4/0x3f0 kernel/locking/rwsem.c:1447 do_user_addr_fault arch/x86/mm/fault.c:1389 [inline] __do_page_fault+0xa72/0xdc0 arch/x86/mm/fault.c:1504 do_page_fault+0x71/0x5e1 arch/x86/mm/fault.c:1535 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1161 RIP: 0033:0x4ab79d Code: Bad RIP value. RSP: 002b:00007ffe31de0a50 EFLAGS: 00010206 RAX: 00000000004ab8c0 RBX: 0000000000000001 RCX: 00000000006e0330 RDX: 0000000000407620 RSI: 0000000000000000 RDI: 00000000004ccb90 RBP: 00007ffe31de0a70 R08: 000000037ffffa00 R09: 000000037ffffa00 R10: 00007ffe31de0ae0 R11: 0000000000000000 R12: 0000000000000001 R13: 00000000006e0320 R14: 000000000000002d R15: 20c49ba5e353f7cf INFO: task syz-executor516:8630 blocked for more than 143 seconds. Not tainted 5.2.0-rc6-next-20190625 #22 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor516 D28376 8630 8628 0x80004004 Call Trace: context_switch kernel/sched/core.c:2842 [inline] __schedule+0x755/0x1580 kernel/sched/core.c:3468 schedule+0xa8/0x270 kernel/sched/core.c:3532 rwsem_down_read_slowpath+0x4cc/0xf90 kernel/locking/rwsem.c:1079 __down_read kernel/locking/rwsem.c:1304 [inline] down_read+0x1f4/0x3f0 kernel/locking/rwsem.c:1447 exit_mm kernel/exit.c:513 [inline] do_exit+0x450/0x2eb0 kernel/exit.c:864 do_group_exit+0x135/0x360 kernel/exit.c:981 get_signal+0x47c/0x2500 kernel/signal.c:2728 do_signal+0x87/0x1700 arch/x86/kernel/signal.c:815 exit_to_usermode_loop+0x251/0x2d0 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:279 [inline] do_syscall_64+0x5a9/0x6a0 arch/x86/entry/common.c:304 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4468f9 Code: 67 66 69 6c 65 3d 64 65 62 75 67 2e 63 22 0a 00 00 45 52 52 4f 52 3a 20 6f 75 74 20 6f 66 20 6d 65 6d 6f 72 79 20 64 75 72 69 <6e> 67 20 64 65 62 75 67 20 73 65 74 75 70 0a 00 00 00 00 00 00 00 RSP: 002b:00007f0e25164db8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00000000006dbc28 RCX: 00000000004468f9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00000000006dbc28 RBP: 00000000006dbc20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dbc2c R13: 00007ffe31de0a4f R14: 00007f0e251659c0 R15: 20c49ba5e353f7cf INFO: task syz-executor516:8631 can't die for more than 144 seconds. syz-executor516 R running task 29000 8631 8628 0x00004006 Call Trace: kasan_check_read+0x11/0x20 mm/kasan/common.c:94 test_bit include/asm-generic/bitops-instrumented.h:237 [inline] hlock_class kernel/locking/lockdep.c:163 [inline] mark_lock+0xc0/0x11e0 kernel/locking/lockdep.c:3594 mark_held_locks+0xa4/0xf0 kernel/locking/lockdep.c:3282 kasan_check_read+0x11/0x20 mm/kasan/common.c:94 test_bit include/asm-generic/bitops-instrumented.h:237 [inline] hlock_class kernel/locking/lockdep.c:163 [inline] lookup_chain_cache_add kernel/locking/lockdep.c:2801 [inline] validate_chain kernel/locking/lockdep.c:2857 [inline] __lock_acquire+0x16f0/0x4680 kernel/locking/lockdep.c:3885 Showing all locks held in the system: 1 lock held by khungtaskd/1046: #0: 00000000d572e300 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e kernel/locking/lockdep.c:5262 1 lock held by rsyslogd/8512: #0: 00000000e0bb0754 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 fs/file.c:801 2 locks held by getty/8602: #0: 00000000ea2a6b3f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000269dd2c1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8603: #0: 000000005e16bf79 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000f7be4c04 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8604: #0: 0000000004d0e038 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000001d9d2f8e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8605: #0: 00000000bc57eb01 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000878db334 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8606: #0: 00000000106b2de3 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000841b9df3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8607: #0: 0000000009193d23 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000c50d9e7c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8608: #0: 0000000006d14dcb (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000b6928f4d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 1 lock held by syz-executor516/8629: #0: 000000002065de5a (&mm->mmap_sem#2){++++}, at: do_user_addr_fault arch/x86/mm/fault.c:1389 [inline] #0: 000000002065de5a (&mm->mmap_sem#2){++++}, at: __do_page_fault+0xa72/0xdc0 arch/x86/mm/fault.c:1504 1 lock held by syz-executor516/8630: #0: 000000002065de5a (&mm->mmap_sem#2){++++}, at: exit_mm kernel/exit.c:513 [inline] #0: 000000002065de5a (&mm->mmap_sem#2){++++}, at: do_exit+0x450/0x2eb0 kernel/exit.c:864 1 lock held by syz-executor516/8631: ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1046 Comm: khungtaskd Not tainted 5.2.0-rc6-next-20190625 #22 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 nmi_cpu_backtrace.cold+0x70/0xb2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x23b/0x28b lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:249 [inline] watchdog+0xc54/0x1320 kernel/hung_task.c:333 kthread+0x361/0x430 kernel/kthread.c:255 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:353 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 8631 Comm: syz-executor516 Not tainted 5.2.0-rc6-next-20190625 #22 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:kasan_mem_to_shadow include/linux/kasan.h:28 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:135 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:166 [inline] RIP: 0010:check_memory_region_inline mm/kasan/generic.c:182 [inline] RIP: 0010:check_memory_region+0x2d/0x190 mm/kasan/generic.c:191 Code: 0f 84 21 01 00 00 48 b8 ff ff ff ff ff 7f ff ff 55 0f b6 d2 48 39 c7 48 89 e5 41 55 41 54 53 0f 86 f6 00 00 00 4c 8d 5c 37 ff <49> 89 f8 48 b8 00 00 00 00 00 fc ff df 4d 89 da 49 c1 e8 03 4d 8d RSP: 0018:ffff88808e02f8d0 EFLAGS: 00000212 RAX: ffff7fffffffffff RBX: dffffc0000000000 RCX: ffffffff872e94e4 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8880a8b27130 RBP: ffff88808e02f8e8 R08: 0000000000004e4a R09: fffffbfff14a0556 R10: ffff8880a90b8978 R11: ffff8880a8b27137 R12: 0000000000000000 R13: ffff8880a8b27130 R14: 0000000000000000 R15: ffffffff818a56d5 FS: 00007f0e25144700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600400 CR3: 00000000a0f95000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kasan_check_read+0x11/0x20 mm/kasan/common.c:94 atomic64_read include/asm-generic/atomic-instrumented.h:836 [inline] atomic_long_read include/asm-generic/atomic-long.h:28 [inline] __mutex_trylock_or_owner kernel/locking/mutex.c:85 [inline] __mutex_trylock kernel/locking/mutex.c:126 [inline] __mutex_lock_common kernel/locking/mutex.c:928 [inline] __mutex_lock+0x104/0x1340 kernel/locking/mutex.c:1073 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1088 perf_mmap+0x745/0x1940 kernel/events/core.c:5672 call_mmap include/linux/fs.h:1875 [inline] mmap_region+0xc35/0x1760 mm/mmap.c:1788 do_mmap+0x82e/0x1090 mm/mmap.c:1561 do_mmap_pgoff include/linux/mm.h:2389 [inline] vm_mmap_pgoff+0x1c5/0x230 mm/util.c:438 ksys_mmap_pgoff+0x4aa/0x630 mm/mmap.c:1611 __do_sys_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] __se_sys_mmap arch/x86/kernel/sys_x86_64.c:91 [inline] __x64_sys_mmap+0xe9/0x1b0 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0xfd/0x6a0 arch/x86/entry/common.c:301 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4468f9 Code: e8 5c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f0e25143da8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00000000006dbc38 RCX: 00000000004468f9 RDX: 0000000000000000 RSI: 0000000000001000 RDI: 0000000020fff000 RBP: 00000000006dbc30 R08: 0000000000000003 R09: 0000000000000000 R10: 0000000000001011 R11: 0000000000000246 R12: 00000000006dbc3c R13: 00007ffe31de0a4f R14: 00007f0e251449c0 R15: 20c49ba5e353f7cf