XFS (loop3): Quotacheck: Done. XFS (loop5): Unmounting Filesystem INFO: task kworker/u4:4:3598 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. kworker/u4:4 D24744 3598 2 0x80000000 Workqueue: netns cleanup_net Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_timeout+0x92d/0xfe0 kernel/time/timer.c:1794 do_wait_for_common kernel/sched/completion.c:83 [inline] __wait_for_common kernel/sched/completion.c:104 [inline] wait_for_common+0x29c/0x470 kernel/sched/completion.c:115 flush_workqueue+0x40b/0x13e0 kernel/workqueue.c:2713 IPVS: ftp: loaded support on port[0] = 21 flush_scheduled_work include/linux/workqueue.h:599 [inline] tipc_exit_net+0x38/0x60 net/tipc/core.c:100 ops_exit_list+0xa5/0x150 net/core/net_namespace.c:153 cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:554 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 XFS (loop3): Unmounting Filesystem Showing all locks held in the system: 2 locks held by kworker/u4:3/167: 1 lock held by khungtaskd/1570: #0: 000000006e00ebb4 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 3 locks held by kworker/u4:4/3598: #0: 0000000019fd4fa8 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 000000003c7ba73a (net_cleanup_work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 #2: 00000000d3ff5115 (pernet_ops_rwsem){++++}, at: cleanup_net+0xa8/0x8b0 net/core/net_namespace.c:521 IPVS: ftp: loaded support on port[0] = 21 1 lock held by systemd-udevd/4696: 1 lock held by in:imklog/7827: #0: 000000009f0f6b2b (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 2 locks held by agetty/8045: #0: 00000000560232e2 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:272 #1: 00000000c230ddde (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1950 drivers/tty/n_tty.c:2154 2 locks held by kworker/1:3/8350: #0: 0000000088de3d65 ((wq_completion)"events"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000d4063018 ((work_completion)(&m->rq)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 IPVS: ftp: loaded support on port[0] = 21 2 locks held by kworker/0:4/9337: #0: 0000000088de3d65 ((wq_completion)"events"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000e24ac16a ((work_completion)(&m->rq)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 XFS (loop1): Mounting V4 Filesystem 1 lock held by syz-executor.1/29438: 1 lock held by syz-executor.2/29449: XFS (loop1): Ending clean mount #0: 00000000f3b09801 (&type->s_umount_key#89/1){+.+.}, at: alloc_super fs/super.c:226 [inline] #0: 00000000f3b09801 (&type->s_umount_key#89/1){+.+.}, at: sget_userns+0x20b/0xcd0 fs/super.c:519 XFS (loop1): Quotacheck needed: Please wait. XFS (loop2): Mounting V4 Filesystem 2 locks held by syz-executor.5/29467: XFS (loop1): Quotacheck: Done. 2 locks held by syz-executor.4/29524: XFS (loop2): Ending clean mount ============================================= XFS (loop2): Quotacheck needed: Please wait. NMI backtrace for cpu 0 CPU: 0 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: XFS (loop2): Quotacheck: Done. __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4696 Comm: systemd-udevd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:unwind_next_frame+0xf65/0x1400 arch/x86/kernel/unwind_orc.c:555 Code: 89 f9 41 83 e1 07 45 38 c8 41 0f 9e c1 45 84 c0 41 0f 95 c0 45 84 c1 0f 85 b3 02 00 00 83 e0 07 40 38 c6 41 0f 9e c0 40 84 f6 <0f> 95 c0 41 84 c0 0f 85 9a 02 00 00 49 0f bf 77 02 4c 89 f7 48 03 RSP: 0018:ffff88809db8f7a0 EFLAGS: 00000246 RAX: 0000000000000003 RBX: 1ffff11013b71efd RCX: ffffffff8b99dea5 RDX: ffff88809db8f910 RSI: 0000000000000000 RDI: ffffffff8b99dea2 RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000001 R10: ffff88809db8f92f R11: 0000000000074071 R12: ffff88809db8fbb8 R13: ffff88809db8f905 R14: ffff88809db8f8d0 R15: ffffffff8b99dea0 FS: 00007f42c8c1a8c0(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055ba02c23188 CR3: 000000009d554000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __save_stack_trace+0xd6/0x190 arch/x86/kernel/stacktrace.c:44 save_stack mm/kasan/kasan.c:448 [inline] set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:553 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc mm/slab.c:3397 [inline] kmem_cache_alloc_trace+0x11a/0x380 mm/slab.c:3623 kmalloc include/linux/slab.h:515 [inline] kzalloc include/linux/slab.h:709 [inline] aa_alloc_file_ctx security/apparmor/include/file.h:60 [inline] apparmor_file_alloc_security+0x394/0xad0 security/apparmor/lsm.c:438 security_file_alloc+0x40/0x90 security/security.c:880 __alloc_file+0xd8/0x340 fs/file_table.c:105 alloc_empty_file+0x6d/0x170 fs/file_table.c:150 alloc_file+0x5e/0x4d0 fs/file_table.c:192 alloc_file_pseudo+0x165/0x250 fs/file_table.c:231 sock_alloc_file+0x48/0x180 net/socket.c:406 sock_map_fd net/socket.c:429 [inline] __sys_socket+0x13d/0x200 net/socket.c:1462 __do_sys_socket net/socket.c:1467 [inline] __se_sys_socket net/socket.c:1465 [inline] __x64_sys_socket+0x6f/0xb0 net/socket.c:1465 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f42c7a9af17 Code: 73 01 c3 48 8b 0d 81 ef 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 51 ef 2a 00 f7 d8 64 89 01 48 RSP: 002b:00007ffe3720c8c8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 000055ba02c23650 RCX: 00007f42c7a9af17 RDX: 000000000000000f RSI: 0000000000080803 RDI: 0000000000000010 RBP: 000055ba02c160e0 R08: 000055ba02c160e0 R09: 0000000000000210 R10: 000000000000000f R11: 0000000000000286 R12: 00000000ffffffff R13: 0000000000000000 R14: 000055ba02c16010 R15: 000055ba02c16028