audit: type=1800 audit(1671976334.142:331): pid=16253 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="/" dev="fuse" ino=0 res=0 Failed to get privilege flags for destination (handle=0x2:0x0) INFO: task syz-executor.3:13555 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 Context (ID=0x10) not attached to queue pair (handle=0xffffffff:0x0) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.3 D28648 13555 8168 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:589 [inline] rwsem_down_write_failed+0x3aa/0x760 kernel/locking/rwsem-xadd.c:618 call_rwsem_down_write_failed+0x13/0x20 arch/x86/lib/rwsem.S:117 __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x4f/0x90 kernel/locking/rwsem.c:72 inode_lock include/linux/fs.h:748 [inline] fuse_flush+0x1fd/0x5b0 fs/fuse/file.c:421 filp_close+0xb4/0x160 fs/open.c:1162 __close_fd+0x133/0x200 fs/file.c:636 __do_sys_close fs/open.c:1181 [inline] __se_sys_close fs/open.c:1179 [inline] __x64_sys_close+0x69/0x100 fs/open.c:1179 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fc41eda8f5b Code: Bad RIP value. RSP: 002b:00007ffd5fc09e90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007fc41eda8f5b RDX: 0000001b30020000 RSI: 0000001b300255c4 RDI: 0000000000000005 RBP: 00007fc41ef18980 R08: 0000000000000000 R09: 000000003253460c R10: 00135b922d980a8c R11: 0000000000000293 R12: 00000000000c2bd0 R13: 00007ffd5fc09f90 R14: 00007fc41ef17050 R15: 0000000000000032 INFO: task syz-executor.3:13562 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.3 D27792 13562 8168 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 fuse_wait_on_page_writeback fs/fuse/file.c:383 [inline] fuse_wait_on_page_writeback.isra.0+0x11b/0x170 fs/fuse/file.c:379 fuse_launder_page fs/fuse/file.c:2033 [inline] fuse_launder_page+0xb6/0xe0 fs/fuse/file.c:2026 do_launder_page mm/truncate.c:655 [inline] invalidate_inode_pages2_range+0x795/0x1110 mm/truncate.c:725 fuse_finish_open+0x2e2/0x590 fs/fuse/file.c:182 fuse_open_common+0x254/0x2c0 fs/fuse/file.c:222 do_dentry_open+0x4aa/0x1160 fs/open.c:796 do_last fs/namei.c:3421 [inline] path_openat+0x793/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fc41edf70a9 Code: Bad RIP value. RSP: 002b:00007fc41d369168 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007fc41ef16f80 RCX: 00007fc41edf70a9 RDX: 0000000000000000 RSI: 0000000000000600 RDI: 0000000020000100 RBP: 00007fc41ee52ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd5fc09e2f R14: 00007fc41d369300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1570: #0: 00000000d94e9116 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7781: 3 locks held by syz-executor.1/8135: 1 lock held by syz-executor.4/8152: 2 locks held by kworker/0:3/9340: #0: 000000007b969a93 ((wq_completion)"rcu_gp"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000cac8e9ef ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 Context (ID=0x0) not attached to queue pair (handle=0xffffffff:0x0) 1 lock held by syz-executor.3/13555: #0: 0000000079b2cf9b (&sb->s_type->i_mutex_key Failed to get privilege flags for destination (handle=0x2:0x0) #29){+.+.}, at: inode_lock include/linux/fs.h:748 [inline] #29){+.+.}, at: fuse_flush+0x1fd/0x5b0 fs/fuse/file.c:421 2 locks held by syz-executor.3/13562: #0: 000000001da4d951 (sb_writers#23){.+.+}, at: sb_start_write include/linux/fs.h:1579 [inline] #0: 000000001da4d951 (sb_writers#23){.+.+}, at: mnt_want_write+0x3a/0xb0 fs/namespace.c:360 #1: 0000000079b2cf9b (&sb->s_type->i_mutex_key#29){+.+.}, at: inode_lock include/linux/fs.h:748 [inline] #1: 0000000079b2cf9b (&sb->s_type->i_mutex_key#29){+.+.}, at: fuse_open_common+0x1bc/0x2c0 fs/fuse/file.c:215 1 lock held by syz-executor.3/13888: #0: 00000000670a893b (&sb->s_type->i_mutex_key#29){+.+.}, at: inode_lock include/linux/fs.h:748 [inline] #0: 00000000670a893b (&sb->s_type->i_mutex_key#29){+.+.}, at: fuse_flush+0x1fd/0x5b0 fs/fuse/file.c:421 2 locks held by syz-executor.3/13889: #0: 0000000054d1282b (sb_writers#23){.+.+}, at: sb_start_write include/linux/fs.h:1579 [inline] #0: 0000000054d1282b (sb_writers#23){.+.+}, at: mnt_want_write+0x3a/0xb0 fs/namespace.c:360 #1: 00000000670a893b (&sb->s_type->i_mutex_key#29){+.+.}, at: inode_lock include/linux/fs.h:748 [inline] #1: 00000000670a893b (&sb->s_type->i_mutex_key#29){+.+.}, at: fuse_open_common+0x1bc/0x2c0 fs/fuse/file.c:215 1 lock held by syz-executor.0/16295: #0: 000000006b815444 (rcu_preempt_state.exp_mutex){+.+.}, at: exp_funnel_lock kernel/rcu/tree_exp.h:329 [inline] #0: 000000006b815444 (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x256/0x6f0 kernel/rcu/tree_exp.h:667 1 lock held by syz-executor.5/16309: #0: 000000006b815444 (rcu_preempt_state.exp_mutex){+.+.}, at: exp_funnel_lock kernel/rcu/tree_exp.h:329 [inline] #0: 000000006b815444 (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x256/0x6f0 kernel/rcu/tree_exp.h:667 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 16321 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x50 kernel/kcov.c:100 Code: e8 11 dd 35 00 e9 ab fe ff ff 4c 89 ef e8 04 dd 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 <65> 48 8b 04 25 c0 df 01 00 65 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 RSP: 0018:ffff888098d47ab8 EFLAGS: 00000206 RAX: 0000000000000000 RBX: 0000000000000200 RCX: ffffffff81b074f9 RDX: 0000000000000200 RSI: ffffffff81b07507 RDI: 0000000000000007 RBP: dffffc0000000000 R08: 0000000000000222 R09: 0000000000000000 R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880a3e58840 R13: 00000000000003da R14: 0000000000000010 R15: 000000000000000e FS: 0000555557133400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffffa177cd7 CR3: 0000000093629000 CR4: 00000000003426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: arch_local_irq_disable arch/x86/include/asm/paravirt.h:794 [inline] lookup_bh_lru fs/buffer.c:1260 [inline] __find_get_block+0x77/0xde0 fs/buffer.c:1291 sb_find_get_block include/linux/buffer_head.h:346 [inline] recently_deleted fs/ext4/ialloc.c:684 [inline] find_inode_bit+0x213/0x520 fs/ext4/ialloc.c:724 __ext4_new_inode+0x160c/0x5a20 fs/ext4/ialloc.c:916 ext4_symlink+0x3f5/0xc00 fs/ext4/namei.c:3176 vfs_symlink+0x453/0x6c0 fs/namei.c:4129 do_symlinkat+0x258/0x2c0 fs/namei.c:4156 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fd92174a9e7 Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 0a 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffe1fc6ae08 EFLAGS: 00000206 ORIG_RAX: 000000000000010a RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd92174a9e7 RDX: 00007fd9217a6b8a RSI: 00000000ffffff9c RDI: 00007fd9217a5713 RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffe1fc6a880 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe1fc6aed0 Failed to get privilege flags for destination (handle=0x2:0x0) audit: type=1800 audit(1671976335.132:332): pid=16303 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="/" dev="fuse" ino=0 res=0