INFO: task syz-executor376:9274 blocked for more than 140 seconds. Not tainted 4.14.266-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor376 D28912 9274 7980 0x00000004 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x1e6/0x350 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:66 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 __do_page_fault+0x7b8/0xad0 arch/x86/mm/fault.c:1378 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1123 RIP: 0001:0x7f61d24321a0 RSP: d2429198:0000000000000000 EFLAGS: 00000000 INFO: task syz-executor376:9345 blocked for more than 140 seconds. Not tainted 4.14.266-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor376 D28912 9345 7976 0x00000004 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x1e6/0x350 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:66 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 __do_page_fault+0x7b8/0xad0 arch/x86/mm/fault.c:1378 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1123 RIP: 0001:0x7f61d24321a0 RSP: d2429198:0000000000000000 EFLAGS: 00000000 INFO: task syz-executor376:9351 blocked for more than 140 seconds. Not tainted 4.14.266-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor376 D28608 9351 7983 0x00000004 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x1e6/0x350 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:66 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 __do_page_fault+0x7b8/0xad0 arch/x86/mm/fault.c:1378 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1123 RIP: 0001:0x7f61d24321a0 RSP: d2429198:0000000000000000 EFLAGS: 00000000 INFO: task syz-executor376:9360 blocked for more than 140 seconds. Not tainted 4.14.266-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor376 D28912 9360 7981 0x00000004 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x1e6/0x350 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:66 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 __do_page_fault+0x7b8/0xad0 arch/x86/mm/fault.c:1378 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1123 RIP: 0001:0x7f61d24321a0 RSP: d2429198:0000000000000000 EFLAGS: 00000000 Showing all locks held in the system: 1 lock held by khungtaskd/1533: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 1 lock held by syz-executor376/9274: #0: (&mm->mmap_sem){++++}, at: [] __do_page_fault+0x7b8/0xad0 arch/x86/mm/fault.c:1378 1 lock held by syz-executor376/9278: #0: (&mm->mmap_sem){++++}, at: [] exit_mm kernel/exit.c:511 [inline] #0: (&mm->mmap_sem){++++}, at: [] do_exit+0x598/0x2850 kernel/exit.c:855 1 lock held by syz-executor376/9345: #0: (&mm->mmap_sem){++++}, at: [] __do_page_fault+0x7b8/0xad0 arch/x86/mm/fault.c:1378 1 lock held by syz-executor376/9348: #0: (&mm->mmap_sem){++++}, at: [] exit_mm kernel/exit.c:511 [inline] #0: (&mm->mmap_sem){++++}, at: [] do_exit+0x598/0x2850 kernel/exit.c:855 1 lock held by syz-executor376/9351: #0: (&mm->mmap_sem){++++}, at: [] __do_page_fault+0x7b8/0xad0 arch/x86/mm/fault.c:1378 1 lock held by syz-executor376/9352: #0: (&mm->mmap_sem){++++}, at: [] exit_mm kernel/exit.c:511 [inline] #0: (&mm->mmap_sem){++++}, at: [] do_exit+0x598/0x2850 kernel/exit.c:855 1 lock held by syz-executor376/9360: #0: (&mm->mmap_sem){++++}, at: [] __do_page_fault+0x7b8/0xad0 arch/x86/mm/fault.c:1378 1 lock held by syz-executor376/9361: #0: (&mm->mmap_sem){++++}, at: [] exit_mm kernel/exit.c:511 [inline] #0: (&mm->mmap_sem){++++}, at: [] do_exit+0x598/0x2850 kernel/exit.c:855 1 lock held by syz-executor376/15217: #0: (&mm->mmap_sem){++++}, at: [] __do_page_fault+0x7b8/0xad0 arch/x86/mm/fault.c:1378 1 lock held by syz-executor376/15218: #0: (&mm->mmap_sem){++++}, at: [] exit_mm kernel/exit.c:511 [inline] #0: (&mm->mmap_sem){++++}, at: [] do_exit+0x598/0x2850 kernel/exit.c:855 1 lock held by syz-executor376/15219: #0: (&mm->mmap_sem){++++}, at: [] __do_page_fault+0x7b8/0xad0 arch/x86/mm/fault.c:1378 1 lock held by syz-executor376/15220: #0: (&mm->mmap_sem){++++}, at: [] exit_mm kernel/exit.c:511 [inline] #0: (&mm->mmap_sem){++++}, at: [] do_exit+0x598/0x2850 kernel/exit.c:855 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1533 Comm: khungtaskd Not tainted 4.14.266-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 4609 Comm: systemd-journal Not tainted 4.14.266-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880a2300480 task.stack: ffff8880a2308000 RIP: 0010:trace_hardirqs_on_caller+0xbc/0x580 kernel/locking/lockdep.c:2898 RSP: 0018:ffff8880a230fb00 EFLAGS: 00000046 RAX: 0000000000000000 RBX: ffff8880a2300480 RCX: 1ffffffff127a3e4 RDX: 1ffff1101446019a RSI: ffffffff87ccf380 RDI: ffff8880a2300cd0 RBP: ffffffff817ef5fd R08: ffffed10154cb400 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a9bbda80 R13: ffff8880a230fb50 R14: ffff88813fe744c0 R15: 0000000000000286 FS: 00007f066db178c0(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f066af2b000 CR3: 00000000a21c2000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: qlink_free mm/kasan/quarantine.c:150 [inline] qlist_free_all+0xed/0x140 mm/kasan/quarantine.c:166 quarantine_reduce+0x185/0x200 mm/kasan/quarantine.c:259 kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:536 slab_post_alloc_hook mm/slab.h:442 [inline] slab_alloc mm/slab.c:3390 [inline] kmem_cache_alloc+0x111/0x3c0 mm/slab.c:3550 getname_flags+0xc8/0x550 fs/namei.c:138 do_sys_open+0x1ce/0x410 fs/open.c:1075 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f066d0a6840 RSP: 002b:00007fff18d53e28 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007fff18d54130 RCX: 00007f066d0a6840 RDX: 00000000000001a0 RSI: 0000000000080042 RDI: 00005565e1d1c680 RBP: 000000000000000d R08: 0000000000000000 R09: 00000000ffffffff R10: 0000000000000069 R11: 0000000000000246 R12: 00000000ffffffff R13: 00005565e1d0f040 R14: 00007fff18d540f0 R15: 00005565e1d1c6d0 Code: 7f 02 00 48 8d bb 50 08 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 57 03 00 00 <44> 8b 93 50 08 00 00 45 85 d2 0f 85 cc 02 00 00 48 c7 c3 40 dd ---------------- Code disassembly (best guess): 0: 7f 02 jg 0x4 2: 00 48 8d add %cl,-0x73(%rax) 5: bb 50 08 00 00 mov $0x850,%ebx a: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 11: fc ff df 14: 48 89 fa mov %rdi,%rdx 17: 48 c1 ea 03 shr $0x3,%rdx 1b: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax 1f: 84 c0 test %al,%al 21: 74 08 je 0x2b 23: 3c 03 cmp $0x3,%al 25: 0f 8e 57 03 00 00 jle 0x382 * 2b: 44 8b 93 50 08 00 00 mov 0x850(%rbx),%r10d <-- trapping instruction 32: 45 85 d2 test %r10d,%r10d 35: 0f 85 cc 02 00 00 jne 0x307 3b: 48 rex.W 3c: c7 .byte 0xc7 3d: c3 retq 3e: 40 rex 3f: dd .byte 0xdd