INFO: task syz-executor.5:1667 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.5 D26136 1667 15294 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 input: syz1 as /devices/virtual/input/input3542 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 xlog_grant_head_wait+0x13b/0xcd0 fs/xfs/xfs_log.c:263 xlog_grant_head_check+0x3c8/0x420 fs/xfs/xfs_log.c:325 xfs_log_reserve+0x347/0xa70 fs/xfs/xfs_log.c:454 xfs_trans_reserve+0x63a/0x9c0 fs/xfs/xfs_trans.c:197 xfs_trans_alloc+0x2f7/0x700 fs/xfs/xfs_trans.c:289 xfs_sync_sb+0x7f/0x140 fs/xfs/libxfs/xfs_sb.c:968 xfs_mountfs+0x1904/0x1bf0 fs/xfs/xfs_mount.c:939 xfs_fs_fill_super+0xd0e/0x1540 fs/xfs/xfs_super.c:1720 mount_bdev+0x2fc/0x3b0 fs/super.c:1158 mount_fs+0xa3/0x310 fs/super.c:1261 vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2492 [inline] do_mount+0x115c/0x2f50 fs/namespace.c:2822 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f04e94495fa Code: Bad RIP value. RSP: 002b:00007f04e79b9f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 000000000000baee RCX: 00007f04e94495fa RDX: 000000002000bb00 RSI: 000000002000bb40 RDI: 00007f04e79b9fe0 RBP: 00007f04e79ba020 R08: 00007f04e79ba020 R09: 0000000002000002 R10: 0000000002000002 R11: 0000000000000202 R12: 000000002000bb00 R13: 000000002000bb40 R14: 00007f04e79b9fe0 R15: 0000000020000000 Showing all locks held in the system: 1 lock held by khungtaskd/1570: #0: 00000000b2d0efed (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by systemd-udevd/4699: 1 lock held by in:imklog/7823: #0: 000000004c281a1c (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 3 locks held by kworker/u4:4/4683: 1 lock held by syz-executor.5/1667: #0: 000000008a382f61 (&type->s_umount_key#49/1){+.+.}, at: alloc_super fs/super.c:226 [inline] #0: 000000008a382f61 (&type->s_umount_key#49/1){+.+.}, at: sget_userns+0x20b/0xcd0 fs/super.c:519 2 locks held by syz-executor.5/11142: 1 lock held by *:* ˜ÿ­@ÃSï~ÕŠ/11139: ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 4699 Comm: systemd-udevd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x50 kernel/kcov.c:100 Code: e8 11 dd 35 00 e9 ab fe ff ff 4c 89 ef e8 04 dd 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 <65> 48 8b 04 25 c0 df 01 00 65 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 RSP: 0018:ffff88809c04fcf0 EFLAGS: 00000293 RAX: ffff88809c046080 RBX: ffffffff88407000 RCX: ffffffff81a0fb5c RDX: 0000000000000000 RSI: ffffffff812b5f49 RDI: ffffffff88407000 RBP: ffff88822098ab17 R08: 0000000000000017 R09: ffffffff81000000 R10: 0000000000000006 R11: 0000000093cb7300 R12: ffff88822098ab00 R13: 0000000000000001 R14: ffff888001000000 R15: ffff888000000000 FS: 00007fb4d949c8c0(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000559ec439fa38 CR3: 000000009c228000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __phys_addr_symbol+0x9/0x70 arch/x86/mm/physaddr.c:36 check_kernel_text_object mm/usercopy.c:145 [inline] __check_object_size mm/usercopy.c:293 [inline] __check_object_size+0x16d/0x3e0 mm/usercopy.c:260 check_object_size include/linux/thread_info.h:132 [inline] check_copy_size include/linux/thread_info.h:163 [inline] copy_to_user include/linux/uaccess.h:154 [inline] readlink_copy+0x65/0xc0 fs/namei.c:4701 vfs_readlink+0x129/0x390 fs/namei.c:4742 do_readlinkat+0x27e/0x2f0 fs/stat.c:406 __do_sys_readlinkat fs/stat.c:421 [inline] __se_sys_readlinkat fs/stat.c:418 [inline] __x64_sys_readlinkat+0x93/0xf0 fs/stat.c:418 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fb4d83100ba Code: 48 8b 0d e1 bd 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 0b 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d ae bd 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffc4c461e18 EFLAGS: 00000202 ORIG_RAX: 000000000000010b RAX: ffffffffffffffda RBX: 0000559ec43a3ab0 RCX: 00007fb4d83100ba RDX: 0000559ec43a3ab0 RSI: 00007ffc4c461ea0 RDI: 00000000ffffff9c RBP: 0000000000000064 R08: 000000000000eec1 R09: 0000000000000070 R10: 0000000000000063 R11: 0000000000000202 R12: 00007ffc4c461ea0 R13: 00000000ffffff9c R14: 00007ffc4c461e70 R15: 0000000000000063