INFO: task jbd2/sda1-8:2927 blocked for more than 143 seconds. Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:jbd2/sda1-8 state:D stack:24024 pid: 2927 ppid: 2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:4986 [inline] __schedule+0x926/0x1080 kernel/sched/core.c:6295 schedule+0x12b/0x1f0 kernel/sched/core.c:6368 io_schedule+0x83/0x100 kernel/sched/core.c:8407 bit_wait_io+0xe/0xc0 kernel/sched/wait_bit.c:209 __wait_on_bit+0xbd/0x190 kernel/sched/wait_bit.c:49 out_of_line_wait_on_bit+0x1d2/0x250 kernel/sched/wait_bit.c:64 wait_on_buffer include/linux/buffer_head.h:356 [inline] journal_wait_on_commit_record fs/jbd2/commit.c:175 [inline] jbd2_journal_commit_transaction+0x3f31/0x5e80 fs/jbd2/commit.c:931 kjournald2+0x4b4/0x940 fs/jbd2/journal.c:213 kthread+0x2a3/0x2d0 kernel/kthread.c:377 ret_from_fork+0x1f/0x30 INFO: task syz-executor.3:16276 blocked for more than 143 seconds. Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.3 state:D stack:23856 pid:16276 ppid: 11494 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:4986 [inline] __schedule+0x926/0x1080 kernel/sched/core.c:6295 schedule+0x12b/0x1f0 kernel/sched/core.c:6368 jbd2_log_wait_commit+0x2c5/0x500 fs/jbd2/journal.c:712 __jbd2_journal_force_commit+0x158/0x1e0 fs/jbd2/journal.c:561 jbd2_journal_force_commit_nested+0x11/0x30 fs/jbd2/journal.c:582 ext4_should_retry_alloc+0x161/0x2c0 fs/ext4/balloc.c:669 ext4_xattr_set+0x281/0x3b0 fs/ext4/xattr.c:2484 __vfs_setxattr+0x3ab/0x3e0 fs/xattr.c:180 __vfs_setxattr_noperm+0x128/0x5e0 fs/xattr.c:214 vfs_setxattr+0x228/0x440 fs/xattr.c:301 setxattr+0x1aa/0x300 fs/xattr.c:575 path_setxattr+0x1a8/0x270 fs/xattr.c:595 __do_sys_setxattr fs/xattr.c:611 [inline] __se_sys_setxattr fs/xattr.c:607 [inline] __x64_sys_setxattr+0xb7/0xd0 fs/xattr.c:607 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7febec185059 RSP: 002b:00007febeaafa168 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc RAX: ffffffffffffffda RBX: 00007febec297f60 RCX: 00007febec185059 RDX: 0000000020000380 RSI: 00000000200000c0 RDI: 0000000020000080 RBP: 00007febec1df08d R08: 0000000000000000 R09: 0000000000000000 R10: 000000000000c001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc6fefb8bf R14: 00007febeaafa300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/27: #0: ffffffff8cb1db60 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 2 locks held by getty/3273: #0: ffff88807ed3a098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 drivers/tty/tty_ldisc.c:244 #1: ffffc90002b662e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6c5/0x1c60 drivers/tty/n_tty.c:2077 2 locks held by kworker/u4:27/5618: 2 locks held by syz-executor.3/16276: #0: ffff88814ade0460 (sb_writers#5){.+.+}-{0:0}, at: mnt_want_write+0x3b/0x80 fs/namespace.c:377 #1: ffff888077e75da8 (&type->i_mutex_dir_key#4){++++}-{3:3}, at: inode_lock include/linux/fs.h:777 [inline] #1: ffff888077e75da8 (&type->i_mutex_dir_key#4){++++}-{3:3}, at: vfs_setxattr+0x1e8/0x440 fs/xattr.c:300 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1dc/0x2d8 lib/dump_stack.c:106 nmi_cpu_backtrace+0x45f/0x490 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x16a/0x280 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:212 [inline] watchdog+0xc82/0xcd0 kernel/hung_task.c:369 kthread+0x2a3/0x2d0 kernel/kthread.c:377 ret_from_fork+0x1f/0x30 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 5618 Comm: kworker/u4:27 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:lookup_chain_cache kernel/locking/lockdep.c:3695 [inline] RIP: 0010:lookup_chain_cache_add kernel/locking/lockdep.c:3714 [inline] RIP: 0010:validate_chain+0x1c3/0x8240 kernel/locking/lockdep.c:3769 Code: 83 c3 f8 75 15 eb 5a 48 8b 03 48 8d 58 f8 48 85 c0 48 0f 44 d8 48 85 db 74 47 4c 8d 7b 18 4c 89 f8 48 c1 e8 03 42 80 3c 20 00 <74> 08 4c 89 ff e8 c3 7b 69 00 49 8b 07 4c 39 f0 74 1c 48 83 c3 08 RSP: 0018:ffffc9000fa1f180 EFLAGS: 00000046 RAX: 1ffffffff1f7205f RBX: ffffffff8fb902e0 RCX: ffffffff8167c608 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8ffe0e30 RBP: ffffc9000fa1f490 R08: dffffc0000000000 R09: fffffbfff1ffc1c7 R10: fffffbfff1ffc1c7 R11: 0000000000000000 R12: dffffc0000000000 R13: 1ffff92001f43e50 R14: 74d2cd9d99b1225f R15: ffffffff8fb902f8 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c00ffb04b0 CR3: 000000000c88e000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __lock_acquire+0x1382/0x2b00 kernel/locking/lockdep.c:5027 lock_acquire+0x19f/0x4d0 kernel/locking/lockdep.c:5639 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:349 [inline] __get_locked_pte+0x2ad/0x390 mm/memory.c:1745 get_locked_pte include/linux/mm.h:2128 [inline] __text_poke+0x280/0x9f0 arch/x86/kernel/alternative.c:1000 text_poke arch/x86/kernel/alternative.c:1083 [inline] text_poke_bp_batch+0x487/0x920 arch/x86/kernel/alternative.c:1313 text_poke_flush arch/x86/kernel/alternative.c:1470 [inline] text_poke_finish+0x16/0x30 arch/x86/kernel/alternative.c:1477 arch_jump_label_transform_apply+0x13/0x20 arch/x86/kernel/jump_label.c:146 static_key_disable_cpuslocked+0xcc/0x1b0 kernel/jump_label.c:207 static_key_disable+0x16/0x20 kernel/jump_label.c:215 toggle_allocation_gate+0x3c8/0x460 mm/kfence/core.c:748 process_one_work+0x850/0x1130 kernel/workqueue.c:2307 worker_thread+0xab1/0x1300 kernel/workqueue.c:2454 kthread+0x2a3/0x2d0 kernel/kthread.c:377 ret_from_fork+0x1f/0x30 ---------------- Code disassembly (best guess): 0: 83 c3 f8 add $0xfffffff8,%ebx 3: 75 15 jne 0x1a 5: eb 5a jmp 0x61 7: 48 8b 03 mov (%rbx),%rax a: 48 8d 58 f8 lea -0x8(%rax),%rbx e: 48 85 c0 test %rax,%rax 11: 48 0f 44 d8 cmove %rax,%rbx 15: 48 85 db test %rbx,%rbx 18: 74 47 je 0x61 1a: 4c 8d 7b 18 lea 0x18(%rbx),%r15 1e: 4c 89 f8 mov %r15,%rax 21: 48 c1 e8 03 shr $0x3,%rax 25: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) * 2a: 74 08 je 0x34 <-- trapping instruction 2c: 4c 89 ff mov %r15,%rdi 2f: e8 c3 7b 69 00 callq 0x697bf7 34: 49 8b 07 mov (%r15),%rax 37: 4c 39 f0 cmp %r14,%rax 3a: 74 1c je 0x58 3c: 48 83 c3 08 add $0x8,%rbx