INFO: task syz-executor238:4345 blocked for more than 143 seconds. Not tainted 5.17.0-rc5-syzkaller-00006-g917bbdb107f8 #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor238 state:D stack:25136 pid: 4345 ppid: 3649 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:4995 [inline] __schedule+0x926/0x1080 kernel/sched/core.c:6304 schedule+0x12b/0x1f0 kernel/sched/core.c:6377 schedule_timeout+0xac/0x300 kernel/time/timer.c:1857 do_wait_for_common+0x2da/0x480 kernel/sched/completion.c:85 __wait_for_common kernel/sched/completion.c:106 [inline] wait_for_common kernel/sched/completion.c:117 [inline] wait_for_completion+0x46/0x60 kernel/sched/completion.c:138 kthread_stop+0xf8/0x200 kernel/kthread.c:709 ext4_stop_mmpd+0x43/0xb0 fs/ext4/mmp.c:255 __ext4_fill_super+0x9b13/0xf6f0 fs/ext4/super.c:5505 ext4_fill_super+0x30d/0x6f0 fs/ext4/super.c:5554 get_tree_bdev+0x406/0x630 fs/super.c:1292 vfs_get_tree+0x86/0x270 fs/super.c:1497 do_new_mount fs/namespace.c:3024 [inline] path_mount+0x1986/0x2c30 fs/namespace.c:3354 do_mount fs/namespace.c:3367 [inline] __do_sys_mount fs/namespace.c:3575 [inline] __se_sys_mount+0x308/0x3c0 fs/namespace.c:3552 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5b1f2e712a RSP: 002b:00007ffe7218eb78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ffe7218ebd0 RCX: 00007f5b1f2e712a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffe7218eb90 RBP: 00007ffe7218eb90 R08: 00007ffe7218ebd0 R09: 0000000000000007 R10: 0000000000000000 R11: 0000000000000202 R12: 00000000200003f8 R13: 0000000000000003 R14: 0000000000000004 R15: 0000000000000005 Showing all locks held in the system: 1 lock held by khungtaskd/26: #0: ffffffff8cb1d460 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 1 lock held by klogd/2952: #0: ffff8880b9a39798 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x25/0x110 kernel/sched/core.c:489 2 locks held by getty/3282: #0: ffff88814ae8d098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 drivers/tty/tty_ldisc.c:244 #1: ffffc90002b662e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6c5/0x1c60 drivers/tty/n_tty.c:2075 1 lock held by syz-executor238/4345: #0: ffff888076b700e0 (&type->s_umount_key#27/1){+.+.}-{3:3}, at: alloc_super+0x1c8/0x820 fs/super.c:228 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 26 Comm: khungtaskd Not tainted 5.17.0-rc5-syzkaller-00006-g917bbdb107f8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1dc/0x2d8 lib/dump_stack.c:106 nmi_cpu_backtrace+0x45f/0x490 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x16a/0x280 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:212 [inline] watchdog+0xc82/0xcd0 kernel/hung_task.c:369 kthread+0x2a3/0x2d0 kernel/kthread.c:377 ret_from_fork+0x1f/0x30 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 49 Comm: kworker/u4:2 Not tainted 5.17.0-rc5-syzkaller-00006-g917bbdb107f8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:mark_held_locks kernel/locking/lockdep.c:4196 [inline] RIP: 0010:__trace_hardirqs_on_caller kernel/locking/lockdep.c:4224 [inline] RIP: 0010:lockdep_hardirqs_on_prepare+0x230/0x780 kernel/locking/lockdep.c:4292 Code: c0 0f 85 0f 04 00 00 41 83 7d 00 00 0f 8e e2 00 00 00 49 8d 9e 80 0a 00 00 45 31 e4 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 <49> 83 fc 31 0f 83 a2 00 00 00 48 89 d8 48 c1 e8 03 0f b6 04 10 84 RSP: 0018:ffffc9000119f6e0 EFLAGS: 00000097 RAX: 0000000000000006 RBX: ffff888012b92848 RCX: ffffffff81677091 RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffffffff8ffdbe20 RBP: ffffc9000119f7a0 R08: dffffc0000000000 R09: fffffbfff1ffb7c5 R10: fffffbfff1ffb7c5 R11: 0000000000000000 R12: 0000000000000005 R13: ffff888012b92758 R14: ffff888012b91d00 R15: 1ffff110025724eb FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000559b37272018 CR3: 000000000c88e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: trace_hardirqs_on+0x6f/0x80 kernel/trace/trace_preemptirq.c:49 __text_poke+0x7dd/0x9f0 arch/x86/kernel/alternative.c:1058 text_poke arch/x86/kernel/alternative.c:1083 [inline] text_poke_bp_batch+0x680/0x920 arch/x86/kernel/alternative.c:1364 text_poke_flush arch/x86/kernel/alternative.c:1470 [inline] text_poke_finish+0x16/0x30 arch/x86/kernel/alternative.c:1477 arch_jump_label_transform_apply+0x13/0x20 arch/x86/kernel/jump_label.c:146 static_key_enable_cpuslocked+0x12d/0x250 kernel/jump_label.c:177 static_key_enable+0x16/0x20 kernel/jump_label.c:190 toggle_allocation_gate+0xbf/0x460 mm/kfence/core.c:735 process_one_work+0x86c/0x1190 kernel/workqueue.c:2307 worker_thread+0xab1/0x1300 kernel/workqueue.c:2454 kthread+0x2a3/0x2d0 kernel/kthread.c:377 ret_from_fork+0x1f/0x30 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 0f 85 0f 04 00 00 jne 0x415 6: 41 83 7d 00 00 cmpl $0x0,0x0(%r13) b: 0f 8e e2 00 00 00 jle 0xf3 11: 49 8d 9e 80 0a 00 00 lea 0xa80(%r14),%rbx 18: 45 31 e4 xor %r12d,%r12d 1b: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) 22: 00 00 00 25: 0f 1f 40 00 nopl 0x0(%rax) * 29: 49 83 fc 31 cmp $0x31,%r12 <-- trapping instruction 2d: 0f 83 a2 00 00 00 jae 0xd5 33: 48 89 d8 mov %rbx,%rax 36: 48 c1 e8 03 shr $0x3,%rax 3a: 0f b6 04 10 movzbl (%rax,%rdx,1),%eax 3e: 84 .byte 0x84