INFO: task syz-executor.3:21902 blocked for more than 143 seconds. Not tainted 5.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.3 state:D stack:27568 pid:21902 ppid: 6585 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:4940 [inline] __schedule+0xb44/0x5960 kernel/sched/core.c:6287 schedule+0xd3/0x270 kernel/sched/core.c:6366 schedule_timeout+0x1db/0x2a0 kernel/time/timer.c:1857 do_wait_for_common kernel/sched/completion.c:85 [inline] __wait_for_common kernel/sched/completion.c:106 [inline] wait_for_common kernel/sched/completion.c:117 [inline] wait_for_completion+0x176/0x280 kernel/sched/completion.c:138 __synchronize_srcu+0x1f4/0x290 kernel/rcu/srcutree.c:930 install_new_memslots+0x312/0x570 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1463 kvm_set_memslot+0xdfe/0x1a40 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1597 __kvm_set_memory_region+0xc1c/0x13d0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1755 kvm_set_memory_region arch/x86/kvm/../../../virt/kvm/kvm_main.c:1776 [inline] kvm_vm_ioctl_set_memory_region arch/x86/kvm/../../../virt/kvm/kvm_main.c:1788 [inline] kvm_vm_ioctl+0x520/0x23d0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:4363 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f72af56a7f7 RSP: 002b:00007f72aecde5f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00007f72af56a7f7 RDX: 00007f72aecded30 RSI: 000000004020ae46 RDI: 0000000000000004 RBP: 0000000000000004 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000fec00000 R13: 00007f72aecded30 R14: 0000000000000005 R15: 0000000020004000 Showing all locks held in the system: 1 lock held by khungtaskd/26: #0: ffffffff8b981b20 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446 1 lock held by in:imklog/6247: #0: ffff88801ad5b270 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990 1 lock held by syz-executor.3/21902: #0: ffffc900042010a8 (&kvm->slots_lock){+.+.}-{3:3}, at: kvm_set_memory_region arch/x86/kvm/../../../virt/kvm/kvm_main.c:1775 [inline] #0: ffffc900042010a8 (&kvm->slots_lock){+.+.}-{3:3}, at: kvm_vm_ioctl_set_memory_region arch/x86/kvm/../../../virt/kvm/kvm_main.c:1788 [inline] #0: ffffc900042010a8 (&kvm->slots_lock){+.+.}-{3:3}, at: kvm_vm_ioctl+0x515/0x23d0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:4363 3 locks held by syz-executor.3/21927: ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 26 Comm: khungtaskd Not tainted 5.15.0-rc7-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1ae/0x220 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xc1d/0xf50 kernel/hung_task.c:295 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 8652 Comm: systemd-udevd Not tainted 5.15.0-rc7-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:tomoyo_check_acl+0xc1/0x450 security/tomoyo/domain.c:173 Code: 05 5c d5 fd 48 8d 7b 18 48 89 f8 48 89 fa 48 c1 e8 03 83 e2 07 0f b6 04 28 38 d0 7f 08 84 c0 0f 85 f7 02 00 00 44 0f b6 73 18 <31> ff 44 89 f6 e8 15 62 d5 fd 45 84 f6 0f 85 61 01 00 00 e8 c7 5b RSP: 0018:ffffc9000ce779a0 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffff888026be4b80 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff83a1910b RDI: ffff888026be4b98 RBP: dffffc0000000000 R08: 000000001239612f R09: 0000000000000001 R10: ffffffff83a19191 R11: 0000000000000000 R12: ffffc9000ce77a80 R13: ffff88801b071290 R14: 0000000000000000 R15: 0000000000000001 FS: 00007fa447f6a8c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb90b41f000 CR3: 000000001f171000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: tomoyo_path2_perm+0x41c/0x6b0 security/tomoyo/file.c:942 tomoyo_path_rename+0xd2/0x130 security/tomoyo/tomoyo.c:278 security_path_rename+0x1b5/0x2e0 security/security.c:1190 do_renameat2+0x472/0xc80 fs/namei.c:4766 __do_sys_rename fs/namei.c:4825 [inline] __se_sys_rename fs/namei.c:4823 [inline] __x64_sys_rename+0x7d/0xa0 fs/namei.c:4823 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fa446d65d47 Code: 75 12 48 89 df e8 19 84 07 00 85 c0 0f 95 c0 0f b6 c0 f7 d8 5b c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 b8 52 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 21 41 33 00 f7 d8 64 89 01 48 RSP: 002b:00007ffeec16a5d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 RAX: ffffffffffffffda RBX: 000055b325745550 RCX: 00007fa446d65d47 RDX: 0000000000000000 RSI: 00007ffeec16a5e0 RDI: 000055b325732870 RBP: 00007ffeec16a6a0 R08: 000055b3257464c0 R09: 000055b3257463e0 R10: 00007fa447f6a8c0 R11: 0000000000000246 R12: 00007ffeec16a5e0 R13: 0000000000000001 R14: 000055b3241416cb R15: 0000000000000000 ---------------- Code disassembly (best guess): 0: 05 5c d5 fd 48 add $0x48fdd55c,%eax 5: 8d 7b 18 lea 0x18(%rbx),%edi 8: 48 89 f8 mov %rdi,%rax b: 48 89 fa mov %rdi,%rdx e: 48 c1 e8 03 shr $0x3,%rax 12: 83 e2 07 and $0x7,%edx 15: 0f b6 04 28 movzbl (%rax,%rbp,1),%eax 19: 38 d0 cmp %dl,%al 1b: 7f 08 jg 0x25 1d: 84 c0 test %al,%al 1f: 0f 85 f7 02 00 00 jne 0x31c 25: 44 0f b6 73 18 movzbl 0x18(%rbx),%r14d * 2a: 31 ff xor %edi,%edi <-- trapping instruction 2c: 44 89 f6 mov %r14d,%esi 2f: e8 15 62 d5 fd callq 0xfdd56249 34: 45 84 f6 test %r14b,%r14b 37: 0f 85 61 01 00 00 jne 0x19e 3d: e8 .byte 0xe8 3e: c7 (bad) 3f: 5b pop %rbx