INFO: task syz-executor.4:23800 blocked for more than 143 seconds.
Not tainted 5.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.4 state:D stack:25304 pid:23800 ppid: 22508 flags:0x00004004
Call Trace:
context_switch kernel/sched/core.c:4972 [inline]
__schedule+0xa9a/0x4940 kernel/sched/core.c:6253
schedule+0xd2/0x260 kernel/sched/core.c:6326
__bio_queue_enter+0x3c5/0x6a0 block/blk-core.c:441
bio_queue_enter block/blk.h:91 [inline]
blk_mq_get_request block/blk-mq.c:2588 [inline]
blk_mq_submit_bio+0x4ae/0x22c0 block/blk-mq.c:2632
__submit_bio block/blk-core.c:849 [inline]
__submit_bio_noacct_mq block/blk-core.c:924 [inline]
submit_bio_noacct block/blk-core.c:950 [inline]
submit_bio_noacct+0x82c/0xa20 block/blk-core.c:939
submit_bio block/blk-core.c:1011 [inline]
submit_bio+0x1ea/0x430 block/blk-core.c:969
submit_bio_wait+0x106/0x230 block/bio.c:1254
blkdev_issue_flush+0xd6/0x130 block/blk-flush.c:458
blkdev_fsync+0x68/0xa0 block/fops.c:474
vfs_fsync_range+0x13a/0x220 fs/sync.c:182
generic_write_sync include/linux/fs.h:2956 [inline]
blkdev_write_iter+0x552/0x690 block/fops.c:559
call_write_iter include/linux/fs.h:2162 [inline]
do_iter_readv_writev+0x472/0x750 fs/read_write.c:725
do_iter_write+0x188/0x710 fs/read_write.c:851
vfs_iter_write+0x70/0xa0 fs/read_write.c:892
iter_file_splice_write+0x723/0xc70 fs/splice.c:689
do_splice_from fs/splice.c:767 [inline]
direct_splice_actor+0x110/0x180 fs/splice.c:936
splice_direct_to_actor+0x34b/0x8c0 fs/splice.c:891
do_splice_direct+0x1b3/0x280 fs/splice.c:979
do_sendfile+0xaf2/0x1250 fs/read_write.c:1245
__do_sys_sendfile64 fs/read_write.c:1310 [inline]
__se_sys_sendfile64 fs/read_write.c:1296 [inline]
__x64_sys_sendfile64+0x1cc/0x210 fs/read_write.c:1296
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fe43b88cae9
RSP: 002b:00007fe438de1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
RAX: ffffffffffffffda RBX: 00007fe43b9a0020 RCX: 00007fe43b88cae9
RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003
RBP: 00007fe43b8e6f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000024002da8 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffcb19b43ff R14: 00007fe438de1300 R15: 0000000000022000
INFO: task syz-executor.4:23804 blocked for more than 143 seconds.
Not tainted 5.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.4 state:D stack:27712 pid:23804 ppid: 22508 flags:0x00004004
Call Trace:
context_switch kernel/sched/core.c:4972 [inline]
__schedule+0xa9a/0x4940 kernel/sched/core.c:6253
schedule+0xd2/0x260 kernel/sched/core.c:6326
blk_mq_freeze_queue_wait+0x112/0x160 block/blk-mq.c:178
loop_set_status+0x440/0x930 drivers/block/loop.c:1264
loop_set_status_old+0x148/0x1b0 drivers/block/loop.c:1396
lo_ioctl+0x3e9/0x17c0 drivers/block/loop.c:1566
blkdev_ioctl+0x37a/0x800 block/ioctl.c:609
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:874 [inline]
__se_sys_ioctl fs/ioctl.c:860 [inline]
__x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fe43b88cae9
RSP: 002b:00007fe438dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007fe43b9a00e0 RCX: 00007fe43b88cae9
RDX: 0000000020000940 RSI: 0000000000004c02 RDI: 0000000000000003
RBP: 00007fe43b8e6f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffcb19b43ff R14: 00007fe438dc0300 R15: 0000000000022000
Showing all locks held in the system:
1 lock held by kworker/1:0/20:
#0: ffff8880b9d39a98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478
1 lock held by khungtaskd/27:
#0: ffffffff8bb83a60 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6458
2 locks held by systemd-udevd/2971:
#0: ffff88801a5bd118 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev.part.0+0x9b/0xb50 block/bdev.c:819
#1: ffff88801a5b8b60 (&lo->lo_mutex){+.+.}-{3:3}, at: lo_open+0x75/0x120 drivers/block/loop.c:1733
2 locks held by in:imklog/6204:
#0: ffff88801c2eaff0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990
#1: ffffffff9073bbd8 (&obj_hash[i].lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478
2 locks held by agetty/6225:
#0: ffff88801a334098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:252
#1: ffffc900030332e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xcf0/0x1230 drivers/tty/n_tty.c:2113
1 lock held by syz-executor.4/23804:
#0: ffff88801a5b8b60 (&lo->lo_mutex){+.+.}-{3:3}, at: loop_set_status+0x2a/0x930 drivers/block/loop.c:1248
=============================================
NMI backtrace for cpu 1
CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.16.0-rc1-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:105
nmi_trigger_cpumask_backtrace+0x1ae/0x220 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline]
watchdog+0xc1d/0xf50 kernel/hung_task.c:295
kthread+0x405/0x4f0 kernel/kthread.c:327
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 1038 Comm: kworker/u4:4 Not tainted 5.16.0-rc1-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: phy35 ieee80211_iface_work
RIP: 0010:unwind_next_frame+0x672/0x1ce0 arch/x86/kernel/unwind_orc.c:530
Code: fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 8f 10 00 00 41 0f b6 40 04 83 e0 0f 3c 09 0f 84 b0 0d 00 00 41 0f b6 40 05 83 e0 03 3c 01 <0f> 84 23 09 00 00 3c 02 0f 84 7f 08 00 00 84 c0 0f 84 31 06 00 00
RSP: 0018:ffffc90004b9f418 EFLAGS: 00000297
RAX: 0000000000000000 RBX: 1ffff92000973e8b RCX: ffffffff8e999241
RDX: ffffc90004b9fca8 RSI: 0000000000000000 RDI: 0000000000000001
RBP: 0000000000000001 R08: ffffffff8e99923c R09: 0000000000000001
R10: fffff52000973ea9 R11: 000000000008808a R12: ffffc90004b9f538
R13: ffffc90004b9f525 R14: ffffc90004b9f4f0 R15: ffffffff8e999240
FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0cf2bbb000 CR3: 0000000071e68000 CR4: 0000000000350ef0
Call Trace:
arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:122
kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38
kasan_set_track mm/kasan/common.c:46 [inline]
set_alloc_info mm/kasan/common.c:434 [inline]
____kasan_kmalloc mm/kasan/common.c:513 [inline]
____kasan_kmalloc mm/kasan/common.c:472 [inline]
__kasan_kmalloc+0xa9/0xd0 mm/kasan/common.c:522
kmalloc include/linux/slab.h:595 [inline]
ieee802_11_parse_elems_crc+0x14d/0x1050 net/mac80211/util.c:1477
ieee802_11_parse_elems net/mac80211/ieee80211_i.h:2208 [inline]
ieee80211_bss_info_update+0x42c/0xb30 net/mac80211/scan.c:212
ieee80211_rx_bss_info net/mac80211/ibss.c:1119 [inline]
ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1610 [inline]
ieee80211_ibss_rx_queued_mgmt+0x19cf/0x3130 net/mac80211/ibss.c:1639
ieee80211_iface_process_skb net/mac80211/iface.c:1466 [inline]
ieee80211_iface_work+0xa65/0xd00 net/mac80211/iface.c:1520
process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298
worker_thread+0x658/0x11f0 kernel/workqueue.c:2445
kthread+0x405/0x4f0 kernel/kthread.c:327
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
----------------
Code disassembly (best guess):
0: fa cli
1: 83 e2 07 and $0x7,%edx
4: 38 d0 cmp %dl,%al
6: 7f 08 jg 0x10
8: 84 c0 test %al,%al
a: 0f 85 8f 10 00 00 jne 0x109f
10: 41 0f b6 40 04 movzbl 0x4(%r8),%eax
15: 83 e0 0f and $0xf,%eax
18: 3c 09 cmp $0x9,%al
1a: 0f 84 b0 0d 00 00 je 0xdd0
20: 41 0f b6 40 05 movzbl 0x5(%r8),%eax
25: 83 e0 03 and $0x3,%eax
28: 3c 01 cmp $0x1,%al
* 2a: 0f 84 23 09 00 00 je 0x953 <-- trapping instruction
30: 3c 02 cmp $0x2,%al
32: 0f 84 7f 08 00 00 je 0x8b7
38: 84 c0 test %al,%al
3a: 0f 84 31 06 00 00 je 0x671