INFO: task syz-executor.4:23800 blocked for more than 143 seconds. Not tainted 5.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.4 state:D stack:25304 pid:23800 ppid: 22508 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:4972 [inline] __schedule+0xa9a/0x4940 kernel/sched/core.c:6253 schedule+0xd2/0x260 kernel/sched/core.c:6326 __bio_queue_enter+0x3c5/0x6a0 block/blk-core.c:441 bio_queue_enter block/blk.h:91 [inline] blk_mq_get_request block/blk-mq.c:2588 [inline] blk_mq_submit_bio+0x4ae/0x22c0 block/blk-mq.c:2632 __submit_bio block/blk-core.c:849 [inline] __submit_bio_noacct_mq block/blk-core.c:924 [inline] submit_bio_noacct block/blk-core.c:950 [inline] submit_bio_noacct+0x82c/0xa20 block/blk-core.c:939 submit_bio block/blk-core.c:1011 [inline] submit_bio+0x1ea/0x430 block/blk-core.c:969 submit_bio_wait+0x106/0x230 block/bio.c:1254 blkdev_issue_flush+0xd6/0x130 block/blk-flush.c:458 blkdev_fsync+0x68/0xa0 block/fops.c:474 vfs_fsync_range+0x13a/0x220 fs/sync.c:182 generic_write_sync include/linux/fs.h:2956 [inline] blkdev_write_iter+0x552/0x690 block/fops.c:559 call_write_iter include/linux/fs.h:2162 [inline] do_iter_readv_writev+0x472/0x750 fs/read_write.c:725 do_iter_write+0x188/0x710 fs/read_write.c:851 vfs_iter_write+0x70/0xa0 fs/read_write.c:892 iter_file_splice_write+0x723/0xc70 fs/splice.c:689 do_splice_from fs/splice.c:767 [inline] direct_splice_actor+0x110/0x180 fs/splice.c:936 splice_direct_to_actor+0x34b/0x8c0 fs/splice.c:891 do_splice_direct+0x1b3/0x280 fs/splice.c:979 do_sendfile+0xaf2/0x1250 fs/read_write.c:1245 __do_sys_sendfile64 fs/read_write.c:1310 [inline] __se_sys_sendfile64 fs/read_write.c:1296 [inline] __x64_sys_sendfile64+0x1cc/0x210 fs/read_write.c:1296 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fe43b88cae9 RSP: 002b:00007fe438de1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 00007fe43b9a0020 RCX: 00007fe43b88cae9 RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 RBP: 00007fe43b8e6f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000024002da8 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcb19b43ff R14: 00007fe438de1300 R15: 0000000000022000 INFO: task syz-executor.4:23804 blocked for more than 143 seconds. Not tainted 5.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.4 state:D stack:27712 pid:23804 ppid: 22508 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:4972 [inline] __schedule+0xa9a/0x4940 kernel/sched/core.c:6253 schedule+0xd2/0x260 kernel/sched/core.c:6326 blk_mq_freeze_queue_wait+0x112/0x160 block/blk-mq.c:178 loop_set_status+0x440/0x930 drivers/block/loop.c:1264 loop_set_status_old+0x148/0x1b0 drivers/block/loop.c:1396 lo_ioctl+0x3e9/0x17c0 drivers/block/loop.c:1566 blkdev_ioctl+0x37a/0x800 block/ioctl.c:609 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fe43b88cae9 RSP: 002b:00007fe438dc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fe43b9a00e0 RCX: 00007fe43b88cae9 RDX: 0000000020000940 RSI: 0000000000004c02 RDI: 0000000000000003 RBP: 00007fe43b8e6f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcb19b43ff R14: 00007fe438dc0300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by kworker/1:0/20: #0: ffff8880b9d39a98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478 1 lock held by khungtaskd/27: #0: ffffffff8bb83a60 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6458 2 locks held by systemd-udevd/2971: #0: ffff88801a5bd118 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev.part.0+0x9b/0xb50 block/bdev.c:819 #1: ffff88801a5b8b60 (&lo->lo_mutex){+.+.}-{3:3}, at: lo_open+0x75/0x120 drivers/block/loop.c:1733 2 locks held by in:imklog/6204: #0: ffff88801c2eaff0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990 #1: ffffffff9073bbd8 (&obj_hash[i].lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478 2 locks held by agetty/6225: #0: ffff88801a334098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:252 #1: ffffc900030332e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xcf0/0x1230 drivers/tty/n_tty.c:2113 1 lock held by syz-executor.4/23804: #0: ffff88801a5b8b60 (&lo->lo_mutex){+.+.}-{3:3}, at: loop_set_status+0x2a/0x930 drivers/block/loop.c:1248 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.16.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1ae/0x220 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xc1d/0xf50 kernel/hung_task.c:295 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 1038 Comm: kworker/u4:4 Not tainted 5.16.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: phy35 ieee80211_iface_work RIP: 0010:unwind_next_frame+0x672/0x1ce0 arch/x86/kernel/unwind_orc.c:530 Code: fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 8f 10 00 00 41 0f b6 40 04 83 e0 0f 3c 09 0f 84 b0 0d 00 00 41 0f b6 40 05 83 e0 03 3c 01 <0f> 84 23 09 00 00 3c 02 0f 84 7f 08 00 00 84 c0 0f 84 31 06 00 00 RSP: 0018:ffffc90004b9f418 EFLAGS: 00000297 RAX: 0000000000000000 RBX: 1ffff92000973e8b RCX: ffffffff8e999241 RDX: ffffc90004b9fca8 RSI: 0000000000000000 RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffff8e99923c R09: 0000000000000001 R10: fffff52000973ea9 R11: 000000000008808a R12: ffffc90004b9f538 R13: ffffc90004b9f525 R14: ffffc90004b9f4f0 R15: ffffffff8e999240 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f0cf2bbb000 CR3: 0000000071e68000 CR4: 0000000000350ef0 Call Trace: arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] ____kasan_kmalloc mm/kasan/common.c:513 [inline] ____kasan_kmalloc mm/kasan/common.c:472 [inline] __kasan_kmalloc+0xa9/0xd0 mm/kasan/common.c:522 kmalloc include/linux/slab.h:595 [inline] ieee802_11_parse_elems_crc+0x14d/0x1050 net/mac80211/util.c:1477 ieee802_11_parse_elems net/mac80211/ieee80211_i.h:2208 [inline] ieee80211_bss_info_update+0x42c/0xb30 net/mac80211/scan.c:212 ieee80211_rx_bss_info net/mac80211/ibss.c:1119 [inline] ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1610 [inline] ieee80211_ibss_rx_queued_mgmt+0x19cf/0x3130 net/mac80211/ibss.c:1639 ieee80211_iface_process_skb net/mac80211/iface.c:1466 [inline] ieee80211_iface_work+0xa65/0xd00 net/mac80211/iface.c:1520 process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298 worker_thread+0x658/0x11f0 kernel/workqueue.c:2445 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 ---------------- Code disassembly (best guess): 0: fa cli 1: 83 e2 07 and $0x7,%edx 4: 38 d0 cmp %dl,%al 6: 7f 08 jg 0x10 8: 84 c0 test %al,%al a: 0f 85 8f 10 00 00 jne 0x109f 10: 41 0f b6 40 04 movzbl 0x4(%r8),%eax 15: 83 e0 0f and $0xf,%eax 18: 3c 09 cmp $0x9,%al 1a: 0f 84 b0 0d 00 00 je 0xdd0 20: 41 0f b6 40 05 movzbl 0x5(%r8),%eax 25: 83 e0 03 and $0x3,%eax 28: 3c 01 cmp $0x1,%al * 2a: 0f 84 23 09 00 00 je 0x953 <-- trapping instruction 30: 3c 02 cmp $0x2,%al 32: 0f 84 7f 08 00 00 je 0x8b7 38: 84 c0 test %al,%al 3a: 0f 84 31 06 00 00 je 0x671