INFO: task syz-executor.0:9325 blocked for more than 143 seconds. Not tainted 5.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.0 state:D stack:28600 pid: 9325 ppid: 6550 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:4972 [inline] __schedule+0xa9a/0x4940 kernel/sched/core.c:6253 schedule+0xd2/0x260 kernel/sched/core.c:6326 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6385 __mutex_lock_common kernel/locking/mutex.c:680 [inline] __mutex_lock+0xa32/0x12f0 kernel/locking/mutex.c:740 io_ring_ctx_wait_and_kill+0x72/0x322 fs/io_uring.c:9565 io_uring_release+0x42/0x46 fs/io_uring.c:9594 __fput+0x286/0x9f0 fs/file_table.c:280 task_work_run+0xdd/0x1a0 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop kernel/entry/common.c:175 [inline] exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f393cb76b32 RSP: 002b:00007f393a0cb0f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 RAX: 0000000020ee7000 RBX: 0000000000008011 RCX: 00007f393cb76b32 RDX: 0000000000000003 RSI: 0000000000020000 RDI: 0000000020ee7000 RBP: 0000000020ee7000 R08: 0000000000000006 R09: 0000000010000000 R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020000000 R13: 0000000020ee7000 R14: 00000000200014c0 R15: 0000000020ffc000 Showing all locks held in the system: 1 lock held by khungtaskd/27: #0: ffffffff8bb81120 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6458 1 lock held by in:imklog/6220: #0: ffff8880790185f0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990 1 lock held by systemd-udevd/10252: #0: ffff88807dee8460 (sb_writers#3){.+.+}-{0:0}, at: do_renameat2+0x37b/0xc80 fs/namei.c:4713 1 lock held by systemd-udevd/10376: #0: ffff8880b9d39b18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478 3 locks held by systemd-udevd/10778: #0: ffff8880b9d39b18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478 #1: ffff8880b9d39b18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478 #2: ffff8880b9d39b18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478 1 lock held by systemd-udevd/20816: #0: ffff8880b9d39b18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478 2 locks held by kworker/u4:8/4350: #0: ffff8880b9c39b18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478 #1: ffff8880b9c279c8 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x3a6/0x490 kernel/sched/psi.c:880 1 lock held by syz-executor.0/9322: 1 lock held by syz-executor.0/9325: #0: ffff888066a6e0a8 (&ctx->uring_lock){+.+.}-{3:3}, at: io_ring_ctx_wait_and_kill+0x72/0x322 fs/io_uring.c:9565 2 locks held by syz-executor.0/9342: ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.16.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xc1d/0xf50 kernel/hung_task.c:295 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 2958 Comm: systemd-journal Not tainted 5.16.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:security_inode_permission+0x2/0xf0 security/security.c:1311 Code: e0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 37 2f 1f fe e9 58 ff ff ff e8 3d 2f 1f fe eb a2 48 89 df e8 33 2f 1f fe eb c7 90 41 56 <41> 89 f6 41 55 49 89 fd 41 54 55 53 e8 7d f4 d8 fd 49 8d 7d 0c 48 RSP: 0018:ffffc90001f57a88 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff88807776a1c0 RSI: 0000000000000081 RDI: ffff8880201112e0 RBP: ffff8880201112e0 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff81caca30 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000081 R14: ffffffff8ba3eb20 R15: ffff8880201112e2 FS: 00007f182ff928c0(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f182cd91000 CR3: 00000000771d9000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: inode_permission.part.0+0x119/0x440 fs/namei.c:532 inode_permission fs/namei.c:505 [inline] may_lookup fs/namei.c:1683 [inline] link_path_walk.part.0+0x277/0xd00 fs/namei.c:2239 link_path_walk fs/namei.c:2222 [inline] path_parentat+0xb1/0x1c0 fs/namei.c:2496 filename_parentat+0x1bb/0x5a0 fs/namei.c:2519 filename_create+0xa1/0x480 fs/namei.c:3637 do_mkdirat+0x94/0x300 fs/namei.c:3898 __do_sys_mkdir fs/namei.c:3929 [inline] __se_sys_mkdir fs/namei.c:3927 [inline] __x64_sys_mkdir+0xf2/0x140 fs/namei.c:3927 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f182f24d687 Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffef5d2cd78 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007ffef5d2fc90 RCX: 00007f182f24d687 RDX: 00007f182fcbea00 RSI: 00000000000001ed RDI: 000055880f8508c0 RBP: 00007ffef5d2cdb0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ffef5d2fc90 R15: 00007ffef5d2d2a0 ---------------- Code disassembly (best guess): 0: e0 5b loopne 0x5d 2: 5d pop %rbp 3: 41 5c pop %r12 5: 41 5d pop %r13 7: 41 5e pop %r14 9: 41 5f pop %r15 b: c3 retq c: e8 37 2f 1f fe callq 0xfe1f2f48 11: e9 58 ff ff ff jmpq 0xffffff6e 16: e8 3d 2f 1f fe callq 0xfe1f2f58 1b: eb a2 jmp 0xffffffbf 1d: 48 89 df mov %rbx,%rdi 20: e8 33 2f 1f fe callq 0xfe1f2f58 25: eb c7 jmp 0xffffffee 27: 90 nop 28: 41 56 push %r14 * 2a: 41 89 f6 mov %esi,%r14d <-- trapping instruction 2d: 41 55 push %r13 2f: 49 89 fd mov %rdi,%r13 32: 41 54 push %r12 34: 55 push %rbp 35: 53 push %rbx 36: e8 7d f4 d8 fd callq 0xfdd8f4b8 3b: 49 8d 7d 0c lea 0xc(%r13),%rdi 3f: 48 rex.W