INFO: task syz-executor.0:9325 blocked for more than 143 seconds.
Not tainted 5.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.0 state:D stack:28600 pid: 9325 ppid: 6550 flags:0x00004004
Call Trace:
context_switch kernel/sched/core.c:4972 [inline]
__schedule+0xa9a/0x4940 kernel/sched/core.c:6253
schedule+0xd2/0x260 kernel/sched/core.c:6326
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6385
__mutex_lock_common kernel/locking/mutex.c:680 [inline]
__mutex_lock+0xa32/0x12f0 kernel/locking/mutex.c:740
io_ring_ctx_wait_and_kill+0x72/0x322 fs/io_uring.c:9565
io_uring_release+0x42/0x46 fs/io_uring.c:9594
__fput+0x286/0x9f0 fs/file_table.c:280
task_work_run+0xdd/0x1a0 kernel/task_work.c:164
tracehook_notify_resume include/linux/tracehook.h:189 [inline]
exit_to_user_mode_loop kernel/entry/common.c:175 [inline]
exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f393cb76b32
RSP: 002b:00007f393a0cb0f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009
RAX: 0000000020ee7000 RBX: 0000000000008011 RCX: 00007f393cb76b32
RDX: 0000000000000003 RSI: 0000000000020000 RDI: 0000000020ee7000
RBP: 0000000020ee7000 R08: 0000000000000006 R09: 0000000010000000
R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020000000
R13: 0000000020ee7000 R14: 00000000200014c0 R15: 0000000020ffc000
Showing all locks held in the system:
1 lock held by khungtaskd/27:
#0: ffffffff8bb81120 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6458
1 lock held by in:imklog/6220:
#0: ffff8880790185f0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990
1 lock held by systemd-udevd/10252:
#0: ffff88807dee8460 (sb_writers#3){.+.+}-{0:0}, at: do_renameat2+0x37b/0xc80 fs/namei.c:4713
1 lock held by systemd-udevd/10376:
#0: ffff8880b9d39b18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478
3 locks held by systemd-udevd/10778:
#0: ffff8880b9d39b18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478
#1: ffff8880b9d39b18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478
#2: ffff8880b9d39b18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478
1 lock held by systemd-udevd/20816:
#0: ffff8880b9d39b18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478
2 locks held by kworker/u4:8/4350:
#0: ffff8880b9c39b18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478
#1: ffff8880b9c279c8 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x3a6/0x490 kernel/sched/psi.c:880
1 lock held by syz-executor.0/9322:
1 lock held by syz-executor.0/9325:
#0: ffff888066a6e0a8 (&ctx->uring_lock){+.+.}-{3:3}, at: io_ring_ctx_wait_and_kill+0x72/0x322 fs/io_uring.c:9565
2 locks held by syz-executor.0/9342:
=============================================
NMI backtrace for cpu 0
CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.16.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111
nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline]
watchdog+0xc1d/0xf50 kernel/hung_task.c:295
kthread+0x405/0x4f0 kernel/kthread.c:327
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 2958 Comm: systemd-journal Not tainted 5.16.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:security_inode_permission+0x2/0xf0 security/security.c:1311
Code: e0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 37 2f 1f fe e9 58 ff ff ff e8 3d 2f 1f fe eb a2 48 89 df e8 33 2f 1f fe eb c7 90 41 56 <41> 89 f6 41 55 49 89 fd 41 54 55 53 e8 7d f4 d8 fd 49 8d 7d 0c 48
RSP: 0018:ffffc90001f57a88 EFLAGS: 00000293
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffff88807776a1c0 RSI: 0000000000000081 RDI: ffff8880201112e0
RBP: ffff8880201112e0 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff81caca30 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000081 R14: ffffffff8ba3eb20 R15: ffff8880201112e2
FS: 00007f182ff928c0(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f182cd91000 CR3: 00000000771d9000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
inode_permission.part.0+0x119/0x440 fs/namei.c:532
inode_permission fs/namei.c:505 [inline]
may_lookup fs/namei.c:1683 [inline]
link_path_walk.part.0+0x277/0xd00 fs/namei.c:2239
link_path_walk fs/namei.c:2222 [inline]
path_parentat+0xb1/0x1c0 fs/namei.c:2496
filename_parentat+0x1bb/0x5a0 fs/namei.c:2519
filename_create+0xa1/0x480 fs/namei.c:3637
do_mkdirat+0x94/0x300 fs/namei.c:3898
__do_sys_mkdir fs/namei.c:3929 [inline]
__se_sys_mkdir fs/namei.c:3927 [inline]
__x64_sys_mkdir+0xf2/0x140 fs/namei.c:3927
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f182f24d687
Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48
RSP: 002b:00007ffef5d2cd78 EFLAGS: 00000293 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 00007ffef5d2fc90 RCX: 00007f182f24d687
RDX: 00007f182fcbea00 RSI: 00000000000001ed RDI: 000055880f8508c0
RBP: 00007ffef5d2cdb0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000
R13: 0000000000000000 R14: 00007ffef5d2fc90 R15: 00007ffef5d2d2a0
----------------
Code disassembly (best guess):
0: e0 5b loopne 0x5d
2: 5d pop %rbp
3: 41 5c pop %r12
5: 41 5d pop %r13
7: 41 5e pop %r14
9: 41 5f pop %r15
b: c3 retq
c: e8 37 2f 1f fe callq 0xfe1f2f48
11: e9 58 ff ff ff jmpq 0xffffff6e
16: e8 3d 2f 1f fe callq 0xfe1f2f58
1b: eb a2 jmp 0xffffffbf
1d: 48 89 df mov %rbx,%rdi
20: e8 33 2f 1f fe callq 0xfe1f2f58
25: eb c7 jmp 0xffffffee
27: 90 nop
28: 41 56 push %r14
* 2a: 41 89 f6 mov %esi,%r14d <-- trapping instruction
2d: 41 55 push %r13
2f: 49 89 fd mov %rdi,%r13
32: 41 54 push %r12
34: 55 push %rbp
35: 53 push %rbx
36: e8 7d f4 d8 fd callq 0xfdd8f4b8
3b: 49 8d 7d 0c lea 0xc(%r13),%rdi
3f: 48 rex.W