INFO: task syz-executor.1:18116 blocked for more than 143 seconds. Not tainted 5.14.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.1 state:D stack:28176 pid:18116 ppid: 8453 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:4683 [inline] __schedule+0x93a/0x26f0 kernel/sched/core.c:5940 schedule+0xd3/0x270 kernel/sched/core.c:6019 schedule_timeout+0x1db/0x2a0 kernel/time/timer.c:1854 do_wait_for_common kernel/sched/completion.c:85 [inline] __wait_for_common kernel/sched/completion.c:106 [inline] wait_for_common kernel/sched/completion.c:117 [inline] wait_for_completion+0x176/0x280 kernel/sched/completion.c:138 _destroy_id+0x41f/0x7d0 drivers/infiniband/core/cma.c:1855 ucma_close_id drivers/infiniband/core/ucma.c:185 [inline] ucma_destroy_private_ctx+0x8b3/0xb70 drivers/infiniband/core/ucma.c:576 ucma_close+0x10a/0x180 drivers/infiniband/core/ucma.c:1797 __fput+0x288/0x920 fs/file_table.c:280 task_work_run+0xdd/0x1a0 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop kernel/entry/common.c:175 [inline] exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:209 __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:302 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x4193fb RSP: 002b:00007ffc70e55ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004193fb RDX: 0000000000000000 RSI: ffffffff8432d12c RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b2c0215dc R10: 0000000000000006 R11: 0000000000000293 R12: 000000000056cb00 R13: 000000000056cb00 R14: 000000000056bf80 R15: 00000000000593cc Showing all locks held in the system: 1 lock held by khungtaskd/1632: #0: ffffffff8b97b9c0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446 2 locks held by in:imklog/8146: #0: ffff8880279605f0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:974 #1: ffffffff9025b7d0 (&meta->lock){..-.}-{2:2}, at: kfence_guarded_alloc mm/kfence/core.c:274 [inline] #1: ffffffff9025b7d0 (&meta->lock){..-.}-{2:2}, at: __kfence_alloc+0x3bf/0xc20 mm/kfence/core.c:763 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1632 Comm: khungtaskd Not tainted 5.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:105 nmi_cpu_backtrace.cold+0x44/0xd7 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xd0a/0xfc0 kernel/hung_task.c:295 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 14703 Comm: kworker/u4:12 Not tainted 5.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: phy8 ieee80211_iface_work RIP: 0010:unwind_next_frame+0x829/0x1ce0 arch/x86/kernel/unwind_orc.c:466 Code: 83 e0 07 40 38 c6 40 0f 9e c7 40 84 f6 0f 95 c0 40 84 c7 0f 85 bc 0f 00 00 49 0f bf 30 48 01 d6 48 89 74 24 60 e9 d8 fd ff ff <48> b8 00 00 00 00 00 fc ff df 48 8b 54 24 08 48 c1 ea 03 80 3c 02 RSP: 0018:ffffc90015d26c68 EFLAGS: 00000297 RAX: 0000000000000005 RBX: 1ffff92002ba4d95 RCX: ffffffff8e71987d RDX: 0000000000000005 RSI: 0000000000000001 RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffff8e719878 R09: ffffffff8e719878 R10: fffff52002ba4db3 R11: 0000000000086088 R12: ffffc90015d26d88 R13: ffffc90015d26d75 R14: ffffc90015d26d40 R15: ffffffff8e71987c FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd277ddb040 CR3: 000000002d373000 CR4: 0000000000350ef0 Call Trace: arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:121 kasan_save_stack+0x1b/0x40 mm/kasan/common.c:38 kasan_set_track+0x1c/0x30 mm/kasan/common.c:46 kasan_set_free_info+0x20/0x30 mm/kasan/generic.c:360 ____kasan_slab_free mm/kasan/common.c:366 [inline] ____kasan_slab_free mm/kasan/common.c:328 [inline] __kasan_slab_free+0xfb/0x130 mm/kasan/common.c:374 kasan_slab_free include/linux/kasan.h:230 [inline] slab_free_hook mm/slub.c:1625 [inline] slab_free_freelist_hook+0xdf/0x240 mm/slub.c:1650 slab_free mm/slub.c:3210 [inline] kfree+0xeb/0x650 mm/slub.c:4262 ieee802_11_parse_elems_crc+0xac2/0xfe0 net/mac80211/util.c:1505 ieee802_11_parse_elems net/mac80211/ieee80211_i.h:2186 [inline] ieee80211_bss_info_update+0x463/0xb70 net/mac80211/scan.c:212 ieee80211_rx_bss_info net/mac80211/ibss.c:1126 [inline] ieee80211_rx_mgmt_probe_beacon+0xcc6/0x17c0 net/mac80211/ibss.c:1615 ieee80211_ibss_rx_queued_mgmt+0xd30/0x1610 net/mac80211/ibss.c:1642 ieee80211_iface_process_skb net/mac80211/iface.c:1426 [inline] ieee80211_iface_work+0x7f7/0xa40 net/mac80211/iface.c:1462 process_one_work+0x98d/0x1630 kernel/workqueue.c:2276 worker_thread+0x658/0x11f0 kernel/workqueue.c:2422 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295