INFO: task syz-executor.2:27764 blocked for more than 143 seconds.
Not tainted 5.15.0-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.2 state:D stack:27672 pid:27764 ppid: 6512 flags:0x00000004
Call Trace:
context_switch kernel/sched/core.c:4969 [inline]
__schedule+0xa9a/0x4940 kernel/sched/core.c:6250
schedule+0xd2/0x260 kernel/sched/core.c:6323
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6382
__mutex_lock_common kernel/locking/mutex.c:680 [inline]
__mutex_lock+0xa32/0x12f0 kernel/locking/mutex.c:740
tls_sw_sendmsg+0x245/0x17f0 net/tls/tls_sw.c:957
inet6_sendmsg+0x99/0xe0 net/ipv6/af_inet6.c:644
sock_sendmsg_nosec net/socket.c:704 [inline]
sock_sendmsg+0xcf/0x120 net/socket.c:724
sock_write_iter+0x289/0x3c0 net/socket.c:1057
call_write_iter include/linux/fs.h:2161 [inline]
new_sync_write+0x429/0x660 fs/read_write.c:503
vfs_write+0x7cd/0xae0 fs/read_write.c:590
ksys_write+0x1ee/0x250 fs/read_write.c:643
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f4e95706ae9
RSP: 002b:00007f4e92c5b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007f4e9581a020 RCX: 00007f4e95706ae9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007f4e95760f25 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fff41ff7ecf R14: 00007f4e92c5b300 R15: 0000000000022000
Showing all locks held in the system:
1 lock held by khungtaskd/27:
#0: ffffffff8b982da0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446
3 locks held by kworker/1:5/25969:
#0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]
#0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: arch_atomic_long_set include/linux/atomic/atomic-long.h:41 [inline]
#0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: atomic_long_set include/linux/atomic/atomic-instrumented.h:1198 [inline]
#0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:634 [inline]
#0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:661 [inline]
#0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x896/0x1690 kernel/workqueue.c:2268
#1: ffffc90003a4fdb0 ((work_completion)(&(&sw_ctx_tx->tx_work.work)->work)){+.+.}-{0:0}, at: process_one_work+0x8ca/0x1690 kernel/workqueue.c:2272
#2: ffff88807e1494d8 (&ctx->tx_lock){+.+.}-{3:3}, at: tx_work_handler+0x127/0x190 net/tls/tls_sw.c:2283
1 lock held by syz-executor.2/27764:
#0: ffff88807e1494d8 (&ctx->tx_lock){+.+.}-{3:3}, at: tls_sw_sendmsg+0x245/0x17f0 net/tls/tls_sw.c:957
=============================================
NMI backtrace for cpu 1
CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:105
nmi_trigger_cpumask_backtrace+0x1ae/0x220 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline]
watchdog+0xc1d/0xf50 kernel/hung_task.c:295
kthread+0x405/0x4f0 kernel/kthread.c:327
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 2935 Comm: systemd-journal Not tainted 5.15.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__lock_acquire+0x1022/0x54a0 kernel/locking/lockdep.c:4985
Code: 10 be 08 00 00 00 48 8d 43 3f 48 85 db 48 0f 49 c3 48 c1 f8 06 48 8d 3c c5 00 8a d3 8f e8 e6 98 61 00 48 0f a3 1d 2e 3f 77 0e <0f> 82 c7 f8 ff ff e8 a3 89 79 02 85 c0 0f 84 f1 fd ff ff 48 c7 c0
RSP: 0018:ffffc90002bbfaa0 EFLAGS: 00000047
RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff815c4aca
RDX: fffffbfff1fa7141 RSI: 0000000000000008 RDI: ffffffff8fd38a00
RBP: ffff88807beac482 R08: 0000000000000000 R09: ffffffff8fd38a07
R10: fffffbfff1fa7140 R11: 000000000000003f R12: ffff88807beac460
R13: ffff88807beaba00 R14: 0000000000000000 R15: 0000000000000002
FS: 00007f1c399d98c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1c3682c020 CR3: 000000001b82f000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
lock_acquire kernel/locking/lockdep.c:5625 [inline]
lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5590
__raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
_raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162
__debug_check_no_obj_freed lib/debugobjects.c:980 [inline]
debug_check_no_obj_freed+0xc7/0x420 lib/debugobjects.c:1023
slab_free_hook mm/slub.c:1675 [inline]
slab_free_freelist_hook+0xeb/0x1c0 mm/slub.c:1726
slab_free mm/slub.c:3492 [inline]
kmem_cache_free+0x95/0x5d0 mm/slub.c:3508
putname fs/namei.c:270 [inline]
putname+0xfe/0x140 fs/namei.c:256
do_mkdirat+0x1cd/0x300 fs/namei.c:3918
__do_sys_mkdir fs/namei.c:3929 [inline]
__se_sys_mkdir fs/namei.c:3927 [inline]
__x64_sys_mkdir+0xf2/0x140 fs/namei.c:3927
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f1c38c94687
Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48
RSP: 002b:00007ffe0612bff8 EFLAGS: 00000293 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 00007ffe0612f060 RCX: 00007f1c38c94687
RDX: 0000000000000000 RSI: 00000000000001ed RDI: 0000557a111268a0
RBP: 00007ffe0612c030 R08: 0000557a103213e5 R09: 0000000000000018
R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000
R13: 0000000000000001 R14: 0000557a111268a0 R15: 00007ffe0612c670
----------------
Code disassembly (best guess):
0: 10 be 08 00 00 00 adc %bh,0x8(%rsi)
6: 48 8d 43 3f lea 0x3f(%rbx),%rax
a: 48 85 db test %rbx,%rbx
d: 48 0f 49 c3 cmovns %rbx,%rax
11: 48 c1 f8 06 sar $0x6,%rax
15: 48 8d 3c c5 00 8a d3 lea -0x702c7600(,%rax,8),%rdi
1c: 8f
1d: e8 e6 98 61 00 callq 0x619908
22: 48 0f a3 1d 2e 3f 77 bt %rbx,0xe773f2e(%rip) # 0xe773f58
29: 0e
* 2a: 0f 82 c7 f8 ff ff jb 0xfffff8f7 <-- trapping instruction
30: e8 a3 89 79 02 callq 0x27989d8
35: 85 c0 test %eax,%eax
37: 0f 84 f1 fd ff ff je 0xfffffe2e
3d: 48 rex.W
3e: c7 .byte 0xc7
3f: c0 .byte 0xc0