INFO: task syz-executor.2:27764 blocked for more than 143 seconds. Not tainted 5.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.2 state:D stack:27672 pid:27764 ppid: 6512 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:4969 [inline] __schedule+0xa9a/0x4940 kernel/sched/core.c:6250 schedule+0xd2/0x260 kernel/sched/core.c:6323 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6382 __mutex_lock_common kernel/locking/mutex.c:680 [inline] __mutex_lock+0xa32/0x12f0 kernel/locking/mutex.c:740 tls_sw_sendmsg+0x245/0x17f0 net/tls/tls_sw.c:957 inet6_sendmsg+0x99/0xe0 net/ipv6/af_inet6.c:644 sock_sendmsg_nosec net/socket.c:704 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:724 sock_write_iter+0x289/0x3c0 net/socket.c:1057 call_write_iter include/linux/fs.h:2161 [inline] new_sync_write+0x429/0x660 fs/read_write.c:503 vfs_write+0x7cd/0xae0 fs/read_write.c:590 ksys_write+0x1ee/0x250 fs/read_write.c:643 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f4e95706ae9 RSP: 002b:00007f4e92c5b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007f4e9581a020 RCX: 00007f4e95706ae9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007f4e95760f25 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff41ff7ecf R14: 00007f4e92c5b300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/27: #0: ffffffff8b982da0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446 3 locks held by kworker/1:5/25969: #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: arch_atomic_long_set include/linux/atomic/atomic-long.h:41 [inline] #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: atomic_long_set include/linux/atomic/atomic-instrumented.h:1198 [inline] #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:634 [inline] #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:661 [inline] #0: ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x896/0x1690 kernel/workqueue.c:2268 #1: ffffc90003a4fdb0 ((work_completion)(&(&sw_ctx_tx->tx_work.work)->work)){+.+.}-{0:0}, at: process_one_work+0x8ca/0x1690 kernel/workqueue.c:2272 #2: ffff88807e1494d8 (&ctx->tx_lock){+.+.}-{3:3}, at: tx_work_handler+0x127/0x190 net/tls/tls_sw.c:2283 1 lock held by syz-executor.2/27764: #0: ffff88807e1494d8 (&ctx->tx_lock){+.+.}-{3:3}, at: tls_sw_sendmsg+0x245/0x17f0 net/tls/tls_sw.c:957 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1ae/0x220 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xc1d/0xf50 kernel/hung_task.c:295 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 2935 Comm: systemd-journal Not tainted 5.15.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__lock_acquire+0x1022/0x54a0 kernel/locking/lockdep.c:4985 Code: 10 be 08 00 00 00 48 8d 43 3f 48 85 db 48 0f 49 c3 48 c1 f8 06 48 8d 3c c5 00 8a d3 8f e8 e6 98 61 00 48 0f a3 1d 2e 3f 77 0e <0f> 82 c7 f8 ff ff e8 a3 89 79 02 85 c0 0f 84 f1 fd ff ff 48 c7 c0 RSP: 0018:ffffc90002bbfaa0 EFLAGS: 00000047 RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff815c4aca RDX: fffffbfff1fa7141 RSI: 0000000000000008 RDI: ffffffff8fd38a00 RBP: ffff88807beac482 R08: 0000000000000000 R09: ffffffff8fd38a07 R10: fffffbfff1fa7140 R11: 000000000000003f R12: ffff88807beac460 R13: ffff88807beaba00 R14: 0000000000000000 R15: 0000000000000002 FS: 00007f1c399d98c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f1c3682c020 CR3: 000000001b82f000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire kernel/locking/lockdep.c:5625 [inline] lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5590 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162 __debug_check_no_obj_freed lib/debugobjects.c:980 [inline] debug_check_no_obj_freed+0xc7/0x420 lib/debugobjects.c:1023 slab_free_hook mm/slub.c:1675 [inline] slab_free_freelist_hook+0xeb/0x1c0 mm/slub.c:1726 slab_free mm/slub.c:3492 [inline] kmem_cache_free+0x95/0x5d0 mm/slub.c:3508 putname fs/namei.c:270 [inline] putname+0xfe/0x140 fs/namei.c:256 do_mkdirat+0x1cd/0x300 fs/namei.c:3918 __do_sys_mkdir fs/namei.c:3929 [inline] __se_sys_mkdir fs/namei.c:3927 [inline] __x64_sys_mkdir+0xf2/0x140 fs/namei.c:3927 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f1c38c94687 Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffe0612bff8 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007ffe0612f060 RCX: 00007f1c38c94687 RDX: 0000000000000000 RSI: 00000000000001ed RDI: 0000557a111268a0 RBP: 00007ffe0612c030 R08: 0000557a103213e5 R09: 0000000000000018 R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 R13: 0000000000000001 R14: 0000557a111268a0 R15: 00007ffe0612c670 ---------------- Code disassembly (best guess): 0: 10 be 08 00 00 00 adc %bh,0x8(%rsi) 6: 48 8d 43 3f lea 0x3f(%rbx),%rax a: 48 85 db test %rbx,%rbx d: 48 0f 49 c3 cmovns %rbx,%rax 11: 48 c1 f8 06 sar $0x6,%rax 15: 48 8d 3c c5 00 8a d3 lea -0x702c7600(,%rax,8),%rdi 1c: 8f 1d: e8 e6 98 61 00 callq 0x619908 22: 48 0f a3 1d 2e 3f 77 bt %rbx,0xe773f2e(%rip) # 0xe773f58 29: 0e * 2a: 0f 82 c7 f8 ff ff jb 0xfffff8f7 <-- trapping instruction 30: e8 a3 89 79 02 callq 0x27989d8 35: 85 c0 test %eax,%eax 37: 0f 84 f1 fd ff ff je 0xfffffe2e 3d: 48 rex.W 3e: c7 .byte 0xc7 3f: c0 .byte 0xc0