INFO: task syz-executor.1:11589 blocked for more than 143 seconds.
Not tainted 5.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.1 state:D stack:28096 pid:11589 ppid: 6573 flags:0x20004004
Call Trace:
context_switch kernel/sched/core.c:4972 [inline]
__schedule+0xa9a/0x4940 kernel/sched/core.c:6253
schedule+0xd2/0x260 kernel/sched/core.c:6326
blk_mq_freeze_queue_wait+0x112/0x160 block/blk-mq.c:178
lo_release+0x160/0x1f0 drivers/block/loop.c:1768
blkdev_put_whole block/bdev.c:694 [inline]
blkdev_put+0x2fb/0x9e0 block/bdev.c:956
blkdev_close+0x6a/0x80 block/fops.c:515
__fput+0x286/0x9f0 fs/file_table.c:280
task_work_run+0xdd/0x1a0 kernel/task_work.c:164
tracehook_notify_resume include/linux/tracehook.h:189 [inline]
exit_to_user_mode_loop kernel/entry/common.c:175 [inline]
exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
__do_fast_syscall_32+0x72/0xf0 arch/x86/entry/common.c:181
do_fast_syscall_32+0x2f/0x70 arch/x86/entry/common.c:203
entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
RIP: 0023:0xf6ee8549
RSP: 002b:00000000f7579b40 EFLAGS: 00000286 ORIG_RAX: 0000000000000006
RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000000002
RDX: 0000000000000000 RSI: 00000000f701e000 RDI: 000000000004a27b
RBP: 00000000f7045760 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
INFO: task syz-executor.4:11627 blocked for more than 143 seconds.
Not tainted 5.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.4 state:D stack:27560 pid:11627 ppid: 6966 flags:0x20004004
Call Trace:
context_switch kernel/sched/core.c:4972 [inline]
__schedule+0xa9a/0x4940 kernel/sched/core.c:6253
schedule+0xd2/0x260 kernel/sched/core.c:6326
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6385
__mutex_lock_common kernel/locking/mutex.c:680 [inline]
__mutex_lock+0xa32/0x12f0 kernel/locking/mutex.c:740
blkdev_get_by_dev.part.0+0x24e/0xb50 block/bdev.c:819
blkdev_get_by_dev+0x6b/0x80 block/bdev.c:859
blkdev_open+0x154/0x2e0 block/fops.c:501
do_dentry_open+0x4c8/0x1250 fs/open.c:822
do_open fs/namei.c:3426 [inline]
path_openat+0x1cad/0x2750 fs/namei.c:3559
do_filp_open+0x1aa/0x400 fs/namei.c:3586
do_sys_openat2+0x16d/0x4d0 fs/open.c:1212
do_sys_open fs/open.c:1228 [inline]
__do_compat_sys_openat fs/open.c:1288 [inline]
__se_compat_sys_openat fs/open.c:1286 [inline]
__ia32_compat_sys_openat+0x13f/0x1f0 fs/open.c:1286
do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]
__do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178
do_fast_syscall_32+0x2f/0x70 arch/x86/entry/common.c:203
entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
RIP: 0023:0xf6e96549
RSP: 002b:00000000f44901a0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127
RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f44901f0
RDX: 0000000000103382 RSI: 0000000000000000 RDI: 00000000f6fcc000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
Showing all locks held in the system:
5 locks held by kworker/u4:1/10:
1 lock held by khungtaskd/26:
#0: ffffffff8bb83a60 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6458
1 lock held by systemd-udevd/2970:
#0: ffff88801aa52918 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev.part.0+0x9b/0xb50 block/bdev.c:819
1 lock held by in:imklog/6434:
#0: ffff88801d89bc70 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990
2 locks held by syz-executor.1/11589:
#0: ffff88801aa52918 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_put+0x97/0x9e0 block/bdev.c:914
#1: ffff88801a956360 (&lo->lo_mutex){+.+.}-{3:3}, at: lo_release+0x4d/0x1f0 drivers/block/loop.c:1748
1 lock held by syz-executor.4/11627:
#0: ffff88801aa52918 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev.part.0+0x24e/0xb50 block/bdev.c:819
=============================================
NMI backtrace for cpu 1
CPU: 1 PID: 26 Comm: khungtaskd Not tainted 5.16.0-rc1-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:105
nmi_trigger_cpumask_backtrace+0x1ae/0x220 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline]
watchdog+0xc1d/0xf50 kernel/hung_task.c:295
kthread+0x405/0x4f0 kernel/kthread.c:327
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 2967 Comm: systemd-journal Not tainted 5.16.0-rc1-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__slab_free+0xa9/0x370 mm/slub.c:3364
Code: 85 db 89 44 24 28 74 05 45 84 db 74 0b 80 7c 24 28 00 0f 84 84 00 00 00 41 8b 7f 08 4d 89 e8 4c 89 f2 4c 89 e6 4c 8b 4c 24 58 c2 d6 ff ff 84 c0 74 98 44 0f b6 74 24 28 45 84 f6 0f 84 2a 01
RSP: 0018:ffffc9000208fbd0 EFLAGS: 00000282
RAX: 0000000000000000 RBX: 0000000000040003 RCX: 0000000000040004
RDX: 0000000000000000 RSI: ffffea0001eb4800 RDI: 0000000048000000
RBP: ffffc9000208fc70 R08: ffff88807ad20000 R09: 0000000080040003
R10: ffffffff81352e7a R11: 0000000000000001 R12: ffffea0001eb4800
R13: ffff88807ad20000 R14: 0000000000000000 R15: ffff888010c42140
FS: 00007ffb60a1f8c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffb5def1000 CR3: 000000007f48a000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
qlink_free mm/kasan/quarantine.c:146 [inline]
qlist_free_all+0x5a/0xc0 mm/kasan/quarantine.c:165
kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:272
__kasan_slab_alloc+0xa2/0xc0 mm/kasan/common.c:444
kasan_slab_alloc include/linux/kasan.h:259 [inline]
slab_post_alloc_hook mm/slab.h:519 [inline]
slab_alloc_node mm/slub.c:3234 [inline]
slab_alloc mm/slub.c:3242 [inline]
kmem_cache_alloc+0x202/0x3a0 mm/slub.c:3247
getname_flags.part.0+0x50/0x4f0 fs/namei.c:138
getname_flags include/linux/audit.h:323 [inline]
getname+0x8e/0xd0 fs/namei.c:217
do_sys_openat2+0xf5/0x4d0 fs/open.c:1206
do_sys_open fs/open.c:1228 [inline]
__do_sys_open fs/open.c:1236 [inline]
__se_sys_open fs/open.c:1232 [inline]
__x64_sys_open+0x119/0x1c0 fs/open.c:1232
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7ffb5ffae840
Code: 73 01 c3 48 8b 0d 68 77 20 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 89 bb 20 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 1e f6 ff ff 48 89 04 24
RSP: 002b:00007ffcf2cd1198 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007ffcf2cd14a0 RCX: 00007ffb5ffae840
RDX: 00000000000001a0 RSI: 0000000000080042 RDI: 0000555aa2e21460
RBP: 000000000000000d R08: 000000000000c0ff R09: 00000000ffffffff
R10: 0000000000000069 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000555aa2e16040 R14: 00007ffcf2cd1460 R15: 0000555aa2e21280
----------------
Code disassembly (best guess):
0: 85 db test %ebx,%ebx
2: 89 44 24 28 mov %eax,0x28(%rsp)
6: 74 05 je 0xd
8: 45 84 db test %r11b,%r11b
b: 74 0b je 0x18
d: 80 7c 24 28 00 cmpb $0x0,0x28(%rsp)
12: 0f 84 84 00 00 00 je 0x9c
18: 41 8b 7f 08 mov 0x8(%r15),%edi
1c: 4d 89 e8 mov %r13,%r8
1f: 4c 89 f2 mov %r14,%rdx
22: 4c 89 e6 mov %r12,%rsi
25: 4c 8b 4c 24 58 mov 0x58(%rsp),%r9
* 2a: e8 c2 d6 ff ff callq 0xffffd6f1 <-- trapping instruction
2f: 84 c0 test %al,%al
31: 74 98 je 0xffffffcb
33: 44 0f b6 74 24 28 movzbl 0x28(%rsp),%r14d
39: 45 84 f6 test %r14b,%r14b
3c: 0f .byte 0xf
3d: 84 2a test %ch,(%rdx)
3f: 01 .byte 0x1