INFO: task syz-executor.0:9147 blocked for more than 143 seconds.
      Not tainted 5.13.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.0  state:D stack:25616 pid: 9147 ppid:  8441 flags:0x00004004
Call Trace:
 context_switch kernel/sched/core.c:4339 [inline]
 __schedule+0xb98/0x1120 kernel/sched/core.c:5147
 schedule+0x14b/0x200 kernel/sched/core.c:5226
 schedule_timeout+0x98/0x2c0 kernel/time/timer.c:1868
 do_wait_for_common+0x2dd/0x450 kernel/sched/completion.c:85
 __wait_for_common kernel/sched/completion.c:106 [inline]
 wait_for_common kernel/sched/completion.c:117 [inline]
 wait_for_completion+0x48/0x60 kernel/sched/completion.c:138
 __flush_work kernel/workqueue.c:3053 [inline]
 __cancel_work_timer+0x4dc/0x690 kernel/workqueue.c:3140
 p9_conn_destroy net/9p/trans_fd.c:891 [inline]
 p9_fd_close+0x2a2/0x3c0 net/9p/trans_fd.c:921
 p9_client_destroy+0xbe/0x6e0 net/9p/client.c:1088
 v9fs_session_init+0x13f2/0x18c0 fs/9p/v9fs.c:482
 v9fs_mount+0x72/0x870 fs/9p/vfs_super.c:126
 legacy_get_tree+0xea/0x180 fs/fs_context.c:592
 vfs_get_tree+0x86/0x270 fs/super.c:1498
 do_new_mount fs/namespace.c:2905 [inline]
 path_mount+0x196f/0x2be0 fs/namespace.c:3235
 do_mount fs/namespace.c:3248 [inline]
 __do_sys_mount fs/namespace.c:3456 [inline]
 __se_sys_mount+0x2f9/0x3b0 fs/namespace.c:3433
 do_syscall_64+0x3f/0xb0 arch/x86/entry/common.c:47
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665d9
RSP: 002b:00007f0780a50188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 000000000056c1a8 RCX: 00000000004665d9
RDX: 0000000020000240 RSI: 0000000020000200 RDI: 0000000000000000
RBP: 00000000004bfcb9 R08: 0000000020000580 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c1a8
R13: 00007ffd18748c5f R14: 00007f0780a50300 R15: 0000000000022000

Showing all locks held in the system:
1 lock held by khungtaskd/1633:
 #0: ffffffff8cf15c80 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 arch/x86/pci/mmconfig_64.c:151
1 lock held by systemd-journal/4842:
2 locks held by in:imklog/8116:
 #0: ffff888016e7d9f0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0x24e/0x2f0 fs/file.c:974
 #1: ffff8880b9b35118 (&rq->lock){-.-.}-{2:2}, at: rq_lock kernel/sched/sched.h:1334 [inline]
 #1: ffff8880b9b35118 (&rq->lock){-.-.}-{2:2}, at: __schedule+0x144/0x1120 kernel/sched/core.c:5061
2 locks held by kworker/1:3/8664:
 #0: ffff888011864d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x7aa/0x10c0 kernel/workqueue.c:2249
 #1: ffffc9000217fd20 ((work_completion)(&m->wq)){+.+.}-{0:0}, at: process_one_work+0x7e8/0x10c0 kernel/workqueue.c:2251

=============================================

NMI backtrace for cpu 0
CPU: 0 PID: 1633 Comm: khungtaskd Not tainted 5.13.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:79 [inline]
 dump_stack+0x202/0x31e lib/dump_stack.c:120
 nmi_cpu_backtrace+0x16c/0x190 lib/nmi_backtrace.c:105
 nmi_trigger_cpumask_backtrace+0x191/0x2f0 lib/nmi_backtrace.c:62
 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
 check_hung_uninterruptible_tasks kernel/hung_task.c:209 [inline]
 watchdog+0xcfb/0xd40 kernel/hung_task.c:294
 kthread+0x39a/0x3c0 kernel/kthread.c:313
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 4842 Comm: systemd-journal Not tainted 5.13.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:lockdep_enabled kernel/locking/lockdep.c:91 [inline]
RIP: 0010:lock_release+0xcf/0x7b0 kernel/locking/lockdep.c:5525
Code: 65 8b 05 a4 7c a0 7e 85 c0 0f 85 86 04 00 00 65 4c 8b 2c 25 80 ef 01 00 49 8d 9d f4 09 00 00 48 89 d8 48 c1 e8 03 42 8a 04 38 <84> c0 0f 85 0c 05 00 00 83 3b 00 0f 85 5a 04 00 00 4c 89 64 24 58
RSP: 0018:ffffc9000196fb40 EFLAGS: 00000a03
RAX: 1ffff110026f1100 RBX: ffff8880137889f4 RCX: 0000000080000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc9000196fc78 R08: dffffc0000000000 R09: fffffbfff1c70506
R10: fffffbfff1c70506 R11: 0000000000000000 R12: ffffffff81bce0fd
R13: ffff888013788000 R14: 1ffff9200032df74 R15: dffffc0000000000
FS:  00007f52e46cc8c0(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f52e1aac000 CR3: 000000001dcb7000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 might_alloc include/linux/sched/mm.h:198 [inline]
 slab_pre_alloc_hook mm/slab.h:497 [inline]
 slab_alloc_node mm/slub.c:2834 [inline]
 slab_alloc mm/slub.c:2921 [inline]
 kmem_cache_alloc+0x3a/0x340 mm/slub.c:2926
 getname_flags+0xba/0x640 fs/namei.c:138
 do_sys_openat2+0xba/0x460 fs/open.c:1181
 do_sys_open fs/open.c:1203 [inline]
 __do_sys_open fs/open.c:1211 [inline]
 __se_sys_open fs/open.c:1207 [inline]
 __x64_sys_open+0x221/0x270 fs/open.c:1207
 do_syscall_64+0x3f/0xb0 arch/x86/entry/common.c:47
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f52e3c5b840
Code: 73 01 c3 48 8b 0d 68 77 20 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 89 bb 20 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 1e f6 ff ff 48 89 04 24
RSP: 002b:00007fff40b98818 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007fff40b98b20 RCX: 00007f52e3c5b840
RDX: 00000000000001a0 RSI: 0000000000080042 RDI: 00005561ea6c07c0
RBP: 000000000000000d R08: 00007f52e3c45bb8 R09: 00000000ffffffff
R10: 0000000000000020 R11: 0000000000000246 R12: 00000000ffffffff
R13: 00005561ea6bc040 R14: 00007fff40b98ae0 R15: 00005561ea6c96b0