INFO: task syz.3.1013:7141 blocked for more than 143 seconds.
      Not tainted 6.1.96-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.3.1013      state:D stack:23984 pid:7141  ppid:3554   flags:0x00004004
Call Trace:
 
 context_switch kernel/sched/core.c:5245 [inline]
 __schedule+0x142d/0x4550 kernel/sched/core.c:6558
 schedule+0xbf/0x180 kernel/sched/core.c:6634
 wait_on_state fs/btrfs/extent-io-tree.c:709 [inline]
 wait_extent_bit+0x423/0x570 fs/btrfs/extent-io-tree.c:742
 lock_extent+0x17a/0x200 fs/btrfs/extent-io-tree.c:1657
 btrfs_page_mkwrite+0x550/0xc90 fs/btrfs/inode.c:8602
 do_page_mkwrite+0x1a1/0x5f0 mm/memory.c:2992
 wp_page_shared+0x164/0x380 mm/memory.c:3341
 handle_pte_fault mm/memory.c:5031 [inline]
 __handle_mm_fault mm/memory.c:5155 [inline]
 handle_mm_fault+0x2525/0x5340 mm/memory.c:5276
 do_user_addr_fault arch/x86/mm/fault.c:1340 [inline]
 handle_page_fault arch/x86/mm/fault.c:1431 [inline]
 exc_page_fault+0x26f/0x620 arch/x86/mm/fault.c:1487
 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570
RIP: 0010:copy_user_short_string+0xd/0x40 arch/x86/lib/copy_user_64.S:233
Code: 74 0a 89 d1 f3 a4 89 c8 0f 01 ca c3 89 d0 0f 01 ca c3 01 ca eb e7 0f 1f 80 00 00 00 00 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a
RSP: 0018:ffffc9000c0e73b0 EFLAGS: 00050202
RAX: ffffffff84387701 RBX: 00007fffffffefc8 RCX: 0000000000000007
RDX: 0000000000000000 RSI: ffffc9000c0e7460 RDI: 00000000200002a0
RBP: ffffc9000c0e7510 R08: 0000000000000000 R09: fffff5200181ce93
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000038
R13: ffffc9000c0e7460 R14: 00000000200002a0 R15: ffffc9000c0e7460
 copy_user_generic arch/x86/include/asm/uaccess_64.h:37 [inline]
 raw_copy_to_user arch/x86/include/asm/uaccess_64.h:58 [inline]
 _copy_to_user+0xe9/0x130 lib/usercopy.c:41
 copy_to_user include/linux/uaccess.h:169 [inline]
 fiemap_fill_next_extent+0x231/0x410 fs/ioctl.c:144
 emit_fiemap_extent fs/btrfs/extent_io.c:3561 [inline]
 fiemap_process_hole+0x107e/0x1290 fs/btrfs/extent_io.c:3821
 extent_fiemap+0xef7/0x1ff0
 btrfs_fiemap+0x174/0x1e0 fs/btrfs/inode.c:8274
 ioctl_fiemap fs/ioctl.c:219 [inline]
 do_vfs_ioctl+0x18e9/0x2a90 fs/ioctl.c:810
 __do_sys_ioctl fs/ioctl.c:868 [inline]
 __se_sys_ioctl+0x81/0x160 fs/ioctl.c:856
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7f6f81375b99
RSP: 002b:00007f6f821df048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f6f81504078 RCX: 00007f6f81375b99
RDX: 0000000020000280 RSI: 00000000c020660b RDI: 0000000000000004
RBP: 00007f6f813f677e R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007f6f81504078 R15: 00007fffa9c0d0a8
 
Showing all locks held in the system:
1 lock held by rcu_tasks_kthre/12:
 #0: ffffffff8d12ae90 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x29/0xe30 kernel/rcu/tasks.h:516
1 lock held by rcu_tasks_trace/13:
 #0: ffffffff8d12b690 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x29/0xe30 kernel/rcu/tasks.h:516
1 lock held by khungtaskd/27:
 #0: ffffffff8d12acc0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:350 [inline]
 #0: ffffffff8d12acc0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:791 [inline]
 #0: ffffffff8d12acc0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x51/0x290 kernel/locking/lockdep.c:6494
2 locks held by getty/3303:
 #0: ffff88814a9a1098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 drivers/tty/tty_ldisc.c:244
 #1: ffffc900031262f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6a7/0x1db0 drivers/tty/n_tty.c:2198
8 locks held by kworker/0:4/3555:
4 locks held by udevd/3699:
 #0: ffff888052450668 (&p->lock){+.+.}-{3:3}, at: seq_read_iter+0xae/0xd10 fs/seq_file.c:182
 #1: ffff88805b62f888 (&of->mutex){+.+.}-{3:3}, at: kernfs_seq_start+0x4f/0x3a0 fs/kernfs/file.c:150
 #2: ffff888069978ae8 (kn->active#5){++++}-{0:0}, at: kernfs_seq_start+0x6e/0x3a0 fs/kernfs/file.c:151
 #3: ffff88807eac9190 (&dev->mutex){....}-{3:3}, at: device_lock include/linux/device.h:837 [inline]
 #3: ffff88807eac9190 (&dev->mutex){....}-{3:3}, at: uevent_show+0x176/0x330 drivers/base/core.c:2661
4 locks held by syz.3.1013/7141:
 #0: ffff8880605f05e0 (&sb->s_type->i_mutex_key#28){++++}-{3:3}, at: inode_lock_shared include/linux/fs.h:768 [inline]
 #0: ffff8880605f05e0 (&sb->s_type->i_mutex_key#28){++++}-{3:3}, at: btrfs_inode_lock+0x5c/0xd0 fs/btrfs/inode.c:147
 #1: ffff8880295508d8 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:136 [inline]
 #1: ffff8880295508d8 (&mm->mmap_lock){++++}-{3:3}, at: get_mmap_lock_carefully mm/memory.c:5304 [inline]
 #1: ffff8880295508d8 (&mm->mmap_lock){++++}-{3:3}, at: lock_mm_and_find_vma+0x2e/0x2e0 mm/memory.c:5366
 #2: ffff88807a3c2558 (sb_pagefaults#2){.+.+}-{0:0}, at: do_page_mkwrite+0x1a1/0x5f0 mm/memory.c:2992
 #3: ffff8880605f0468 (&ei->i_mmap_lock){++++}-{3:3}, at: btrfs_page_mkwrite+0x421/0xc90 fs/btrfs/inode.c:8591
=============================================
NMI backtrace for cpu 1
CPU: 1 PID: 27 Comm: khungtaskd Not tainted 6.1.96-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
Call Trace:
 
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106
 nmi_cpu_backtrace+0x4e1/0x560 lib/nmi_backtrace.c:111
 nmi_trigger_cpumask_backtrace+0x1b0/0x3f0 lib/nmi_backtrace.c:62
 trigger_all_cpu_backtrace include/linux/nmi.h:148 [inline]
 check_hung_uninterruptible_tasks kernel/hung_task.c:220 [inline]
 watchdog+0xf88/0xfd0 kernel/hung_task.c:377
 kthread+0x28d/0x320 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
 
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 5357 Comm: syz-executor Not tainted 6.1.96-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
RIP: 0010:kasan_mem_to_shadow include/linux/kasan.h:59 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline]
RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]
RIP: 0010:kasan_check_range+0x37/0x290 mm/kasan/generic.c:189
Code: 9a 01 00 00 48 89 fd 48 01 f5 0f 82 5a 02 00 00 48 89 fd 48 c1 ed 2f 81 fd ff ff 01 00 0f 82 47 02 00 00 48 89 fb 48 c1 eb 03 <49> b8 00 00 00 00 00 fc ff df 4e 8d 0c 03 4c 8d 54 37 ff 49 c1 ea
RSP: 0018:ffffc90003647138 EFLAGS: 00000806
RAX: 0000000000000001 RBX: 1ffffffff2093844 RCX: ffffffff816a727a
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff9049c220
RBP: 000000000001ffff R08: dffffc0000000000 R09: fffffbfff2093845
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8880795bc658
R13: ffff8880795bbb80 R14: ffff8880795bc6a8 R15: 1ffff1100f2b78d5
FS:  0000555556080500(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fccdccce2d8 CR3: 000000005b1da000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 
 
 
 instrument_atomic_read include/linux/instrumented.h:72 [inline]
 _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
 hlock_class kernel/locking/lockdep.c:228 [inline]
 check_wait_context kernel/locking/lockdep.c:4724 [inline]
 __lock_acquire+0x54a/0x1f80 kernel/locking/lockdep.c:4999
 lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
 rcu_lock_acquire include/linux/rcupdate.h:350 [inline]
 rcu_read_lock include/linux/rcupdate.h:791 [inline]
 is_bpf_text_address+0x3e/0x2a0 kernel/bpf/core.c:731
 kernel_text_address+0x9f/0xd0 kernel/extable.c:125
 __kernel_text_address+0x9/0x40 kernel/extable.c:79
 unwind_get_return_address+0x49/0x80 arch/x86/kernel/unwind_orc.c:323
 arch_stack_walk+0xf3/0x140 arch/x86/kernel/stacktrace.c:26
 stack_trace_save+0x113/0x1c0 kernel/stacktrace.c:122
 kasan_save_stack mm/kasan/common.c:45 [inline]
 kasan_set_track+0x4b/0x70 mm/kasan/common.c:52
 kasan_save_free_info+0x27/0x40 mm/kasan/generic.c:516
 ____kasan_slab_free+0xd6/0x120 mm/kasan/common.c:236
 kasan_slab_free include/linux/kasan.h:177 [inline]
 slab_free_hook mm/slub.c:1724 [inline]
 slab_free_freelist_hook mm/slub.c:1750 [inline]
 slab_free mm/slub.c:3661 [inline]
 __kmem_cache_free+0x25c/0x3c0 mm/slub.c:3674
 __vunmap+0x8d9/0x9a0 mm/vmalloc.c:2722
 copy_entries_to_user net/ipv4/netfilter/arp_tables.c:713 [inline]
 get_entries net/ipv4/netfilter/arp_tables.c:867 [inline]
 do_arpt_get_ctl+0x109c/0x1690 net/ipv4/netfilter/arp_tables.c:1461
 nf_getsockopt+0x28e/0x2b0 net/netfilter/nf_sockopt.c:116
 ip_getsockopt+0x21a/0x2d0 net/ipv4/ip_sockglue.c:1826
 tcp_getsockopt+0x15c/0x1c0 net/ipv4/tcp.c:4449
 __sys_getsockopt+0x2b2/0x5d0 net/socket.c:2327
 __do_sys_getsockopt net/socket.c:2342 [inline]
 __se_sys_getsockopt net/socket.c:2339 [inline]
 __x64_sys_getsockopt+0xb1/0xc0 net/socket.c:2339
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7fccdcb777da
Code: ff c3 66 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb b8 0f 1f 44 00 00 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7
RSP: 002b:00007ffc8aaf4d78 EFLAGS: 00000212 ORIG_RAX: 0000000000000037
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fccdcb777da
RDX: 0000000000000061 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007ffc8aaf4de0 R08: 00007ffc8aaf4d8c R09: 00007ffc8aaf5177
R10: 00007ffc8aaf4de0 R11: 0000000000000212 R12: 00007ffc8aaf4d8c
R13: 000000000006668e R14: 0000000000065df6 R15: 00007ffc8aaf54e0