INFO: task syz-executor.4:17907 blocked for more than 143 seconds. Not tainted 5.14.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.4 state:D stack:28944 pid:17907 ppid: 8930 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:4681 [inline] __schedule+0x93a/0x26f0 kernel/sched/core.c:5938 schedule+0xd3/0x270 kernel/sched/core.c:6017 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6076 __mutex_lock_common kernel/locking/mutex.c:1036 [inline] __mutex_lock+0x7b6/0x10a0 kernel/locking/mutex.c:1104 io_uring_del_tctx_node+0x105/0x350 fs/io_uring.c:9103 io_uring_clean_tctx fs/io_uring.c:9119 [inline] io_uring_cancel_generic+0x6c0/0x890 fs/io_uring.c:9202 io_uring_files_cancel include/linux/io_uring.h:16 [inline] do_exit+0x28b/0x2a60 kernel/exit.c:780 do_group_exit+0x125/0x310 kernel/exit.c:922 get_signal+0x47f/0x2160 kernel/signal.c:2808 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:865 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:209 __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:302 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x4665e9 RSP: 002b:00007f19c523b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000056c040 RCX: 00000000004665e9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000056c040 RBP: 000000000056c038 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c044 R13: 0000000000a9fb1f R14: 00007f19c523b300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1605: #0: ffffffff8b97c280 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446 1 lock held by in:imklog/8153: #0: ffff888029ba4ff0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:974 3 locks held by syz-executor.4/17903: 1 lock held by syz-executor.4/17907: #0: ffff88801ed340a8 (&ctx->uring_lock){+.+.}-{3:3}, at: io_uring_del_tctx_node+0x105/0x350 fs/io_uring.c:9103 2 locks held by syz-executor.4/17922: ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1605 Comm: khungtaskd Not tainted 5.14.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:105 nmi_cpu_backtrace.cold+0x44/0xd7 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xd0a/0xfc0 kernel/hung_task.c:295 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 7055 Comm: kworker/u4:0 Not tainted 5.14.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet RIP: 0010:strlen+0x4d/0x90 lib/string.c:565 Code: 07 38 d0 7f 04 84 c0 75 48 80 7d 00 00 74 39 48 bb 00 00 00 00 00 fc ff df 48 89 e8 48 83 c0 01 48 89 c2 48 89 c1 48 c1 ea 03 <83> e1 07 0f b6 14 1a 38 ca 7f 04 84 d2 75 1f 80 38 00 75 de 48 83 RSP: 0018:ffffc90006fa7988 EFLAGS: 00000a07 RAX: ffffffff898d3444 RBX: dffffc0000000000 RCX: ffffffff898d3444 RDX: 1ffffffff131a688 RSI: ffffffff8b97c280 RDI: ffffffff898d3440 RBP: ffffffff898d3440 R08: 0000000000000002 R09: 0000000000000000 R10: fffffbfff1ad8ffa R11: 0000000000000000 R12: 0000000000000002 R13: ffffffff8b8794e0 R14: ffffffff8b97c280 R15: ffffc90006fa7a68 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f64c8bb3000 CR3: 000000001b242000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: strlen include/linux/fortify-string.h:60 [inline] trace_event_get_offsets_lock_acquire include/trace/events/lock.h:13 [inline] perf_trace_lock_acquire+0xbe/0x550 include/trace/events/lock.h:13 trace_lock_acquire include/trace/events/lock.h:13 [inline] lock_acquire+0x416/0x510 kernel/locking/lockdep.c:5596 rcu_lock_acquire include/linux/rcupdate.h:267 [inline] rcu_read_lock include/linux/rcupdate.h:687 [inline] batadv_iv_ogm_slide_own_bcast_window net/batman-adv/bat_iv_ogm.c:756 [inline] batadv_iv_ogm_schedule_buff+0x5d2/0x1420 net/batman-adv/bat_iv_ogm.c:827 batadv_iv_ogm_schedule net/batman-adv/bat_iv_ogm.c:871 [inline] batadv_iv_ogm_schedule net/batman-adv/bat_iv_ogm.c:864 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x740/0x8e0 net/batman-adv/bat_iv_ogm.c:1725 process_one_work+0x98d/0x1630 kernel/workqueue.c:2276 worker_thread+0x658/0x11f0 kernel/workqueue.c:2422 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 38 d0 cmp %dl,%al 2: 7f 04 jg 0x8 4: 84 c0 test %al,%al 6: 75 48 jne 0x50 8: 80 7d 00 00 cmpb $0x0,0x0(%rbp) c: 74 39 je 0x47 e: 48 bb 00 00 00 00 00 movabs $0xdffffc0000000000,%rbx 15: fc ff df 18: 48 89 e8 mov %rbp,%rax 1b: 48 83 c0 01 add $0x1,%rax 1f: 48 89 c2 mov %rax,%rdx 22: 48 89 c1 mov %rax,%rcx 25: 48 c1 ea 03 shr $0x3,%rdx 29: 83 e1 07 and $0x7,%ecx <-- trapping instruction 2c: 0f b6 14 1a movzbl (%rdx,%rbx,1),%edx 30: 38 ca cmp %cl,%dl 32: 7f 04 jg 0x38 34: 84 d2 test %dl,%dl 36: 75 1f jne 0x57 38: 80 38 00 cmpb $0x0,(%rax) 3b: 75 de jne 0x1b 3d: 48 rex.W 3e: 83 .byte 0x83