Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp35272rwb; Thu, 12 Jan 2023 03:12:56 -0800 (PST) X-Google-Smtp-Source: AMrXdXsgRcl9VNo0eDJh1x0Uo8LW08G18XnrG/vpyp92gTLme9SH5OXCR3cPP4jc3Y/rcfQ/mmMd X-Received: by 2002:a05:6a21:999d:b0:9e:9685:f15e with SMTP id ve29-20020a056a21999d00b0009e9685f15emr113093885pzb.0.1673521975889; Thu, 12 Jan 2023 03:12:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673521975; cv=none; d=google.com; s=arc-20160816; b=G+E4LEBMpPs2ILcBlPfrjb1razdMZF37JEFGKC3Oq98Xv05cMrgW/YIm172/h0hTNj /lAk7h47Gq5t/4hvumIlrqyjQVdLQrwWYdUOyd70lMAClDFdSfSVzm+XAfuZ8oktqbt4 /D7KsYsXl85T8Lf+qk97gBB1Efu4hCRqHYLWtam4wvwj41JHgu/Ixa+/FONacKgfEAAv 9XFkyKvQdxWi1xpVQLcgG+ughwH6raedWf3C09XoQpiBTR+5o8N0qQALRXTUKGS0SFSD VhXvKe8KcA1scBR2LuaZleVgFw8CVeOVE2KMGZkMvX3hSuxYClxD8fRhaEUTq2RDmRtM sozw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:to:content-language:subject:user-agent:mime-version:date :message-id:dkim-signature; bh=nPsmbOgu4WiAkCHyIbTzazzxL3no0eAHTiA0UIQl9P8=; b=GdmHXvwDv0QLfUEns0oDUly7Dafn1xRho1eucSywQ1vR9OS0MJ+6E4be3IpkkZLq2w q7hoi+hVG+HdHtUCe7JsKz9/HAtt4+WMC8/83TANL7sbYZEJCgZvJlcuYE3M2aWooXDO SQAX9WfrQwTN9Mlp+1zR27uJSANSDYzHeBcvc9FVE1Zs0FR/kMkr8To5WH28k/xbAlgG GEhQOpwRbCFbvdktWOBhAC49UrafHrBrv8MnUoU56ZuVsUVNeI2AVNbAKIqRS29971ob Prb6EbXtatGF4dYdq3n+1K5eYoMdI+pPTEjMbBl/fP8yuln8+9lsAR6Kv/U8n8wfVOJw Kh9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=m2IL9Hgm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b3-20020a170903228300b001933171a4eesi6773195plh.113.2023.01.12.03.12.48; Thu, 12 Jan 2023 03:12:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=m2IL9Hgm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236679AbjALKp6 (ORCPT + 51 others); Thu, 12 Jan 2023 05:45:58 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41446 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239943AbjALKnx (ORCPT ); Thu, 12 Jan 2023 05:43:53 -0500 Received: from mail-wm1-x336.google.com (mail-wm1-x336.google.com [IPv6:2a00:1450:4864:20::336]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 40ADC58D32; Thu, 12 Jan 2023 02:39:23 -0800 (PST) Received: by mail-wm1-x336.google.com with SMTP id m3so12880556wmq.0; Thu, 12 Jan 2023 02:39:23 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=nPsmbOgu4WiAkCHyIbTzazzxL3no0eAHTiA0UIQl9P8=; b=m2IL9Hgm4ZBBfcf+reu18/OmWsrCUPTdah+mJ+ZIBpMNhAq/cshlEnzGOXh3mNWpey IjKRPx2fEveKIe+lFIlK1ez+qmH9IlwlNlmcl9uJLEKlDZfbW+mWnDGyIWW3qc7qDQuL 01aXP0lvWzY6kT3oRhh9dxpkMDP1aWidvoZxRLwpyFIja5qq5h2dsLYeupSeyM+N2BzE zSO4SC0h0T6zyyOvSPics0pz5mX2u1kczAH7IXJLAemsIpKWBp/e8aqTuTaYlnWyqCxQ PsjjktPmveCxLwMWKNqGbtjyNcGApZm5FJdih9r9/mFzfhj6QPZuvId8FZGrlFjkmxG9 8Rqw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=nPsmbOgu4WiAkCHyIbTzazzxL3no0eAHTiA0UIQl9P8=; b=iQNMLPWHo0K4x/INgfyRADMZha1zZWTkI9TFRhQHs/l+kLqLTGul1KoPyIN5K+GkGl y+Wa6/p8ywWkI9vFY8MDN67BY4xBMekSl6pNQE3sE5k/Q5r3JvP27tY+LmIK1wY/7i/T fJlaS6ZBbDaHvedLXO29EFh/rqH/UVxncfmKfigizxJ6h+6kq1zuTJrNMT4uWyY9zmLM T7PBPT7fDlnUez9pg72VePhCW/6J6mDEx/tgnsMRxQRol9ShtXmwvCMUoO9me1wJstd5 3kzHp4rA80A9BSKCPdX57WZL3h85ZaS2dMSwScxArcfJuvcUW1j/Z8zlsuAyVGIcSpke lPQw== X-Gm-Message-State: AFqh2koUtnpFrO/5DrHLmtQsnz1vOTXZdKM86GsD8k+K1JuX9vlg0LWZ NbBEOgSKIrY21R+41f8czIiz12w/3Ys= X-Received: by 2002:a05:600c:4fc5:b0:3d9:ecae:84f2 with SMTP id o5-20020a05600c4fc500b003d9ecae84f2mr12667199wmq.25.1673519961499; Thu, 12 Jan 2023 02:39:21 -0800 (PST) Received: from ?IPV6:2620:10d:c096:310::21ef? ([2620:10d:c092:600::2:478]) by smtp.gmail.com with ESMTPSA id p9-20020a05600c358900b003cffd3c3d6csm23404262wmq.12.2023.01.12.02.39.20 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 12 Jan 2023 02:39:21 -0800 (PST) Message-ID: Date: Thu, 12 Jan 2023 10:37:53 +0000 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.5.1 Subject: Re: [syzbot] WARNING in io_cqring_event_overflow Content-Language: en-US To: syzbot , axboe@kernel.dk, io-uring@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com References: <0000000000000bd60905f20e785a@google.com> From: Pavel Begunkov In-Reply-To: <0000000000000bd60905f20e785a@google.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/12/23 10:20, syzbot wrote: > Hello, > > syzbot found the following issue on: > > HEAD commit: 358a161a6a9e Merge branch 'for-next/fixes' into for-kernelci > git tree: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci > console output: https://syzkaller.appspot.com/x/log.txt?x=14247bbe480000 > kernel config: https://syzkaller.appspot.com/x/.config?x=2573056c6a11f00d > dashboard link: https://syzkaller.appspot.com/bug?extid=6805087452d72929404e > compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2 > userspace arch: arm64 > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1045e181480000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=13769f1c480000 #syz test: git://git.kernel.dk/linux.git syztest > > Downloadable assets: > disk image: https://storage.googleapis.com/syzbot-assets/99d14e0f4c19/disk-358a161a.raw.xz > vmlinux: https://storage.googleapis.com/syzbot-assets/23275b612976/vmlinux-358a161a.xz > kernel image: https://storage.googleapis.com/syzbot-assets/ed79195fac61/Image-358a161a.gz.xz > > IMPORTANT: if you fix the issue, please add the following tag to the commit: > Reported-by: syzbot+6805087452d72929404e@syzkaller.appspotmail.com > > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 0 PID: 28 Comm: kworker/u4:1 Not tainted 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 x28: ffff0000c3b3e578 x27: ffff80000d49b000 > x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 > x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 > x20: 0000000000000000 x19: ffff0000c4d2c000 x18: 00000000000000c0 > x17: ffff80000df48158 x16: ffff80000dd86118 x15: ffff0000c0cf8000 > x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000 > x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec > x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000 > x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 620806 > hardirqs last enabled at (620805): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (620805): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (620806): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (620784): [] neigh_managed_work+0xf8/0x118 net/core/neighbour.c:1626 > softirqs last disabled at (620780): [] neigh_managed_work+0x34/0x118 net/core/neighbour.c:1621 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c4f2f678 > x27: ffff80000d49b000 > > x26: 0000000000000000 > x25: 0000000000000000 > x24: 0000000000000000 > > x23: 0000000000000000 > x22: 0000000000000000 > x21: 0000000000000000 > > x20: 0000000000000000 > x19: ffff0000c4d2c000 > x18: 00000000000003de > > x17: ffff80000c15d8bc > x16: ffff80000dd86118 > x15: ffff0000c0cf8000 > > x14: 00000000000000b8 > x13: 00000000ffffffff > x12: ffff0000c0cf8000 > > x11: ff80800009594dec > x10: 0000000000000000 > x9 : ffff800009594dec > > x8 : ffff0000c0cf8000 > x7 : ffff80000c109860 > x6 : 0000000000000000 > > x5 : 0000000000000000 > x4 : 0000000000000000 > x3 : 0000000000000000 > > x2 : 0000000000000000 > x1 : 0000000000000000 > x0 : 0000000000000000 > > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 622216 > hardirqs last enabled at (622215): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (622215): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (622216): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (621028): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (621028): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (621026): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (621026): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 x28: ffff0000c4f2fb78 x27: ffff80000d49b000 > x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 > x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 > x20: 0000000000000000 x19: ffff0000c4d2f000 x18: 000000000000031e > x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000 > x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000 > x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec > x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000 > x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 623616 > hardirqs last enabled at (623615): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (623615): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (623616): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (622446): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (622446): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (622444): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (622444): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c4404378 > x27: ffff80000d49b000 > > x26: 0000000000000000 > x25: 0000000000000000 > x24: 0000000000000000 > > x23: 0000000000000000 > x22: 0000000000000000 > x21: 0000000000000000 > > x20: 0000000000000000 > x19: ffff0000c93ee000 > x18: 00000000000002ce > > x17: ffff80000c15d8bc > x16: ffff80000dd86118 > x15: ffff0000c0cf8000 > > x14: 00000000000000b8 > x13: 00000000ffffffff > x12: ffff0000c0cf8000 > > x11: ff80800009594dec > x10: 0000000000000000 > x9 : ffff800009594dec > > x8 : ffff0000c0cf8000 > x7 : ffff80000c109860 > x6 : 0000000000000000 > > x5 : 0000000000000000 > x4 : 0000000000000000 > x3 : 0000000000000000 > > x2 : 0000000000000000 > x1 : 0000000000000000 > x0 : 0000000000000000 > > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 624992 > hardirqs last enabled at (624991): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (624991): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (624992): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (623820): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (623820): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (623818): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (623818): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c995f778 > x27: ffff80000d49b000 > x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 > x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 > x20: 0000000000000000 x19: ffff0000c93ef000 x18: 00000000000003d1 > x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000 > x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000 > x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec > x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000 > x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 626290 > hardirqs last enabled at (626289): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (626289): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (626290): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (625116): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (625116): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (625114): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (625114): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c995f878 > x27: ffff80000d49b000 > x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 > x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 > x20: 0000000000000000 x19: ffff0000c93ef000 x18: 000000000000011c > x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000 > x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000 > x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec > x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000 > x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 627616 > hardirqs last enabled at (627615): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (627615): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (627616): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (626440): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (626440): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (626438): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (626438): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 x28: ffff0000c4f2f278 x27: ffff80000d49b000 > x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 > x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 > x20: 0000000000000000 x19: ffff0000c4d2f000 x18: 00000000000000c7 > x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000 > x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000 > x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec > x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000 > x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 629014 > hardirqs last enabled at (629013): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (629013): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (629014): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (627834): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (627834): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (627832): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (627832): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 x28: ffff0000c995fb78 x27: ffff80000d49b000 > x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 > x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 > x20: 0000000000000000 x19: ffff0000c93ee000 x18: 00000000000003c2 > x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000 > x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000 > x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec > x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000 > x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 630328 > hardirqs last enabled at (630327): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (630327): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (630328): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (629918): [] _stext+0x2e4/0x37c > softirqs last disabled at (629893): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > > CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c0d47d78 > x27: ffff80000d49b000 > > x26: 0000000000000000 > x25: 0000000000000000 > x24: 0000000000000000 > > x23: 0000000000000000 > x22: 0000000000000000 > x21: 0000000000000000 > > x20: 0000000000000000 > x19: ffff0000c93ee000 > x18: 00000000000003fd > > x17: ffff80000c15d8bc > x16: ffff80000dd86118 > x15: ffff0000c0cf8000 > > x14: 00000000000000b8 > x13: 00000000ffffffff > x12: ffff0000c0cf8000 > > x11: ff80800009594dec > x10: 0000000000000000 > x9 : ffff800009594dec > > x8 : ffff0000c0cf8000 > x7 : ffff80000c109860 > x6 : 0000000000000000 > > x5 : 0000000000000000 > x4 : 0000000000000000 > x3 : 0000000000000000 > > x2 : 0000000000000000 > x1 : 0000000000000000 > x0 : 0000000000000000 > > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 631624 > hardirqs last enabled at (631623): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (631623): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (631624): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (630450): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (630450): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (630448): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (630448): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > > CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c4f2f978 > x27: ffff80000d49b000 > > x26: 0000000000000000 > x25: 0000000000000000 > x24: 0000000000000000 > > x23: 0000000000000000 > x22: 0000000000000000 > x21: 0000000000000000 > > x20: 0000000000000000 > x19: ffff0000c93ee000 > x18: 0000000000000106 > > x17: ffff80000c15d8bc > x16: ffff80000dd86118 > x15: ffff0000c0cf8000 > > x14: 00000000000000b8 > x13: 00000000ffffffff > x12: ffff0000c0cf8000 > > x11: ff80800009594dec > x10: 0000000000000000 > x9 : ffff800009594dec > > x8 : ffff0000c0cf8000 > x7 : ffff80000c109860 > x6 : 0000000000000000 > > x5 : 0000000000000000 > x4 : 0000000000000000 > x3 : 0000000000000000 > > x2 : 0000000000000000 > x1 : 0000000000000000 > x0 : 0000000000000000 > > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 633024 > hardirqs last enabled at (633023): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (633023): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (633024): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (631846): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (631846): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (631844): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (631844): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > > CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c4404978 > x27: ffff80000d49b000 > > x26: 0000000000000000 > x25: 0000000000000000 > x24: 0000000000000000 > > x23: 0000000000000000 > x22: 0000000000000000 > x21: 0000000000000000 > > x20: 0000000000000000 > x19: ffff0000c93ec000 > x18: 0000000000000061 > > x17: ffff80000c15d8bc > x16: ffff80000dd86118 > x15: ffff0000c0cf8000 > > x14: 00000000000000b8 > x13: 00000000ffffffff > x12: ffff0000c0cf8000 > > x11: ff80800009594dec > x10: 0000000000000000 > x9 : ffff800009594dec > > x8 : ffff0000c0cf8000 > x7 : ffff80000c109860 > x6 : 0000000000000000 > > x5 : 0000000000000000 > x4 : 0000000000000000 > x3 : 0000000000000000 > > x2 : 0000000000000000 > x1 : 0000000000000000 > x0 : 0000000000000000 > > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 634358 > hardirqs last enabled at (634357): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (634357): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (634358): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (633180): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (633180): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (633178): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (633178): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > > CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c9688978 > x27: ffff80000d49b000 > > x26: 0000000000000000 > x25: 0000000000000000 > x24: 0000000000000000 > > x23: 0000000000000000 > x22: 0000000000000000 > x21: 0000000000000000 > > x20: 0000000000000000 > x19: ffff0000c93eb000 > x18: 0000000000000398 > > x17: ffff80000c15d8bc > x16: ffff80000dd86118 > x15: ffff0000c0cf8000 > > x14: 00000000000000b8 > x13: 00000000ffffffff > x12: ffff0000c0cf8000 > > x11: ff80800009594dec > x10: 0000000000000000 > x9 : ffff800009594dec > > x8 : ffff0000c0cf8000 > x7 : ffff80000c109860 > x6 : 0000000000000000 > > x5 : 0000000000000000 > x4 : 0000000000000000 > x3 : 0000000000000000 > > x2 : 0000000000000000 > x1 : 0000000000000000 > x0 : 0000000000000000 > > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 635652 > hardirqs last enabled at (635651): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (635651): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (635652): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (634476): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (634476): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (634474): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (634474): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 x28: ffff0000c995f678 x27: ffff80000d49b000 > x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 > x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 > x20: 0000000000000000 x19: ffff0000c4d28000 x18: 000000000000012e > x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000 > x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000 > x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec > x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000 > x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 636950 > hardirqs last enabled at (636949): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (636949): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (636950): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (635774): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (635774): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (635772): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (635772): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c4f2f178 > x27: ffff80000d49b000 > > x26: 0000000000000000 > x25: 0000000000000000 > x24: 0000000000000000 > > x23: 0000000000000000 > x22: 0000000000000000 > x21: 0000000000000000 > > x20: 0000000000000000 > x19: ffff0000c4d28000 > x18: ffff80001912b5f0 > > x17: ffff80000c15d8bc > x16: ffff80000dd86118 > x15: ffff0000c0cf8000 > > x14: 00000000000000b8 > x13: 00000000ffffffff > x12: ffff0000c0cf8000 > > x11: ff80800009594dec > x10: 0000000000000000 > x9 : ffff800009594dec > > x8 : ffff0000c0cf8000 > x7 : ffff80000c109860 > x6 : 0000000000000000 > > x5 : 0000000000000000 > x4 : 0000000000000000 > x3 : 0000000000000000 > > x2 : 0000000000000000 > x1 : 0000000000000000 > x0 : 0000000000000000 > > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 638316 > hardirqs last enabled at (638315): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (638315): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (638316): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (637136): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (637136): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (637134): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (637134): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 x28: ffff0000c995fc78 x27: ffff80000d49b000 > x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 > x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 > x20: 0000000000000000 x19: ffff0000c93ef000 x18: 000000000000017e > x17: 0000000000000000 x16: ffff80000dd86118 x15: ffff0000c0cf8000 > x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000 > x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec > x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000 > x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 639638 > hardirqs last enabled at (639637): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (639637): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (639638): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (638456): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (638456): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (638454): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (638454): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c995f878 > x27: ffff80000d49b000 > > x26: 0000000000000000 > x25: 0000000000000000 > x24: 0000000000000000 > > x23: 0000000000000000 > x22: 0000000000000000 > x21: 0000000000000000 > > x20: 0000000000000000 > x19: ffff0000c4d2c000 > x18: 0000000000000380 > > x17: ffff80000c15d8bc > x16: ffff80000dd86118 > x15: ffff0000c0cf8000 > > x14: 00000000000000b8 > x13: 00000000ffffffff > x12: ffff0000c0cf8000 > > x11: ff80800009594dec > x10: 0000000000000000 > x9 : ffff800009594dec > > x8 : ffff0000c0cf8000 > x7 : ffff80000c109860 > x6 : 0000000000000000 > > x5 : 0000000000000000 > x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 > x1 : 0000000000000000 > x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 641034 > hardirqs last enabled at (641033): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (641033): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (641034): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (639852): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (639852): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (639850): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (639850): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 x28: ffff0000c4404978 x27: ffff80000d49b000 > x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 > x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 > x20: 0000000000000000 x19: ffff0000c93ef000 x18: 0000000000000228 > x17: ffff0001feff7268 x16: ffff80000dd86118 x15: ffff0000c0cf8000 > x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000 > x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec > x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000 > x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 642368 > hardirqs last enabled at (642367): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (642367): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (642368): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (641192): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (641192): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (641190): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (641190): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c4f2f978 > x27: ffff80000d49b000 > > x26: 0000000000000000 > x25: 0000000000000000 > x24: 0000000000000000 > > x23: 0000000000000000 > x22: 0000000000000000 > x21: 0000000000000000 > > x20: 0000000000000000 > x19: ffff0000c93ef000 > x18: ffff800014643720 > > x17: ffff80000c15d8bc > x16: ffff80000dd86118 > x15: ffff0000c0cf8000 > > x14: 00000000000000b8 > x13: 00000000ffffffff > x12: ffff0000c0cf8000 > > x11: ff80800009594dec > x10: 0000000000000000 > x9 : ffff800009594dec > > x8 : ffff0000c0cf8000 > x7 : ffff80000c109860 > x6 : 0000000000000000 > > x5 : 0000000000000000 > x4 : 0000000000000000 > x3 : 0000000000000000 > > x2 : 0000000000000000 > x1 : 0000000000000000 > x0 : 0000000000000000 > > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 643668 > hardirqs last enabled at (643667): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (643667): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (643668): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (642486): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (642486): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (642484): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (642484): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c649e878 > x27: ffff80000d49b000 > > x26: 0000000000000000 > x25: 0000000000000000 > x24: 0000000000000000 > > x23: 0000000000000000 > x22: 0000000000000000 > x21: 0000000000000000 > > x20: 0000000000000000 > x19: ffff0000c4d28000 x18: 0000000000000065 > x17: 000000000000b67e > x16: ffff80000dd86118 > x15: ffff0000c0cf8000 > > x14: 00000000000000b8 > x13: 00000000ffffffff > x12: ffff0000c0cf8000 > > x11: ff80800009594dec > x10: 0000000000000000 x9 : ffff800009594dec > > x8 : ffff0000c0cf8000 > x7 : ffff80000c109860 > x6 : 0000000000000000 > > x5 : 0000000000000000 > x4 : 0000000000000000 > x3 : 0000000000000000 > > x2 : 0000000000000000 x1 : 0000000000000000 > x0 : 0000000000000000 > > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 644976 > hardirqs last enabled at (644975): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (644975): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (644976): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (643798): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (643798): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (643796): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (643796): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 x28: ffff0000c995f078 x27: ffff80000d49b000 > x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 > x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 > x20: 0000000000000000 x19: ffff0000c4d2a000 x18: 00000000000003c7 > x17: 0000000000000000 x16: ffff80000dd86118 x15: ffff0000c0cf8000 > x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000 > x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec > x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000 > x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 646330 > hardirqs last enabled at (646329): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (646329): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (646330): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (645158): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (645158): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (645156): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (645156): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 x28: ffff0000c4f2f278 x27: ffff80000d49b000 > x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 > x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 > x20: 0000000000000000 x19: ffff0000c4d2f000 x18: 00000000000002d7 > x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000 > x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000 > x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec > x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000 > x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 647682 > hardirqs last enabled at (647681): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (647681): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (647682): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (646506): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (646506): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (646504): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (646504): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 x28: ffff0000c995fc78 x27: ffff80000d49b000 > x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 > x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 > x20: 0000000000000000 x19: ffff0000c93ec000 x18: 00000000000003e1 > x17: 0000000000000000 x16: ffff80000dd86118 x15: ffff0000c0cf8000 > x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000 > x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec > x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000 > x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 > x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 649060 > hardirqs last enabled at (649059): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (649059): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (649060): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (647884): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (647884): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (647882): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (647882): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c9688278 > x27: ffff80000d49b000 > > x26: 0000000000000000 > x25: 0000000000000000 > x24: 0000000000000000 > > x23: 0000000000000000 > x22: 0000000000000000 > x21: 0000000000000000 > > x20: 0000000000000000 > x19: ffff0000c4d28000 > x18: 0000000000000291 > > x17: 0000000000000000 > x16: ffff80000dd86118 > x15: ffff0000c0cf8000 > > x14: 00000000000000b8 > x13: 00000000ffffffff > x12: ffff0000c0cf8000 > > x11: ff80800009594dec > x10: 0000000000000000 > x9 : ffff800009594dec > > x8 : ffff0000c0cf8000 > x7 : ffff80000c109860 > x6 : 0000000000000000 > > x5 : 0000000000000000 > x4 : 0000000000000000 > x3 : 0000000000000000 > > x2 : 0000000000000000 > x1 : 0000000000000000 > x0 : 0000000000000000 > > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 650446 > hardirqs last enabled at (650445): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (650445): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (650446): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (649612): [] _stext+0x2e4/0x37c > softirqs last disabled at (649587): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in: > CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G W 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: events_unbound io_ring_exit_work > > pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > sp : ffff80000f7dbad0 > x29: ffff80000f7dbad0 > x28: ffff0000c995f678 > x27: ffff80000d49b000 > > x26: 0000000000000000 > x25: 0000000000000000 > x24: 0000000000000000 > > x23: 0000000000000000 > x22: 0000000000000000 > x21: 0000000000000000 > > x20: 0000000000000000 > x19: ffff0000c93ee000 > x18: ffff80001912b5f0 > > x17: ffff80000c15d8bc > x16: ffff80000dd86118 > x15: ffff0000c0cf8000 > > x14: 00000000000000b8 > x13: 00000000ffffffff > x12: ffff0000c0cf8000 > > x11: ff80800009594dec > x10: 0000000000000000 > x9 : ffff800009594dec > > x8 : ffff0000c0cf8000 > x7 : ffff80000c109860 > x6 : 0000000000000000 > > x5 : 0000000000000000 > x4 : 0000000000000000 > x3 : 0000000000000000 > > x2 : 0000000000000000 > x1 : 0000000000000000 > x0 : 0000000000000000 > > Call trace: > io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 > io_fill_cqe_req io_uring/io_uring.h:168 [inline] > io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 > io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513 > io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 > io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 > process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 > worker_thread+0x340/0x610 kernel/workqueue.c:2436 > kthread+0x12c/0x158 kernel/kthread.c:376 > ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 > irq event stamp: 651724 > hardirqs last enabled at (651723): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] > hardirqs last enabled at (651723): [] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202 > hardirqs last disabled at (651724): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 > softirqs last enabled at (650546): [] sock_orphan include/net/sock.h:2098 [inline] > softirqs last enabled at (650546): [] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604 > softirqs last disabled at (650544): [] sock_orphan include/net/sock.h:2094 [inline] > softirqs last disabled at (650544): [] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604 > ---[ end trace 0000000000000000 ]--- > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734 > Modules linked in > > --- > This report is generated by a bot. It may contain errors. > See https://goo.gl/tpsmEJ for more information about syzbot. > syzbot engineers can be reached at syzkaller@googlegroups.com. > > syzbot will keep track of this issue. See: > https://goo.gl/tpsmEJ#status for how to communicate with syzbot. > syzbot can test patches for this issue, for details see: > https://goo.gl/tpsmEJ#testing-patches -- Pavel Begunkov