All of lore.kernel.org
 help / color / mirror / Atom feed
* [syzbot] WARNING in io_cqring_event_overflow
@ 2023-01-12 10:20 syzbot
  2023-01-12 10:37 ` Pavel Begunkov
  0 siblings, 1 reply; 7+ messages in thread
From: syzbot @ 2023-01-12 10:20 UTC (permalink / raw)
  To: asml.silence, axboe, io-uring, linux-kernel, syzkaller-bugs

Hello,

syzbot found the following issue on:

HEAD commit:    358a161a6a9e Merge branch 'for-next/fixes' into for-kernelci
git tree:       git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci
console output: https://syzkaller.appspot.com/x/log.txt?x=14247bbe480000
kernel config:  https://syzkaller.appspot.com/x/.config?x=2573056c6a11f00d
dashboard link: https://syzkaller.appspot.com/bug?extid=6805087452d72929404e
compiler:       Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
userspace arch: arm64
syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1045e181480000
C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=13769f1c480000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/99d14e0f4c19/disk-358a161a.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/23275b612976/vmlinux-358a161a.xz
kernel image: https://storage.googleapis.com/syzbot-assets/ed79195fac61/Image-358a161a.gz.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+6805087452d72929404e@syzkaller.appspotmail.com

------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 0 PID: 28 Comm: kworker/u4:1 Not tainted 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0 x28: ffff0000c3b3e578 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c4d2c000 x18: 00000000000000c0
x17: ffff80000df48158 x16: ffff80000dd86118 x15: ffff0000c0cf8000
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 620806
hardirqs last  enabled at (620805): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (620805): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (620806): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (620784): [<ffff80000b2f555c>] neigh_managed_work+0xf8/0x118 net/core/neighbour.c:1626
softirqs last disabled at (620780): [<ffff80000b2f5498>] neigh_managed_work+0x34/0x118 net/core/neighbour.c:1621
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c4f2f678
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c4d2c000
 x18: 00000000000003de

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c0cf8000

x14: 00000000000000b8
 x13: 00000000ffffffff
 x12: ffff0000c0cf8000

x11: ff80800009594dec
 x10: 0000000000000000
 x9 : ffff800009594dec

x8 : ffff0000c0cf8000
 x7 : ffff80000c109860
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 622216
hardirqs last  enabled at (622215): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (622215): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (622216): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (621028): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (621028): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (621026): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (621026): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0 x28: ffff0000c4f2fb78 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c4d2f000 x18: 000000000000031e
x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 623616
hardirqs last  enabled at (623615): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (623615): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (623616): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (622446): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (622446): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (622444): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (622444): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c4404378
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c93ee000
 x18: 00000000000002ce

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c0cf8000

x14: 00000000000000b8
 x13: 00000000ffffffff
 x12: ffff0000c0cf8000

x11: ff80800009594dec
 x10: 0000000000000000
 x9 : ffff800009594dec

x8 : ffff0000c0cf8000
 x7 : ffff80000c109860
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 624992
hardirqs last  enabled at (624991): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (624991): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (624992): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (623820): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (623820): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (623818): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (623818): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c995f778
 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c93ef000 x18: 00000000000003d1
x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 626290
hardirqs last  enabled at (626289): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (626289): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (626290): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (625116): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (625116): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (625114): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (625114): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c995f878
 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c93ef000 x18: 000000000000011c
x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 627616
hardirqs last  enabled at (627615): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (627615): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (627616): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (626440): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (626440): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (626438): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (626438): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0 x28: ffff0000c4f2f278 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c4d2f000 x18: 00000000000000c7
x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 629014
hardirqs last  enabled at (629013): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (629013): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (629014): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (627834): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (627834): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (627832): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (627832): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0 x28: ffff0000c995fb78 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c93ee000 x18: 00000000000003c2
x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 630328
hardirqs last  enabled at (630327): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (630327): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (630328): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (629918): [<ffff8000080102e4>] _stext+0x2e4/0x37c
softirqs last disabled at (629893): [<ffff800008017c90>] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:

CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c0d47d78
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c93ee000
 x18: 00000000000003fd

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c0cf8000

x14: 00000000000000b8
 x13: 00000000ffffffff
 x12: ffff0000c0cf8000

x11: ff80800009594dec
 x10: 0000000000000000
 x9 : ffff800009594dec

x8 : ffff0000c0cf8000
 x7 : ffff80000c109860
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 631624
hardirqs last  enabled at (631623): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (631623): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (631624): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (630450): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (630450): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (630448): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (630448): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:

CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c4f2f978
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c93ee000
 x18: 0000000000000106

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c0cf8000

x14: 00000000000000b8
 x13: 00000000ffffffff
 x12: ffff0000c0cf8000

x11: ff80800009594dec
 x10: 0000000000000000
 x9 : ffff800009594dec

x8 : ffff0000c0cf8000
 x7 : ffff80000c109860
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 633024
hardirqs last  enabled at (633023): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (633023): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (633024): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (631846): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (631846): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (631844): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (631844): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:

CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c4404978
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c93ec000
 x18: 0000000000000061

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c0cf8000

x14: 00000000000000b8
 x13: 00000000ffffffff
 x12: ffff0000c0cf8000

x11: ff80800009594dec
 x10: 0000000000000000
 x9 : ffff800009594dec

x8 : ffff0000c0cf8000
 x7 : ffff80000c109860
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 634358
hardirqs last  enabled at (634357): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (634357): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (634358): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (633180): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (633180): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (633178): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (633178): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:

CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c9688978
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c93eb000
 x18: 0000000000000398

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c0cf8000

x14: 00000000000000b8
 x13: 00000000ffffffff
 x12: ffff0000c0cf8000

x11: ff80800009594dec
 x10: 0000000000000000
 x9 : ffff800009594dec

x8 : ffff0000c0cf8000
 x7 : ffff80000c109860
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 635652
hardirqs last  enabled at (635651): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (635651): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (635652): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (634476): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (634476): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (634474): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (634474): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0 x28: ffff0000c995f678 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c4d28000 x18: 000000000000012e
x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 636950
hardirqs last  enabled at (636949): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (636949): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (636950): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (635774): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (635774): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (635772): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (635772): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c4f2f178
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c4d28000
 x18: ffff80001912b5f0

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c0cf8000

x14: 00000000000000b8
 x13: 00000000ffffffff
 x12: ffff0000c0cf8000

x11: ff80800009594dec
 x10: 0000000000000000
 x9 : ffff800009594dec

x8 : ffff0000c0cf8000
 x7 : ffff80000c109860
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 638316
hardirqs last  enabled at (638315): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (638315): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (638316): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (637136): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (637136): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (637134): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (637134): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0 x28: ffff0000c995fc78 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c93ef000 x18: 000000000000017e
x17: 0000000000000000 x16: ffff80000dd86118 x15: ffff0000c0cf8000
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 639638
hardirqs last  enabled at (639637): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (639637): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (639638): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (638456): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (638456): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (638454): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (638454): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c995f878
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c4d2c000
 x18: 0000000000000380

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c0cf8000

x14: 00000000000000b8
 x13: 00000000ffffffff
 x12: ffff0000c0cf8000

x11: ff80800009594dec
 x10: 0000000000000000
 x9 : ffff800009594dec

x8 : ffff0000c0cf8000
 x7 : ffff80000c109860
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 641034
hardirqs last  enabled at (641033): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (641033): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (641034): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (639852): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (639852): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (639850): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (639850): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0 x28: ffff0000c4404978 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c93ef000 x18: 0000000000000228
x17: ffff0001feff7268 x16: ffff80000dd86118 x15: ffff0000c0cf8000
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 642368
hardirqs last  enabled at (642367): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (642367): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (642368): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (641192): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (641192): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (641190): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (641190): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c4f2f978
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c93ef000
 x18: ffff800014643720

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c0cf8000

x14: 00000000000000b8
 x13: 00000000ffffffff
 x12: ffff0000c0cf8000

x11: ff80800009594dec
 x10: 0000000000000000
 x9 : ffff800009594dec

x8 : ffff0000c0cf8000
 x7 : ffff80000c109860
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 643668
hardirqs last  enabled at (643667): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (643667): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (643668): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (642486): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (642486): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (642484): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (642484): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c649e878
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c4d28000 x18: 0000000000000065
x17: 000000000000b67e
 x16: ffff80000dd86118
 x15: ffff0000c0cf8000

x14: 00000000000000b8
 x13: 00000000ffffffff
 x12: ffff0000c0cf8000

x11: ff80800009594dec
 x10: 0000000000000000 x9 : ffff800009594dec

x8 : ffff0000c0cf8000
 x7 : ffff80000c109860
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 644976
hardirqs last  enabled at (644975): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (644975): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (644976): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (643798): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (643798): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (643796): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (643796): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0 x28: ffff0000c995f078 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c4d2a000 x18: 00000000000003c7
x17: 0000000000000000 x16: ffff80000dd86118 x15: ffff0000c0cf8000
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 646330
hardirqs last  enabled at (646329): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (646329): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (646330): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (645158): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (645158): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (645156): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (645156): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0 x28: ffff0000c4f2f278 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c4d2f000 x18: 00000000000002d7
x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 647682
hardirqs last  enabled at (647681): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (647681): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (647682): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (646506): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (646506): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (646504): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (646504): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0 x28: ffff0000c995fc78 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c93ec000 x18: 00000000000003e1
x17: 0000000000000000 x16: ffff80000dd86118 x15: ffff0000c0cf8000
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 649060
hardirqs last  enabled at (649059): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (649059): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (649060): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (647884): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (647884): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (647882): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (647882): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c9688278
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c4d28000
 x18: 0000000000000291

x17: 0000000000000000
 x16: ffff80000dd86118
 x15: ffff0000c0cf8000

x14: 00000000000000b8
 x13: 00000000ffffffff
 x12: ffff0000c0cf8000

x11: ff80800009594dec
 x10: 0000000000000000
 x9 : ffff800009594dec

x8 : ffff0000c0cf8000
 x7 : ffff80000c109860
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 650446
hardirqs last  enabled at (650445): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (650445): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (650446): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (649612): [<ffff8000080102e4>] _stext+0x2e4/0x37c
softirqs last disabled at (649587): [<ffff800008017c90>] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff80000f7dbad0
x29: ffff80000f7dbad0
 x28: ffff0000c995f678
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c93ee000
 x18: ffff80001912b5f0

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c0cf8000

x14: 00000000000000b8
 x13: 00000000ffffffff
 x12: ffff0000c0cf8000

x11: ff80800009594dec
 x10: 0000000000000000
 x9 : ffff800009594dec

x8 : ffff0000c0cf8000
 x7 : ffff80000c109860
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 651724
hardirqs last  enabled at (651723): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (651723): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (651724): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (650546): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (650546): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (650544): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (650544): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in

---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [syzbot] WARNING in io_cqring_event_overflow
  2023-01-12 10:20 [syzbot] WARNING in io_cqring_event_overflow syzbot
@ 2023-01-12 10:37 ` Pavel Begunkov
  2023-01-12 10:56   ` syzbot
  0 siblings, 1 reply; 7+ messages in thread
From: Pavel Begunkov @ 2023-01-12 10:37 UTC (permalink / raw)
  To: syzbot, axboe, io-uring, linux-kernel, syzkaller-bugs

On 1/12/23 10:20, syzbot wrote:
> Hello,
> 
> syzbot found the following issue on:
> 
> HEAD commit:    358a161a6a9e Merge branch 'for-next/fixes' into for-kernelci
> git tree:       git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci
> console output: https://syzkaller.appspot.com/x/log.txt?x=14247bbe480000
> kernel config:  https://syzkaller.appspot.com/x/.config?x=2573056c6a11f00d
> dashboard link: https://syzkaller.appspot.com/bug?extid=6805087452d72929404e
> compiler:       Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
> userspace arch: arm64
> syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1045e181480000
> C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=13769f1c480000

#syz test: git://git.kernel.dk/linux.git syztest

> 
> Downloadable assets:
> disk image: https://storage.googleapis.com/syzbot-assets/99d14e0f4c19/disk-358a161a.raw.xz
> vmlinux: https://storage.googleapis.com/syzbot-assets/23275b612976/vmlinux-358a161a.xz
> kernel image: https://storage.googleapis.com/syzbot-assets/ed79195fac61/Image-358a161a.gz.xz
> 
> IMPORTANT: if you fix the issue, please add the following tag to the commit:
> Reported-by: syzbot+6805087452d72929404e@syzkaller.appspotmail.com
> 
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 0 PID: 28 Comm: kworker/u4:1 Not tainted 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0 x28: ffff0000c3b3e578 x27: ffff80000d49b000
> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
> x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
> x20: 0000000000000000 x19: ffff0000c4d2c000 x18: 00000000000000c0
> x17: ffff80000df48158 x16: ffff80000dd86118 x15: ffff0000c0cf8000
> x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
> x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
> x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 620806
> hardirqs last  enabled at (620805): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (620805): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (620806): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (620784): [<ffff80000b2f555c>] neigh_managed_work+0xf8/0x118 net/core/neighbour.c:1626
> softirqs last disabled at (620780): [<ffff80000b2f5498>] neigh_managed_work+0x34/0x118 net/core/neighbour.c:1621
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c4f2f678
>   x27: ffff80000d49b000
> 
> x26: 0000000000000000
>   x25: 0000000000000000
>   x24: 0000000000000000
> 
> x23: 0000000000000000
>   x22: 0000000000000000
>   x21: 0000000000000000
> 
> x20: 0000000000000000
>   x19: ffff0000c4d2c000
>   x18: 00000000000003de
> 
> x17: ffff80000c15d8bc
>   x16: ffff80000dd86118
>   x15: ffff0000c0cf8000
> 
> x14: 00000000000000b8
>   x13: 00000000ffffffff
>   x12: ffff0000c0cf8000
> 
> x11: ff80800009594dec
>   x10: 0000000000000000
>   x9 : ffff800009594dec
> 
> x8 : ffff0000c0cf8000
>   x7 : ffff80000c109860
>   x6 : 0000000000000000
> 
> x5 : 0000000000000000
>   x4 : 0000000000000000
>   x3 : 0000000000000000
> 
> x2 : 0000000000000000
>   x1 : 0000000000000000
>   x0 : 0000000000000000
> 
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 622216
> hardirqs last  enabled at (622215): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (622215): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (622216): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (621028): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (621028): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (621026): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (621026): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0 x28: ffff0000c4f2fb78 x27: ffff80000d49b000
> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
> x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
> x20: 0000000000000000 x19: ffff0000c4d2f000 x18: 000000000000031e
> x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
> x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
> x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
> x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 623616
> hardirqs last  enabled at (623615): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (623615): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (623616): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (622446): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (622446): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (622444): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (622444): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c4404378
>   x27: ffff80000d49b000
> 
> x26: 0000000000000000
>   x25: 0000000000000000
>   x24: 0000000000000000
> 
> x23: 0000000000000000
>   x22: 0000000000000000
>   x21: 0000000000000000
> 
> x20: 0000000000000000
>   x19: ffff0000c93ee000
>   x18: 00000000000002ce
> 
> x17: ffff80000c15d8bc
>   x16: ffff80000dd86118
>   x15: ffff0000c0cf8000
> 
> x14: 00000000000000b8
>   x13: 00000000ffffffff
>   x12: ffff0000c0cf8000
> 
> x11: ff80800009594dec
>   x10: 0000000000000000
>   x9 : ffff800009594dec
> 
> x8 : ffff0000c0cf8000
>   x7 : ffff80000c109860
>   x6 : 0000000000000000
> 
> x5 : 0000000000000000
>   x4 : 0000000000000000
>   x3 : 0000000000000000
> 
> x2 : 0000000000000000
>   x1 : 0000000000000000
>   x0 : 0000000000000000
> 
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 624992
> hardirqs last  enabled at (624991): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (624991): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (624992): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (623820): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (623820): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (623818): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (623818): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c995f778
>   x27: ffff80000d49b000
> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
> x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
> x20: 0000000000000000 x19: ffff0000c93ef000 x18: 00000000000003d1
> x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
> x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
> x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
> x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 626290
> hardirqs last  enabled at (626289): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (626289): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (626290): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (625116): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (625116): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (625114): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (625114): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c995f878
>   x27: ffff80000d49b000
> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
> x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
> x20: 0000000000000000 x19: ffff0000c93ef000 x18: 000000000000011c
> x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
> x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
> x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
> x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 627616
> hardirqs last  enabled at (627615): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (627615): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (627616): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (626440): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (626440): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (626438): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (626438): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0 x28: ffff0000c4f2f278 x27: ffff80000d49b000
> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
> x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
> x20: 0000000000000000 x19: ffff0000c4d2f000 x18: 00000000000000c7
> x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
> x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
> x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
> x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 629014
> hardirqs last  enabled at (629013): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (629013): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (629014): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (627834): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (627834): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (627832): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (627832): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0 x28: ffff0000c995fb78 x27: ffff80000d49b000
> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
> x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
> x20: 0000000000000000 x19: ffff0000c93ee000 x18: 00000000000003c2
> x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
> x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
> x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
> x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 630328
> hardirqs last  enabled at (630327): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (630327): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (630328): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (629918): [<ffff8000080102e4>] _stext+0x2e4/0x37c
> softirqs last disabled at (629893): [<ffff800008017c90>] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> 
> CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c0d47d78
>   x27: ffff80000d49b000
> 
> x26: 0000000000000000
>   x25: 0000000000000000
>   x24: 0000000000000000
> 
> x23: 0000000000000000
>   x22: 0000000000000000
>   x21: 0000000000000000
> 
> x20: 0000000000000000
>   x19: ffff0000c93ee000
>   x18: 00000000000003fd
> 
> x17: ffff80000c15d8bc
>   x16: ffff80000dd86118
>   x15: ffff0000c0cf8000
> 
> x14: 00000000000000b8
>   x13: 00000000ffffffff
>   x12: ffff0000c0cf8000
> 
> x11: ff80800009594dec
>   x10: 0000000000000000
>   x9 : ffff800009594dec
> 
> x8 : ffff0000c0cf8000
>   x7 : ffff80000c109860
>   x6 : 0000000000000000
> 
> x5 : 0000000000000000
>   x4 : 0000000000000000
>   x3 : 0000000000000000
> 
> x2 : 0000000000000000
>   x1 : 0000000000000000
>   x0 : 0000000000000000
> 
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 631624
> hardirqs last  enabled at (631623): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (631623): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (631624): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (630450): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (630450): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (630448): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (630448): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> 
> CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c4f2f978
>   x27: ffff80000d49b000
> 
> x26: 0000000000000000
>   x25: 0000000000000000
>   x24: 0000000000000000
> 
> x23: 0000000000000000
>   x22: 0000000000000000
>   x21: 0000000000000000
> 
> x20: 0000000000000000
>   x19: ffff0000c93ee000
>   x18: 0000000000000106
> 
> x17: ffff80000c15d8bc
>   x16: ffff80000dd86118
>   x15: ffff0000c0cf8000
> 
> x14: 00000000000000b8
>   x13: 00000000ffffffff
>   x12: ffff0000c0cf8000
> 
> x11: ff80800009594dec
>   x10: 0000000000000000
>   x9 : ffff800009594dec
> 
> x8 : ffff0000c0cf8000
>   x7 : ffff80000c109860
>   x6 : 0000000000000000
> 
> x5 : 0000000000000000
>   x4 : 0000000000000000
>   x3 : 0000000000000000
> 
> x2 : 0000000000000000
>   x1 : 0000000000000000
>   x0 : 0000000000000000
> 
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 633024
> hardirqs last  enabled at (633023): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (633023): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (633024): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (631846): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (631846): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (631844): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (631844): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> 
> CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c4404978
>   x27: ffff80000d49b000
> 
> x26: 0000000000000000
>   x25: 0000000000000000
>   x24: 0000000000000000
> 
> x23: 0000000000000000
>   x22: 0000000000000000
>   x21: 0000000000000000
> 
> x20: 0000000000000000
>   x19: ffff0000c93ec000
>   x18: 0000000000000061
> 
> x17: ffff80000c15d8bc
>   x16: ffff80000dd86118
>   x15: ffff0000c0cf8000
> 
> x14: 00000000000000b8
>   x13: 00000000ffffffff
>   x12: ffff0000c0cf8000
> 
> x11: ff80800009594dec
>   x10: 0000000000000000
>   x9 : ffff800009594dec
> 
> x8 : ffff0000c0cf8000
>   x7 : ffff80000c109860
>   x6 : 0000000000000000
> 
> x5 : 0000000000000000
>   x4 : 0000000000000000
>   x3 : 0000000000000000
> 
> x2 : 0000000000000000
>   x1 : 0000000000000000
>   x0 : 0000000000000000
> 
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 634358
> hardirqs last  enabled at (634357): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (634357): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (634358): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (633180): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (633180): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (633178): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (633178): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> 
> CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c9688978
>   x27: ffff80000d49b000
> 
> x26: 0000000000000000
>   x25: 0000000000000000
>   x24: 0000000000000000
> 
> x23: 0000000000000000
>   x22: 0000000000000000
>   x21: 0000000000000000
> 
> x20: 0000000000000000
>   x19: ffff0000c93eb000
>   x18: 0000000000000398
> 
> x17: ffff80000c15d8bc
>   x16: ffff80000dd86118
>   x15: ffff0000c0cf8000
> 
> x14: 00000000000000b8
>   x13: 00000000ffffffff
>   x12: ffff0000c0cf8000
> 
> x11: ff80800009594dec
>   x10: 0000000000000000
>   x9 : ffff800009594dec
> 
> x8 : ffff0000c0cf8000
>   x7 : ffff80000c109860
>   x6 : 0000000000000000
> 
> x5 : 0000000000000000
>   x4 : 0000000000000000
>   x3 : 0000000000000000
> 
> x2 : 0000000000000000
>   x1 : 0000000000000000
>   x0 : 0000000000000000
> 
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 635652
> hardirqs last  enabled at (635651): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (635651): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (635652): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (634476): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (634476): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (634474): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (634474): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0 x28: ffff0000c995f678 x27: ffff80000d49b000
> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
> x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
> x20: 0000000000000000 x19: ffff0000c4d28000 x18: 000000000000012e
> x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
> x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
> x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
> x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 636950
> hardirqs last  enabled at (636949): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (636949): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (636950): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (635774): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (635774): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (635772): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (635772): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c4f2f178
>   x27: ffff80000d49b000
> 
> x26: 0000000000000000
>   x25: 0000000000000000
>   x24: 0000000000000000
> 
> x23: 0000000000000000
>   x22: 0000000000000000
>   x21: 0000000000000000
> 
> x20: 0000000000000000
>   x19: ffff0000c4d28000
>   x18: ffff80001912b5f0
> 
> x17: ffff80000c15d8bc
>   x16: ffff80000dd86118
>   x15: ffff0000c0cf8000
> 
> x14: 00000000000000b8
>   x13: 00000000ffffffff
>   x12: ffff0000c0cf8000
> 
> x11: ff80800009594dec
>   x10: 0000000000000000
>   x9 : ffff800009594dec
> 
> x8 : ffff0000c0cf8000
>   x7 : ffff80000c109860
>   x6 : 0000000000000000
> 
> x5 : 0000000000000000
>   x4 : 0000000000000000
>   x3 : 0000000000000000
> 
> x2 : 0000000000000000
>   x1 : 0000000000000000
>   x0 : 0000000000000000
> 
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 638316
> hardirqs last  enabled at (638315): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (638315): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (638316): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (637136): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (637136): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (637134): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (637134): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0 x28: ffff0000c995fc78 x27: ffff80000d49b000
> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
> x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
> x20: 0000000000000000 x19: ffff0000c93ef000 x18: 000000000000017e
> x17: 0000000000000000 x16: ffff80000dd86118 x15: ffff0000c0cf8000
> x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
> x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
> x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 639638
> hardirqs last  enabled at (639637): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (639637): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (639638): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (638456): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (638456): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (638454): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (638454): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c995f878
>   x27: ffff80000d49b000
> 
> x26: 0000000000000000
>   x25: 0000000000000000
>   x24: 0000000000000000
> 
> x23: 0000000000000000
>   x22: 0000000000000000
>   x21: 0000000000000000
> 
> x20: 0000000000000000
>   x19: ffff0000c4d2c000
>   x18: 0000000000000380
> 
> x17: ffff80000c15d8bc
>   x16: ffff80000dd86118
>   x15: ffff0000c0cf8000
> 
> x14: 00000000000000b8
>   x13: 00000000ffffffff
>   x12: ffff0000c0cf8000
> 
> x11: ff80800009594dec
>   x10: 0000000000000000
>   x9 : ffff800009594dec
> 
> x8 : ffff0000c0cf8000
>   x7 : ffff80000c109860
>   x6 : 0000000000000000
> 
> x5 : 0000000000000000
>   x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000
>   x1 : 0000000000000000
>   x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 641034
> hardirqs last  enabled at (641033): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (641033): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (641034): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (639852): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (639852): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (639850): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (639850): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0 x28: ffff0000c4404978 x27: ffff80000d49b000
> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
> x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
> x20: 0000000000000000 x19: ffff0000c93ef000 x18: 0000000000000228
> x17: ffff0001feff7268 x16: ffff80000dd86118 x15: ffff0000c0cf8000
> x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
> x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
> x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 642368
> hardirqs last  enabled at (642367): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (642367): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (642368): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (641192): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (641192): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (641190): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (641190): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c4f2f978
>   x27: ffff80000d49b000
> 
> x26: 0000000000000000
>   x25: 0000000000000000
>   x24: 0000000000000000
> 
> x23: 0000000000000000
>   x22: 0000000000000000
>   x21: 0000000000000000
> 
> x20: 0000000000000000
>   x19: ffff0000c93ef000
>   x18: ffff800014643720
> 
> x17: ffff80000c15d8bc
>   x16: ffff80000dd86118
>   x15: ffff0000c0cf8000
> 
> x14: 00000000000000b8
>   x13: 00000000ffffffff
>   x12: ffff0000c0cf8000
> 
> x11: ff80800009594dec
>   x10: 0000000000000000
>   x9 : ffff800009594dec
> 
> x8 : ffff0000c0cf8000
>   x7 : ffff80000c109860
>   x6 : 0000000000000000
> 
> x5 : 0000000000000000
>   x4 : 0000000000000000
>   x3 : 0000000000000000
> 
> x2 : 0000000000000000
>   x1 : 0000000000000000
>   x0 : 0000000000000000
> 
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 643668
> hardirqs last  enabled at (643667): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (643667): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (643668): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (642486): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (642486): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (642484): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (642484): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c649e878
>   x27: ffff80000d49b000
> 
> x26: 0000000000000000
>   x25: 0000000000000000
>   x24: 0000000000000000
> 
> x23: 0000000000000000
>   x22: 0000000000000000
>   x21: 0000000000000000
> 
> x20: 0000000000000000
>   x19: ffff0000c4d28000 x18: 0000000000000065
> x17: 000000000000b67e
>   x16: ffff80000dd86118
>   x15: ffff0000c0cf8000
> 
> x14: 00000000000000b8
>   x13: 00000000ffffffff
>   x12: ffff0000c0cf8000
> 
> x11: ff80800009594dec
>   x10: 0000000000000000 x9 : ffff800009594dec
> 
> x8 : ffff0000c0cf8000
>   x7 : ffff80000c109860
>   x6 : 0000000000000000
> 
> x5 : 0000000000000000
>   x4 : 0000000000000000
>   x3 : 0000000000000000
> 
> x2 : 0000000000000000 x1 : 0000000000000000
>   x0 : 0000000000000000
> 
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 644976
> hardirqs last  enabled at (644975): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (644975): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (644976): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (643798): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (643798): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (643796): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (643796): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0 x28: ffff0000c995f078 x27: ffff80000d49b000
> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
> x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
> x20: 0000000000000000 x19: ffff0000c4d2a000 x18: 00000000000003c7
> x17: 0000000000000000 x16: ffff80000dd86118 x15: ffff0000c0cf8000
> x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
> x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
> x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 646330
> hardirqs last  enabled at (646329): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (646329): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (646330): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (645158): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (645158): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (645156): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (645156): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0 x28: ffff0000c4f2f278 x27: ffff80000d49b000
> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
> x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
> x20: 0000000000000000 x19: ffff0000c4d2f000 x18: 00000000000002d7
> x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c0cf8000
> x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
> x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
> x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 647682
> hardirqs last  enabled at (647681): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (647681): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (647682): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (646506): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (646506): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (646504): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (646504): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0 x28: ffff0000c995fc78 x27: ffff80000d49b000
> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
> x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
> x20: 0000000000000000 x19: ffff0000c93ec000 x18: 00000000000003e1
> x17: 0000000000000000 x16: ffff80000dd86118 x15: ffff0000c0cf8000
> x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c0cf8000
> x11: ff80800009594dec x10: 0000000000000000 x9 : ffff800009594dec
> x8 : ffff0000c0cf8000 x7 : ffff80000c109860 x6 : 0000000000000000
> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
> x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 649060
> hardirqs last  enabled at (649059): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (649059): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (649060): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (647884): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (647884): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (647882): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (647882): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 0 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c9688278
>   x27: ffff80000d49b000
> 
> x26: 0000000000000000
>   x25: 0000000000000000
>   x24: 0000000000000000
> 
> x23: 0000000000000000
>   x22: 0000000000000000
>   x21: 0000000000000000
> 
> x20: 0000000000000000
>   x19: ffff0000c4d28000
>   x18: 0000000000000291
> 
> x17: 0000000000000000
>   x16: ffff80000dd86118
>   x15: ffff0000c0cf8000
> 
> x14: 00000000000000b8
>   x13: 00000000ffffffff
>   x12: ffff0000c0cf8000
> 
> x11: ff80800009594dec
>   x10: 0000000000000000
>   x9 : ffff800009594dec
> 
> x8 : ffff0000c0cf8000
>   x7 : ffff80000c109860
>   x6 : 0000000000000000
> 
> x5 : 0000000000000000
>   x4 : 0000000000000000
>   x3 : 0000000000000000
> 
> x2 : 0000000000000000
>   x1 : 0000000000000000
>   x0 : 0000000000000000
> 
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 650446
> hardirqs last  enabled at (650445): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (650445): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (650446): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (649612): [<ffff8000080102e4>] _stext+0x2e4/0x37c
> softirqs last disabled at (649587): [<ffff800008017c90>] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 1 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 1 PID: 28 Comm: kworker/u4:1 Tainted: G        W          6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> 
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff80000f7dbad0
> x29: ffff80000f7dbad0
>   x28: ffff0000c995f678
>   x27: ffff80000d49b000
> 
> x26: 0000000000000000
>   x25: 0000000000000000
>   x24: 0000000000000000
> 
> x23: 0000000000000000
>   x22: 0000000000000000
>   x21: 0000000000000000
> 
> x20: 0000000000000000
>   x19: ffff0000c93ee000
>   x18: ffff80001912b5f0
> 
> x17: ffff80000c15d8bc
>   x16: ffff80000dd86118
>   x15: ffff0000c0cf8000
> 
> x14: 00000000000000b8
>   x13: 00000000ffffffff
>   x12: ffff0000c0cf8000
> 
> x11: ff80800009594dec
>   x10: 0000000000000000
>   x9 : ffff800009594dec
> 
> x8 : ffff0000c0cf8000
>   x7 : ffff80000c109860
>   x6 : 0000000000000000
> 
> x5 : 0000000000000000
>   x4 : 0000000000000000
>   x3 : 0000000000000000
> 
> x2 : 0000000000000000
>   x1 : 0000000000000000
>   x0 : 0000000000000000
> 
> Call trace:
>   io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>   io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>   io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>   io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>   io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>   io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>   io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>   process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>   worker_thread+0x340/0x610 kernel/workqueue.c:2436
>   kthread+0x12c/0x158 kernel/kthread.c:376
>   ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 651724
> hardirqs last  enabled at (651723): [<ffff80000c124078>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (651723): [<ffff80000c124078>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (651724): [<ffff80000c110db0>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (650546): [<ffff80000b811778>] sock_orphan include/net/sock.h:2098 [inline]
> softirqs last  enabled at (650546): [<ffff80000b811778>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
> softirqs last disabled at (650544): [<ffff80000b81175c>] sock_orphan include/net/sock.h:2094 [inline]
> softirqs last disabled at (650544): [<ffff80000b81175c>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------
> WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in
> 
> ---
> This report is generated by a bot. It may contain errors.
> See https://goo.gl/tpsmEJ for more information about syzbot.
> syzbot engineers can be reached at syzkaller@googlegroups.com.
> 
> syzbot will keep track of this issue. See:
> https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
> syzbot can test patches for this issue, for details see:
> https://goo.gl/tpsmEJ#testing-patches

-- 
Pavel Begunkov

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [syzbot] WARNING in io_cqring_event_overflow
  2023-01-12 10:37 ` Pavel Begunkov
@ 2023-01-12 10:56   ` syzbot
  2023-01-12 15:27     ` Jens Axboe
  2023-01-12 18:11     ` Pavel Begunkov
  0 siblings, 2 replies; 7+ messages in thread
From: syzbot @ 2023-01-12 10:56 UTC (permalink / raw)
  To: asml.silence, axboe, io-uring, linux-kernel, syzkaller-bugs

Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
WARNING in io_cqring_event_overflow

------------[ cut here ]------------
WARNING: CPU: 1 PID: 2836 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 2836 Comm: kworker/u4:4 Not tainted 6.2.0-rc3-syzkaller-00011-g0af4af977a59 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff8000164abad0
x29: ffff8000164abad0
 x28: ffff0000c655e578
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000d1727000
 x18: 00000000000000c0

x17: ffff80000df48158
 x16: ffff80000dd86118
 x15: ffff0000c60dce00

x14: 0000000000000110
 x13: 00000000ffffffff
 x12: ffff0000c60dce00

x11: ff808000095945e8
 x10: 0000000000000000
 x9 : ffff8000095945e8

x8 : ffff0000c60dce00
 x7 : ffff80000c1090e0
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 576210
hardirqs last  enabled at (576209): [<ffff80000c1238f8>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (576209): [<ffff80000c1238f8>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (576210): [<ffff80000c110630>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (576168): [<ffff80000bfd4634>] spin_unlock_bh include/linux/spinlock.h:395 [inline]
softirqs last  enabled at (576168): [<ffff80000bfd4634>] batadv_nc_purge_paths+0x1d0/0x214 net/batman-adv/network-coding.c:471
softirqs last disabled at (576166): [<ffff80000bfd44c4>] spin_lock_bh include/linux/spinlock.h:355 [inline]
softirqs last disabled at (576166): [<ffff80000bfd44c4>] batadv_nc_purge_paths+0x60/0x214 net/batman-adv/network-coding.c:442
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 2836 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:

CPU: 0 PID: 2836 Comm: kworker/u4:4 Tainted: G        W          6.2.0-rc3-syzkaller-00011-g0af4af977a59 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff8000164abad0
x29: ffff8000164abad0
 x28: ffff0000c3a36f78
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c70e9000
 x18: 0000000000000232

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c60dce00

x14: 0000000000000110
 x13: 00000000ffffffff
 x12: ffff0000c60dce00

x11: ff808000095945e8
 x10: 0000000000000000
 x9 : ffff8000095945e8

x8 : ffff0000c60dce00
 x7 : ffff80000c1090e0
 x6 : 0000000000000000

x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 587416
hardirqs last  enabled at (587415): [<ffff80000c1238f8>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (587415): [<ffff80000c1238f8>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (587416): [<ffff80000c110630>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (587360): [<ffff80000bfd4634>] spin_unlock_bh include/linux/spinlock.h:395 [inline]
softirqs last  enabled at (587360): [<ffff80000bfd4634>] batadv_nc_purge_paths+0x1d0/0x214 net/batman-adv/network-coding.c:471
softirqs last disabled at (587358): [<ffff80000bfd44c4>] spin_lock_bh include/linux/spinlock.h:355 [inline]
softirqs last disabled at (587358): [<ffff80000bfd44c4>] batadv_nc_purge_paths+0x60/0x214 net/batman-adv/network-coding.c:442
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 2836 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 0 PID: 2836 Comm: kworker/u4:4 Tainted: G        W          6.2.0-rc3-syzkaller-00011-g0af4af977a59 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff8000164abad0
x29: ffff8000164abad0 x28: ffff0000cc27dc78 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c60f2000 x18: 0000000000000364
x17: ffff80000c15d8bc x16: ffff80000dd86118 x15: ffff0000c60dce00
x14: 0000000000000110 x13: 00000000ffffffff x12: ffff0000c60dce00
x11: ff808000095945e8 x10: 0000000000000000 x9 : ffff8000095945e8
x8 : ffff0000c60dce00 x7 : ffff80000c1090e0 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 588956
hardirqs last  enabled at (588955): [<ffff80000c1238f8>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (588955): [<ffff80000c1238f8>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (588956): [<ffff80000c110630>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (587754): [<ffff80000b811ff8>] sock_orphan include/net/sock.h:2098 [inline]
softirqs last  enabled at (587754): [<ffff80000b811ff8>] unix_release_sock+0x15c/0x544 net/unix/af_unix.c:604
softirqs last disabled at (587752): [<ffff80000b811fdc>] sock_orphan include/net/sock.h:2094 [inline]
softirqs last disabled at (587752): [<ffff80000b811fdc>] unix_release_sock+0x140/0x544 net/unix/af_unix.c:604
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 2836 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:

CPU: 1 PID: 2836 Comm: kworker/u4:4 Tainted: G        W          6.2.0-rc3-syzkaller-00011-g0af4af977a59 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff8000164abad0
x29: ffff8000164abad0
 x28: ffff0000cc1fb478
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c7bf0000
 x18: 0000000000000191

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c60dce00

x14: 0000000000000110
 x13: 00000000ffffffff
 x12: ffff0000c60dce00

x11: ff808000095945e8
 x10: 0000000000000000
 x9 : ffff8000095945e8

x8 : ffff0000c60dce00
 x7 : ffff80000c1090e0
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 598112
hardirqs last  enabled at (598111): [<ffff80000c1238f8>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (598111): [<ffff80000c1238f8>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (598112): [<ffff80000c110630>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (597426): [<ffff80000bfd4634>] spin_unlock_bh include/linux/spinlock.h:395 [inline]
softirqs last  enabled at (597426): [<ffff80000bfd4634>] batadv_nc_purge_paths+0x1d0/0x214 net/batman-adv/network-coding.c:471
softirqs last disabled at (597424): [<ffff80000bfd44c4>] spin_lock_bh include/linux/spinlock.h:355 [inline]
softirqs last disabled at (597424): [<ffff80000bfd44c4>] batadv_nc_purge_paths+0x60/0x214 net/batman-adv/network-coding.c:442
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 2836 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 0 PID: 2836 Comm: kworker/u4:4 Tainted: G        W          6.2.0-rc3-syzkaller-00011-g0af4af977a59 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff8000164abad0
x29: ffff8000164abad0
 x28: ffff0000c39dbe78
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c82e1000
 x18: 000000000000032e

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c60dce00

x14: 0000000000000110
 x13: 00000000ffffffff
 x12: ffff0000c60dce00

x11: ff808000095945e8
 x10: 0000000000000000
 x9 : ffff8000095945e8

x8 : ffff0000c60dce00
 x7 : ffff80000c1090e0
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 600672
hardirqs last  enabled at (600671): [<ffff80000c1238f8>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (600671): [<ffff80000c1238f8>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (600672): [<ffff80000c110630>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (600626): [<ffff80000bfd4634>] spin_unlock_bh include/linux/spinlock.h:395 [inline]
softirqs last  enabled at (600626): [<ffff80000bfd4634>] batadv_nc_purge_paths+0x1d0/0x214 net/batman-adv/network-coding.c:471
softirqs last disabled at (600624): [<ffff80000bfd44c4>] spin_lock_bh include/linux/spinlock.h:355 [inline]
softirqs last disabled at (600624): [<ffff80000bfd44c4>] batadv_nc_purge_paths+0x60/0x214 net/batman-adv/network-coding.c:442
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 0 PID: 2836 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:

CPU: 0 PID: 2836 Comm: kworker/u4:4 Tainted: G        W          6.2.0-rc3-syzkaller-00011-g0af4af977a59 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff8000164abad0
x29: ffff8000164abad0
 x28: ffff0000cc27d878
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000d1727000
 x18: 0000000000000315

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c60dce00

x14: 0000000000000110
 x13: 00000000ffffffff
 x12: ffff0000c60dce00

x11: ff808000095945e8
 x10: 0000000000000000
 x9 : ffff8000095945e8

x8 : ffff0000c60dce00
 x7 : ffff80000c1090e0
 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 603390
hardirqs last  enabled at (603389): [<ffff80000c1238f8>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (603389): [<ffff80000c1238f8>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (603390): [<ffff80000c110630>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (603380): [<ffff80000bfd4634>] spin_unlock_bh include/linux/spinlock.h:395 [inline]
softirqs last  enabled at (603380): [<ffff80000bfd4634>] batadv_nc_purge_paths+0x1d0/0x214 net/batman-adv/network-coding.c:471
softirqs last disabled at (603378): [<ffff80000bfd44c4>] spin_lock_bh include/linux/spinlock.h:355 [inline]
softirqs last disabled at (603378): [<ffff80000bfd44c4>] batadv_nc_purge_paths+0x60/0x214 net/batman-adv/network-coding.c:442
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 2836 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 2836 Comm: kworker/u4:4 Tainted: G        W          6.2.0-rc3-syzkaller-00011-g0af4af977a59 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff8000164abad0
x29: ffff8000164abad0 x28: ffff0000c63c7478 x27: ffff80000d49b000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c9364000 x18: 0000000000000150
x17: ffff8001f1b6b000 x16: ffff80000dd86118 x15: ffff0000c60dce00
x14: 0000000000000110 x13: 00000000ffffffff x12: ffff0000c60dce00
x11: ff808000095945e8 x10: 0000000000000000 x9 : ffff8000095945e8
x8 : ffff0000c60dce00 x7 : ffff80000c1090e0 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 613556
hardirqs last  enabled at (613555): [<ffff80000c1238f8>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (613555): [<ffff80000c1238f8>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (613556): [<ffff80000c110630>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (613530): [<ffff80000bd93034>] spin_unlock_bh include/linux/spinlock.h:395 [inline]
softirqs last  enabled at (613530): [<ffff80000bd93034>] ieee80211_ibss_work+0x184/0x9f0 net/mac80211/ibss.c:1701
softirqs last disabled at (613528): [<ffff80000bd92f18>] spin_lock_bh include/linux/spinlock.h:355 [inline]
softirqs last disabled at (613528): [<ffff80000bd92f18>] ieee80211_ibss_work+0x68/0x9f0 net/mac80211/ibss.c:1690
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 2836 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:
CPU: 1 PID: 2836 Comm: kworker/u4:4 Tainted: G        W          6.2.0-rc3-syzkaller-00011-g0af4af977a59 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff8000164abad0
x29: ffff8000164abad0
 x28: ffff0000cc1fb378
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c70e9000 x18: 000000000000028f
x17: 0000000000000075 x16: ffff80000dd86118 x15: ffff0000c60dce00
x14: 0000000000000110 x13: 00000000ffffffff x12: ffff0000c60dce00
x11: ff808000095945e8
 x10: 0000000000000000
 x9 : ffff8000095945e8

x8 : ffff0000c60dce00
 x7 : ffff80000c1090e0
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 621634
hardirqs last  enabled at (621633): [<ffff80000c1238f8>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (621633): [<ffff80000c1238f8>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (621634): [<ffff80000c110630>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (621566): [<ffff80000bfd4634>] spin_unlock_bh include/linux/spinlock.h:395 [inline]
softirqs last  enabled at (621566): [<ffff80000bfd4634>] batadv_nc_purge_paths+0x1d0/0x214 net/batman-adv/network-coding.c:471
softirqs last disabled at (621564): [<ffff80000bfd44c4>] spin_lock_bh include/linux/spinlock.h:355 [inline]
softirqs last disabled at (621564): [<ffff80000bfd44c4>] batadv_nc_purge_paths+0x60/0x214 net/batman-adv/network-coding.c:442
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
WARNING: CPU: 1 PID: 2836 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
Modules linked in:

CPU: 1 PID: 2836 Comm: kworker/u4:4 Tainted: G        W          6.2.0-rc3-syzkaller-00011-g0af4af977a59 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: events_unbound io_ring_exit_work

pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
sp : ffff8000164abad0
x29: ffff8000164abad0
 x28: ffff0000c4c59b78
 x27: ffff80000d49b000

x26: 0000000000000000
 x25: 0000000000000000
 x24: 0000000000000000

x23: 0000000000000000
 x22: 0000000000000000
 x21: 0000000000000000

x20: 0000000000000000
 x19: ffff0000c70eb000
 x18: 000000000000036d

x17: ffff80000c15d8bc
 x16: ffff80000dd86118
 x15: ffff0000c60dce00

x14: 0000000000000110
 x13: 00000000ffffffff
 x12: ffff0000c60dce00

x11: ff808000095945e8
 x10: 0000000000000000
 x9 : ffff8000095945e8

x8 : ffff0000c60dce00
 x7 : ffff80000c1090e0
 x6 : 0000000000000000

x5 : 0000000000000000
 x4 : 0000000000000000
 x3 : 0000000000000000

x2 : 0000000000000000
 x1 : 0000000000000000
 x0 : 0000000000000000

Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
irq event stamp: 623186
hardirqs last  enabled at (623185): [<ffff80000c1238f8>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
hardirqs last  enabled at (623185): [<ffff80000c1238f8>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
hardirqs last disabled at (623186): [<ffff80000c110630>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (623164): [<ffff80000bd93034>] spin_unlock_bh include/linux/spinlock.h:395 [inline]
softirqs last  enabled at (623164): [<ffff80000bd93034>] ieee80211_ibss_work+0x184/0x9f0 net/mac80211/ibss.c:1701
softirqs last disabled at (623162): [<ffff80000bd92f18>] spin_lock_bh include/linux/spinlock.h:355 [inline]
softirqs last disabled at (623162): [<ffff80000bd92f18>] ieee80211_ibss_work+0x68/0x9f0 net/mac80211/ibss.c:1690
---[ end trace 0000000000000000 ]---


Tested on:

commit:         0af4af97 io_uring/poll: add hash if ready poll request..
git tree:       git://git.kernel.dk/linux.git syztest
console output: https://syzkaller.appspot.com/x/log.txt?x=1415a902480000
kernel config:  https://syzkaller.appspot.com/x/.config?x=965a23481ff8fa50
dashboard link: https://syzkaller.appspot.com/bug?extid=6805087452d72929404e
compiler:       Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
userspace arch: arm64

Note: no patches were applied.

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [syzbot] WARNING in io_cqring_event_overflow
  2023-01-12 10:56   ` syzbot
@ 2023-01-12 15:27     ` Jens Axboe
  2023-01-12 18:11     ` Pavel Begunkov
  1 sibling, 0 replies; 7+ messages in thread
From: Jens Axboe @ 2023-01-12 15:27 UTC (permalink / raw)
  To: syzbot, asml.silence, io-uring, linux-kernel, syzkaller-bugs

On 1/12/23 3:56?AM, syzbot wrote:
> Hello,
> 
> syzbot has tested the proposed patch but the reproducer is still triggering an issue:
> WARNING in io_cqring_event_overflow
> 
> ------------[ cut here ]------------
> WARNING: CPU: 1 PID: 2836 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> Modules linked in:
> CPU: 1 PID: 2836 Comm: kworker/u4:4 Not tainted 6.2.0-rc3-syzkaller-00011-g0af4af977a59 #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
> Workqueue: events_unbound io_ring_exit_work
> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
> pc : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> lr : io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
> sp : ffff8000164abad0
> x29: ffff8000164abad0
>  x28: ffff0000c655e578
>  x27: ffff80000d49b000
> 
> x26: 0000000000000000
>  x25: 0000000000000000
>  x24: 0000000000000000
> 
> x23: 0000000000000000
>  x22: 0000000000000000
>  x21: 0000000000000000
> 
> x20: 0000000000000000
>  x19: ffff0000d1727000
>  x18: 00000000000000c0
> 
> x17: ffff80000df48158
>  x16: ffff80000dd86118
>  x15: ffff0000c60dce00
> 
> x14: 0000000000000110
>  x13: 00000000ffffffff
>  x12: ffff0000c60dce00
> 
> x11: ff808000095945e8
>  x10: 0000000000000000
>  x9 : ffff8000095945e8
> 
> x8 : ffff0000c60dce00
>  x7 : ffff80000c1090e0
>  x6 : 0000000000000000
> 
> x5 : 0000000000000000
>  x4 : 0000000000000000
>  x3 : 0000000000000000
> 
> x2 : 0000000000000000
>  x1 : 0000000000000000
>  x0 : 0000000000000000
> 
> Call trace:
>  io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
>  io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
>  io_fill_cqe_req io_uring/io_uring.h:168 [inline]
>  io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
>  io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
>  io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
>  io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
>  process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
>  worker_thread+0x340/0x610 kernel/workqueue.c:2436
>  kthread+0x12c/0x158 kernel/kthread.c:376
>  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
> irq event stamp: 576210
> hardirqs last  enabled at (576209): [<ffff80000c1238f8>] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline]
> hardirqs last  enabled at (576209): [<ffff80000c1238f8>] _raw_spin_unlock_irq+0x3c/0x70 kernel/locking/spinlock.c:202
> hardirqs last disabled at (576210): [<ffff80000c110630>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
> softirqs last  enabled at (576168): [<ffff80000bfd4634>] spin_unlock_bh include/linux/spinlock.h:395 [inline]
> softirqs last  enabled at (576168): [<ffff80000bfd4634>] batadv_nc_purge_paths+0x1d0/0x214 net/batman-adv/network-coding.c:471
> softirqs last disabled at (576166): [<ffff80000bfd44c4>] spin_lock_bh include/linux/spinlock.h:355 [inline]
> softirqs last disabled at (576166): [<ffff80000bfd44c4>] batadv_nc_purge_paths+0x60/0x214 net/batman-adv/network-coding.c:442
> ---[ end trace 0000000000000000 ]---
> ------------[ cut here ]------------

Pavel, don't we want to make this follow the usual lockdep rules?


diff --git a/io_uring/io_uring.c b/io_uring/io_uring.c
index 1dd0fc0412c8..5aab3fa3b7c5 100644
--- a/io_uring/io_uring.c
+++ b/io_uring/io_uring.c
@@ -753,7 +753,7 @@ static bool io_cqring_event_overflow(struct io_ring_ctx *ctx, u64 user_data,
 	size_t ocq_size = sizeof(struct io_overflow_cqe);
 	bool is_cqe32 = (ctx->flags & IORING_SETUP_CQE32);
 
-	lockdep_assert_held(&ctx->completion_lock);
+	io_lockdep_assert_cq_locked(ctx);
 
 	if (is_cqe32)
 		ocq_size += sizeof(struct io_uring_cqe);

-- 
Jens Axboe


^ permalink raw reply related	[flat|nested] 7+ messages in thread

* Re: [syzbot] WARNING in io_cqring_event_overflow
  2023-01-12 10:56   ` syzbot
  2023-01-12 15:27     ` Jens Axboe
@ 2023-01-12 18:11     ` Pavel Begunkov
  2023-01-13  2:51       ` syzbot
  2023-01-13  3:10       ` Jens Axboe
  1 sibling, 2 replies; 7+ messages in thread
From: Pavel Begunkov @ 2023-01-12 18:11 UTC (permalink / raw)
  To: syzbot, axboe, io-uring, linux-kernel, syzkaller-bugs

On 1/12/23 10:56, syzbot wrote:
> Hello,
> 
> syzbot has tested the proposed patch but the reproducer is still triggering an issue:
> WARNING in io_cqring_event_overflow

#syz test: https://github.com/isilence/linux.git overflow-lock

-- 
Pavel Begunkov

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [syzbot] WARNING in io_cqring_event_overflow
  2023-01-12 18:11     ` Pavel Begunkov
@ 2023-01-13  2:51       ` syzbot
  2023-01-13  3:10       ` Jens Axboe
  1 sibling, 0 replies; 7+ messages in thread
From: syzbot @ 2023-01-13  2:51 UTC (permalink / raw)
  To: asml.silence, axboe, io-uring, linux-kernel, syzkaller-bugs

Hello,

syzbot has tested the proposed patch and the reproducer did not trigger any issue:

Reported-and-tested-by: syzbot+6805087452d72929404e@syzkaller.appspotmail.com

Tested on:

commit:         7b9484d4 io_uring: lock overflowing for IOPOLL
git tree:       https://github.com/isilence/linux.git overflow-lock
console output: https://syzkaller.appspot.com/x/log.txt?x=177064a6480000
kernel config:  https://syzkaller.appspot.com/x/.config?x=5bdd5369dfff2192
dashboard link: https://syzkaller.appspot.com/bug?extid=6805087452d72929404e
compiler:       Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
userspace arch: arm64

Note: no patches were applied.
Note: testing is done by a robot and is best-effort only.

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [syzbot] WARNING in io_cqring_event_overflow
  2023-01-12 18:11     ` Pavel Begunkov
  2023-01-13  2:51       ` syzbot
@ 2023-01-13  3:10       ` Jens Axboe
  1 sibling, 0 replies; 7+ messages in thread
From: Jens Axboe @ 2023-01-13  3:10 UTC (permalink / raw)
  To: Pavel Begunkov, syzbot, io-uring, linux-kernel, syzkaller-bugs

On 1/12/23 11:11 AM, Pavel Begunkov wrote:
> On 1/12/23 10:56, syzbot wrote:
>> Hello,
>>
>> syzbot has tested the proposed patch but the reproducer is still triggering an issue:
>> WARNING in io_cqring_event_overflow
> 
> #syz test: https://github.com/isilence/linux.git overflow-lock

I picked this one up so it can make the pull this week, jfyi.

-- 
Jens Axboe



^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2023-01-13  3:10 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-01-12 10:20 [syzbot] WARNING in io_cqring_event_overflow syzbot
2023-01-12 10:37 ` Pavel Begunkov
2023-01-12 10:56   ` syzbot
2023-01-12 15:27     ` Jens Axboe
2023-01-12 18:11     ` Pavel Begunkov
2023-01-13  2:51       ` syzbot
2023-01-13  3:10       ` Jens Axboe

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.