INFO: task syz-executor.0:15164 blocked for more than 143 seconds. Not tainted 5.10.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.0 state:D stack:26024 pid:15164 ppid: 8471 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:3774 [inline] __schedule+0x92c/0xcb0 kernel/sched/core.c:4523 schedule+0x14b/0x200 kernel/sched/core.c:4601 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:4660 __mutex_lock_common+0x122f/0x2f20 kernel/locking/mutex.c:1033 __mutex_lock kernel/locking/mutex.c:1103 [inline] mutex_lock_nested+0x1a/0x20 kernel/locking/mutex.c:1118 tcf_action_init_1+0x4fd/0xa80 net/sched/act_api.c:968 tcf_action_init+0x12f/0x4d0 net/sched/act_api.c:1043 tcf_action_add net/sched/act_api.c:1456 [inline] tc_ctl_action+0x2c7/0x7d0 net/sched/act_api.c:1509 rtnetlink_rcv_msg+0x889/0xd40 net/core/rtnetlink.c:5562 netlink_rcv_skb+0x190/0x3a0 net/netlink/af_netlink.c:2494 netlink_unicast_kernel net/netlink/af_netlink.c:1304 [inline] netlink_unicast+0x780/0x930 net/netlink/af_netlink.c:1330 netlink_sendmsg+0x9a8/0xd40 net/netlink/af_netlink.c:1919 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg net/socket.c:671 [inline] ____sys_sendmsg+0x519/0x800 net/socket.c:2353 ___sys_sendmsg net/socket.c:2407 [inline] __sys_sendmsg+0x2b1/0x360 net/socket.c:2440 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45deb9 Code: Unable to access opcode bytes at RIP 0x45de8f. RSP: 002b:00007fcbcac74c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000000000002e680 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000020002980 RDI: 0000000000000005 RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c R13: 00007ffc47d97a5f R14: 00007fcbcac759c0 R15: 000000000118bf2c INFO: task syz-executor.0:15191 blocked for more than 143 seconds. Not tainted 5.10.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.0 state:D stack:28864 pid:15191 ppid: 8471 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:3774 [inline] __schedule+0x92c/0xcb0 kernel/sched/core.c:4523 schedule+0x14b/0x200 kernel/sched/core.c:4601 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:4660 __mutex_lock_common+0x122f/0x2f20 kernel/locking/mutex.c:1033 __mutex_lock kernel/locking/mutex.c:1103 [inline] mutex_lock_nested+0x1a/0x20 kernel/locking/mutex.c:1118 sock_do_ioctl+0x11e/0x260 net/socket.c:1060 sock_ioctl+0x4ad/0x690 net/socket.c:1198 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:739 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45deb9 Code: Unable to access opcode bytes at RIP 0x45de8f. RSP: 002b:00007fcbcac11c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000013200 RCX: 000000000045deb9 RDX: 0000000000400200 RSI: 0000000000008912 RDI: 0000000000000004 RBP: 000000000118c158 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118c124 R13: 00007ffc47d97a5f R14: 00007fcbcac129c0 R15: 000000000118c124 INFO: task syz-executor.0:15192 blocked for more than 144 seconds. Not tainted 5.10.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.0 state:D stack:28816 pid:15192 ppid: 8471 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:3774 [inline] __schedule+0x92c/0xcb0 kernel/sched/core.c:4523 schedule+0x14b/0x200 kernel/sched/core.c:4601 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:4660 __mutex_lock_common+0x122f/0x2f20 kernel/locking/mutex.c:1033 __mutex_lock kernel/locking/mutex.c:1103 [inline] mutex_lock_nested+0x1a/0x20 kernel/locking/mutex.c:1118 rtnl_lock net/core/rtnetlink.c:72 [inline] rtnetlink_rcv_msg+0x83c/0xd40 net/core/rtnetlink.c:5559 netlink_rcv_skb+0x190/0x3a0 net/netlink/af_netlink.c:2494 netlink_unicast_kernel net/netlink/af_netlink.c:1304 [inline] netlink_unicast+0x780/0x930 net/netlink/af_netlink.c:1330 netlink_sendmsg+0x9a8/0xd40 net/netlink/af_netlink.c:1919 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg net/socket.c:671 [inline] ____sys_sendmsg+0x519/0x800 net/socket.c:2353 ___sys_sendmsg net/socket.c:2407 [inline] __sys_sendmsg+0x2b1/0x360 net/socket.c:2440 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45deb9 Code: Unable to access opcode bytes at RIP 0x45de8f. RSP: 002b:00007fcbcabf0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000000000002e680 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000020002980 RDI: 0000000000000005 RBP: 000000000118c200 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118c1cc R13: 00007ffc47d97a5f R14: 00007fcbcabf19c0 R15: 000000000118c1cc INFO: task syz-executor.0:15193 blocked for more than 144 seconds. Not tainted 5.10.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.0 state:D stack:28816 pid:15193 ppid: 8471 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:3774 [inline] __schedule+0x92c/0xcb0 kernel/sched/core.c:4523 schedule+0x14b/0x200 kernel/sched/core.c:4601 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:4660 __mutex_lock_common+0x122f/0x2f20 kernel/locking/mutex.c:1033 __mutex_lock kernel/locking/mutex.c:1103 [inline] mutex_lock_nested+0x1a/0x20 kernel/locking/mutex.c:1118 rtnl_lock net/core/rtnetlink.c:72 [inline] rtnetlink_rcv_msg+0x83c/0xd40 net/core/rtnetlink.c:5559 netlink_rcv_skb+0x190/0x3a0 net/netlink/af_netlink.c:2494 netlink_unicast_kernel net/netlink/af_netlink.c:1304 [inline] netlink_unicast+0x780/0x930 net/netlink/af_netlink.c:1330 netlink_sendmsg+0x9a8/0xd40 net/netlink/af_netlink.c:1919 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg net/socket.c:671 [inline] ____sys_sendmsg+0x519/0x800 net/socket.c:2353 ___sys_sendmsg net/socket.c:2407 [inline] __sys_sendmsg+0x2b1/0x360 net/socket.c:2440 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45deb9 Code: Unable to access opcode bytes at RIP 0x45de8f. RSP: 002b:00007fcbcabcfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000000000002e680 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000020002980 RDI: 0000000000000006 RBP: 000000000118c2a8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118c274 R13: 00007ffc47d97a5f R14: 00007fcbcabd09c0 R15: 000000000118c274 Showing all locks held in the system: 1 lock held by khungtaskd/1643: #0: ffffffff8bae6800 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 arch/x86/pci/mmconfig_64.c:151 1 lock held by in:imklog/8135: #0: ffff8880259f5270 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0x24b/0x2e0 fs/file.c:932 2 locks held by rs:main Q:Reg/8137: #0: ffff8880170e45f0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0x24b/0x2e0 fs/file.c:932 #1: ffff888022896460 (sb_writers#5){.+.+}-{0:0}, at: file_start_write include/linux/fs.h:2759 [inline] #1: ffff888022896460 (sb_writers#5){.+.+}-{0:0}, at: vfs_write+0x231/0xcf0 fs/read_write.c:601 3 locks held by kworker/1:6/13033: #0: ffff8880215cbd38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x6f4/0xfc0 kernel/workqueue.c:2245 #1: ffffc9000236fd80 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x733/0xfc0 kernel/workqueue.c:2247 #2: ffffffff8caa5ec8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 net/ipv6/addrconf.c:4568 4 locks held by kworker/u4:4/12201: #0: ffff8881407b2938 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x6f4/0xfc0 kernel/workqueue.c:2245 #1: ffffc90001b9fd80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x733/0xfc0 kernel/workqueue.c:2247 #2: ffffffff8ca9a970 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xac/0xba0 net/core/net_namespace.c:566 #3: ffffffff8caa5ec8 (rtnl_mutex){+.+.}-{3:3}, at: wg_netns_pre_exit+0x1b/0x1a0 drivers/net/wireguard/device.c:401 1 lock held by syz-executor.0/15164: #0: ffffffff8caa5ec8 (rtnl_mutex){+.+.}-{3:3}, at: tcf_action_init_1+0x4fd/0xa80 net/sched/act_api.c:968 1 lock held by syz-executor.0/15167: 1 lock held by syz-executor.0/15191: #0: ffffffff8caa5ec8 (rtnl_mutex){+.+.}-{3:3}, at: sock_do_ioctl+0x11e/0x260 net/socket.c:1060 1 lock held by syz-executor.0/15192: #0: ffffffff8caa5ec8 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:72 [inline] #0: ffffffff8caa5ec8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x83c/0xd40 net/core/rtnetlink.c:5559 1 lock held by syz-executor.0/15193: #0: ffffffff8caa5ec8 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:72 [inline] #0: ffffffff8caa5ec8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x83c/0xd40 net/core/rtnetlink.c:5559 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1643 Comm: khungtaskd Not tainted 5.10.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x137/0x1be lib/dump_stack.c:118 nmi_cpu_backtrace+0x16c/0x190 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x191/0x2f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:209 [inline] watchdog+0xcb0/0xcf0 kernel/hung_task.c:294 kthread+0x36b/0x390 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 11353 Comm: kworker/u4:6 Not tainted 5.10.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_nc_worker RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:29 [inline] RIP: 0010:rcu_dynticks_curr_cpu_in_eqs kernel/rcu/tree.c:321 [inline] RIP: 0010:rcu_is_watching+0x4e/0xb0 kernel/rcu/tree.c:1102 Code: 8d 34 dd 60 a6 5c 8b 4c 89 f0 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 f7 e8 5f 6e 55 00 48 c7 c3 68 57 03 00 49 03 1e 48 89 d8 <48> c1 e8 03 42 8a 04 38 84 c0 75 1d 8b 03 65 ff 0d f9 63 a0 7e 74 RSP: 0018:ffffc9000232fb60 EFLAGS: 00000282 RAX: ffff8880b9c35768 RBX: ffff8880b9c35768 RCX: ffff88806beab480 RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 RBP: 0000000000000002 R08: dffffc0000000000 R09: fffffbfff19dc46e R10: fffffbfff19dc46e R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: ffffffff8b5ca660 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7bd0066b00 CR3: 0000000070eb9000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: rcu_read_lock_held_common kernel/rcu/update.c:106 [inline] rcu_read_lock_sched_held+0x23/0xb0 kernel/rcu/update.c:121 trace_lock_acquire+0x6b/0x180 include/trace/events/lock.h:13 lock_acquire+0x39/0x5e0 kernel/locking/lockdep.c:5407 rcu_lock_acquire+0x2a/0x30 include/linux/rcupdate.h:248 rcu_read_lock include/linux/rcupdate.h:641 [inline] batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:407 [inline] batadv_nc_worker+0xc8/0x5c0 net/batman-adv/network-coding.c:718 process_one_work+0x789/0xfc0 kernel/workqueue.c:2272 worker_thread+0xaa4/0x1460 kernel/workqueue.c:2418 kthread+0x36b/0x390 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296