INFO: task syz-executor.4:29574 blocked for more than 143 seconds. Not tainted 5.10.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.4 state:D stack:25280 pid:29574 ppid: 12059 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:3774 [inline] __schedule+0x893/0x2130 kernel/sched/core.c:4523 schedule+0xcf/0x270 kernel/sched/core.c:4601 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:4660 __mutex_lock_common kernel/locking/mutex.c:1033 [inline] __mutex_lock+0x3e2/0x10e0 kernel/locking/mutex.c:1103 tcf_action_init_1+0x747/0x990 net/sched/act_api.c:968 tcf_action_init+0x265/0x4b0 net/sched/act_api.c:1043 tcf_action_add+0xd9/0x360 net/sched/act_api.c:1456 tc_ctl_action+0x33a/0x440 net/sched/act_api.c:1509 rtnetlink_rcv_msg+0x44e/0xad0 net/core/rtnetlink.c:5562 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2494 netlink_unicast_kernel net/netlink/af_netlink.c:1304 [inline] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1330 netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1919 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:671 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2353 ___sys_sendmsg+0xf3/0x170 net/socket.c:2407 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2440 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45deb9 Code: Unable to access opcode bytes at RIP 0x45de8f. RSP: 002b:00007f31549aac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000000000002e680 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000020002980 RDI: 0000000000000005 RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c R13: 00007ffd4193ba5f R14: 00007f31549ab9c0 R15: 000000000118bf2c INFO: task syz-executor.4:29617 blocked for more than 144 seconds. Not tainted 5.10.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.4 state:D stack:29536 pid:29617 ppid: 12059 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:3774 [inline] __schedule+0x893/0x2130 kernel/sched/core.c:4523 schedule+0xcf/0x270 kernel/sched/core.c:4601 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:4660 __mutex_lock_common kernel/locking/mutex.c:1033 [inline] __mutex_lock+0x3e2/0x10e0 kernel/locking/mutex.c:1103 sock_do_ioctl+0x1f2/0x2d0 net/socket.c:1060 sock_ioctl+0x3b8/0x730 net/socket.c:1198 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:739 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45deb9 Code: Unable to access opcode bytes at RIP 0x45de8f. RSP: 002b:00007f3154947c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000013200 RCX: 000000000045deb9 RDX: 0000000000400200 RSI: 0000000000008912 RDI: 0000000000000004 RBP: 000000000118c158 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118c124 R13: 00007ffd4193ba5f R14: 00007f31549489c0 R15: 000000000118c124 INFO: task syz-executor.4:29619 blocked for more than 144 seconds. Not tainted 5.10.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.4 state:D stack:28312 pid:29619 ppid: 12059 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:3774 [inline] __schedule+0x893/0x2130 kernel/sched/core.c:4523 schedule+0xcf/0x270 kernel/sched/core.c:4601 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:4660 __mutex_lock_common kernel/locking/mutex.c:1033 [inline] __mutex_lock+0x3e2/0x10e0 kernel/locking/mutex.c:1103 rtnl_lock net/core/rtnetlink.c:72 [inline] rtnetlink_rcv_msg+0x3f9/0xad0 net/core/rtnetlink.c:5559 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2494 netlink_unicast_kernel net/netlink/af_netlink.c:1304 [inline] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1330 netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1919 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:671 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2353 ___sys_sendmsg+0xf3/0x170 net/socket.c:2407 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2440 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45deb9 Code: Unable to access opcode bytes at RIP 0x45de8f. RSP: 002b:00007f3154926c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000000000002e680 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000020002980 RDI: 0000000000000005 RBP: 000000000118c200 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118c1cc R13: 00007ffd4193ba5f R14: 00007f31549279c0 R15: 000000000118c1cc INFO: task syz-executor.4:29620 blocked for more than 144 seconds. Not tainted 5.10.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.4 state:D stack:28312 pid:29620 ppid: 12059 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:3774 [inline] __schedule+0x893/0x2130 kernel/sched/core.c:4523 schedule+0xcf/0x270 kernel/sched/core.c:4601 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:4660 __mutex_lock_common kernel/locking/mutex.c:1033 [inline] __mutex_lock+0x3e2/0x10e0 kernel/locking/mutex.c:1103 rtnl_lock net/core/rtnetlink.c:72 [inline] rtnetlink_rcv_msg+0x3f9/0xad0 net/core/rtnetlink.c:5559 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2494 netlink_unicast_kernel net/netlink/af_netlink.c:1304 [inline] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1330 netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1919 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:671 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2353 ___sys_sendmsg+0xf3/0x170 net/socket.c:2407 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2440 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45deb9 Code: Unable to access opcode bytes at RIP 0x45de8f. RSP: 002b:00007f3154905c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000000000002e680 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000020002980 RDI: 0000000000000006 RBP: 000000000118c2a8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118c274 R13: 00007ffd4193ba5f R14: 00007f31549069c0 R15: 000000000118c274 Showing all locks held in the system: 2 locks held by kworker/u4:4/260: #0: ffff8880b9e34d18 (&rq->lock){-.-.}-{2:2}, at: rq_lock kernel/sched/sched.h:1292 [inline] #0: ffff8880b9e34d18 (&rq->lock){-.-.}-{2:2}, at: __schedule+0x21a/0x2130 kernel/sched/core.c:4441 #1: ffffc90001b4fda8 ((work_completion)(&(&bat_priv->nc.work)->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 kernel/workqueue.c:2247 1 lock held by khungtaskd/1654: #0: ffffffff8b337160 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6253 3 locks held by kworker/0:3/4929: #0: ffff8881471f0938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ffff8881471f0938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: atomic64_set include/asm-generic/atomic-instrumented.h:856 [inline] #0: ffff8881471f0938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: atomic_long_set include/asm-generic/atomic-long.h:41 [inline] #0: ffff8881471f0938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:616 [inline] #0: ffff8881471f0938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:643 [inline] #0: ffff8881471f0938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 kernel/workqueue.c:2243 #1: ffffc9000166fda8 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 kernel/workqueue.c:2247 #2: ffffffff8c926f88 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 net/ipv6/addrconf.c:4568 1 lock held by in:imklog/8174: #0: ffff888011306370 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:932 1 lock held by syz-executor.4/29574: #0: ffffffff8c926f88 (rtnl_mutex){+.+.}-{3:3}, at: tcf_action_init_1+0x747/0x990 net/sched/act_api.c:968 2 locks held by syz-executor.4/29581: 1 lock held by syz-executor.4/29617: #0: ffffffff8c926f88 (rtnl_mutex){+.+.}-{3:3}, at: sock_do_ioctl+0x1f2/0x2d0 net/socket.c:1060 1 lock held by syz-executor.4/29619: #0: ffffffff8c926f88 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:72 [inline] #0: ffffffff8c926f88 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3f9/0xad0 net/core/rtnetlink.c:5559 1 lock held by syz-executor.4/29620: #0: ffffffff8c926f88 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:72 [inline] #0: ffffffff8c926f88 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3f9/0xad0 net/core/rtnetlink.c:5559 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1654 Comm: khungtaskd Not tainted 5.10.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x107/0x163 lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x44/0xd7 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:209 [inline] watchdog+0xd43/0xfa0 kernel/hung_task.c:294 kthread+0x3af/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 7 Comm: kworker/0:1 Not tainted 5.10.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events nsim_dev_trap_report_work RIP: 0010:kernel_text_address+0x70/0xf0 kernel/extable.c:159 Code: 00 00 83 3d f5 9d a3 0b 01 76 20 e8 5a cf 13 00 84 c0 74 32 48 89 ef e8 4e a9 1d 00 84 c0 74 4f 48 83 c4 08 b8 01 00 00 00 5d 48 81 fd 00 e0 1e 8e 72 d7 48 81 fd 36 f4 32 8e 72 e3 e8 28 cf RSP: 0018:ffffc90000cc7818 EFLAGS: 00000292 RAX: 0000000000000001 RBX: ffffffff81b1111b RCX: 0000000000000000 RDX: 1ffff92000198f12 RSI: ffffc90000cc7b90 RDI: ffffffff81b1111b RBP: ffffc90000cc7890 R08: ffffffff8d6dab12 R09: 0000000000000001 R10: 0000000000082081 R11: 0000000000000001 R12: ffffc90000cc7900 R13: 0000000000000000 R14: ffff888010d23480 R15: 0000000000001000 FS: 0000000000000000(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fa275b59000 CR3: 0000000064594000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __kernel_text_address+0x9/0x30 kernel/extable.c:105 unwind_get_return_address arch/x86/kernel/unwind_orc.c:318 [inline] unwind_get_return_address+0x51/0x90 arch/x86/kernel/unwind_orc.c:313 arch_stack_walk+0x93/0xe0 arch/x86/kernel/stacktrace.c:26 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:121 kasan_save_stack+0x1b/0x40 mm/kasan/common.c:48 kasan_set_track mm/kasan/common.c:56 [inline] __kasan_kmalloc.constprop.0+0xc2/0xd0 mm/kasan/common.c:461 slab_post_alloc_hook mm/slab.h:526 [inline] slab_alloc_node mm/slub.c:2891 [inline] __kmalloc_node_track_caller+0x1eb/0x410 mm/slub.c:4495 __kmalloc_reserve net/core/skbuff.c:142 [inline] __alloc_skb+0xae/0x550 net/core/skbuff.c:210 alloc_skb include/linux/skbuff.h:1094 [inline] nsim_dev_trap_skb_build drivers/net/netdevsim/dev.c:505 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:562 [inline] nsim_dev_trap_report_work+0x2ac/0xbd0 drivers/net/netdevsim/dev.c:603 process_one_work+0x933/0x15a0 kernel/workqueue.c:2272 worker_thread+0x64c/0x1120 kernel/workqueue.c:2418 kthread+0x3af/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296