IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 8021q: adding VLAN 0 to HW filter on device batadv0 INFO: task syz-executor.2:6976 blocked for more than 140 seconds. Not tainted 4.14.171-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.2 D28264 6976 6863 0x80000004 Call Trace: context_switch kernel/sched/core.c:2808 [inline] __schedule+0x786/0x1d30 kernel/sched/core.c:3384 schedule+0x7f/0x1b0 kernel/sched/core.c:3428 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x1fc/0x390 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x18/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:66 [inline] down_read+0x49/0xb0 kernel/locking/rwsem.c:26 exit_mm kernel/exit.c:511 [inline] do_exit+0x558/0x2c00 kernel/exit.c:845 do_group_exit+0xf4/0x2f0 kernel/exit.c:955 get_signal+0x2fe/0x1b40 kernel/signal.c:2418 do_signal+0x7f/0x19a0 arch/x86/kernel/signal.c:814 exit_to_usermode_loop+0x114/0x1b0 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x418/0x5b0 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x458c7a RSP: 002b:00007fff80d81e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: fffffffffffffffc RBX: 0000000000000003 RCX: 0000000000458c7a RDX: 0000000000000003 RSI: 0000000000021000 RDI: 0000000000000000 RBP: ffffffffffffffff R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000020022 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000021000 R14: 0000000000020022 R15: 0000000000000000 INFO: task syz-executor.2:6977 blocked for more than 140 seconds. Not tainted 4.14.171-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.2 D29088 6977 6863 0x80000004 Call Trace: context_switch kernel/sched/core.c:2808 [inline] __schedule+0x786/0x1d30 kernel/sched/core.c:3384 schedule+0x7f/0x1b0 kernel/sched/core.c:3428 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x1fc/0x390 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x18/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:66 [inline] down_read+0x49/0xb0 kernel/locking/rwsem.c:26 exit_mm kernel/exit.c:511 [inline] do_exit+0x558/0x2c00 kernel/exit.c:845 do_group_exit+0xf4/0x2f0 kernel/exit.c:955 get_signal+0x2fe/0x1b40 kernel/signal.c:2418 do_signal+0x7f/0x19a0 arch/x86/kernel/signal.c:814 exit_to_usermode_loop+0x114/0x1b0 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x418/0x5b0 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x458c29 RSP: 002b:00007f752ec8ccf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000073bf08 RCX: 0000000000458c29 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000073bf08 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000073bf0c R13: 00007fff80d81f3f R14: 00007f752ec8d9c0 R15: 000000000073bf0c Showing all locks held in the system: 1 lock held by khungtaskd/1012: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x79/0x218 kernel/locking/lockdep.c:4544 2 locks held by getty/6753: #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x2d/0x40 drivers/tty/tty_ldsem.c:376 #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x18f0 drivers/tty/n_tty.c:2156 2 locks held by getty/6754: #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x2d/0x40 drivers/tty/tty_ldsem.c:376 #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x18f0 drivers/tty/n_tty.c:2156 2 locks held by getty/6755: #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x2d/0x40 drivers/tty/tty_ldsem.c:376 #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x18f0 drivers/tty/n_tty.c:2156 2 locks held by getty/6756: #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x2d/0x40 drivers/tty/tty_ldsem.c:376 #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x18f0 drivers/tty/n_tty.c:2156 2 locks held by getty/6757: #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x2d/0x40 drivers/tty/tty_ldsem.c:376 #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x18f0 drivers/tty/n_tty.c:2156 2 locks held by getty/6758: #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x2d/0x40 drivers/tty/tty_ldsem.c:376 #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x18f0 drivers/tty/n_tty.c:2156 2 locks held by getty/6759: #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x2d/0x40 drivers/tty/tty_ldsem.c:376 #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x18f0 drivers/tty/n_tty.c:2156 1 lock held by syz-executor.2/6976: #0: (&mm->mmap_sem){++++}, at: [] exit_mm kernel/exit.c:511 [inline] #0: (&mm->mmap_sem){++++}, at: [] do_exit+0x558/0x2c00 kernel/exit.c:845 1 lock held by syz-executor.2/6977: #0: (&mm->mmap_sem){++++}, at: [] exit_mm kernel/exit.c:511 [inline] #0: (&mm->mmap_sem){++++}, at: [] do_exit+0x558/0x2c00 kernel/exit.c:845 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1012 Comm: khungtaskd Not tainted 4.14.171-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xf7/0x13b lib/dump_stack.c:58 nmi_cpu_backtrace.cold.4+0x3e/0x76 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0xe5/0x119 lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x522/0xb40 kernel/hung_task.c:274 kthread+0x33b/0x410 kernel/kthread.c:232 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 2247 Comm: kworker/u4:4 Not tainted 4.14.171-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_nc_worker task: ffff8880a1f46240 task.stack: ffff8880a1f60000 RIP: 0010:debug_lockdep_rcu_enabled+0x6e/0x90 kernel/rcu/update.c:299 RSP: 0018:ffff8880a1f67d08 EFLAGS: 00000297 RAX: 0000000000000001 RBX: ffff888089f71e70 RCX: 1ffffffff0ed2dad RDX: 0000000000000004 RSI: ffffffff86bbf160 RDI: ffffffff87cb4e40 RBP: ffff8880a1f67d08 R08: ffff8880a1f46b30 R09: 0000000000000000 R10: 0000000000000050 R11: ffff8880a1f46240 R12: ffff8880a5e67380 R13: 00000000000002af R14: 0000000000000000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f895294c140 CR3: 0000000094a46000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_read_unlock include/linux/rcupdate.h:681 [inline] batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:420 [inline] batadv_nc_worker+0x166/0x630 net/batman-adv/network-coding.c:726 process_one_work+0x7a3/0x16c0 kernel/workqueue.c:2114 worker_thread+0xcc/0xee0 kernel/workqueue.c:2248 kthread+0x33b/0x410 kernel/kthread.c:232 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:404 Code: b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 1c 8b 05 62 f9 7e 06 <85> c0 74 07 e8 29 ff ff ff 5d c3 31 c0 5d c3 e8 1e df 37 00 eb