INFO: task kworker/u4:10:3938 blocked for more than 143 seconds. Not tainted 6.1.28-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/u4:10 state:D stack:21632 pid:3938 ppid:2 flags:0x00004000 Workqueue: netns cleanup_net Call Trace: context_switch kernel/sched/core.c:5241 [inline] __schedule+0x132c/0x4330 kernel/sched/core.c:6554 schedule+0xbf/0x180 kernel/sched/core.c:6630 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6689 __mutex_lock_common+0xe2b/0x2520 kernel/locking/mutex.c:679 __mutex_lock kernel/locking/mutex.c:747 [inline] mutex_lock_nested+0x17/0x20 kernel/locking/mutex.c:799 cangw_pernet_exit_batch+0x1c/0x90 net/can/gw.c:1250 ops_exit_list net/core/net_namespace.c:174 [inline] cleanup_net+0x763/0xb60 net/core/net_namespace.c:601 process_one_work+0x8aa/0x11f0 kernel/workqueue.c:2289 worker_thread+0xa5f/0x1210 kernel/workqueue.c:2436 kthread+0x26e/0x300 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 INFO: task syz-executor.2:23772 blocked for more than 143 seconds. Not tainted 6.1.28-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.2 state:D stack:25376 pid:23772 ppid:3579 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:5241 [inline] __schedule+0x132c/0x4330 kernel/sched/core.c:6554 schedule+0xbf/0x180 kernel/sched/core.c:6630 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6689 __mutex_lock_common+0xe2b/0x2520 kernel/locking/mutex.c:679 __mutex_lock kernel/locking/mutex.c:747 [inline] mutex_lock_nested+0x17/0x20 kernel/locking/mutex.c:799 wg_set_device+0x100/0x2030 drivers/net/wireguard/netlink.c:504 genl_family_rcv_msg_doit net/netlink/genetlink.c:756 [inline] genl_family_rcv_msg net/netlink/genetlink.c:833 [inline] genl_rcv_msg+0xc1a/0xf70 net/netlink/genetlink.c:850 netlink_rcv_skb+0x1cd/0x410 net/netlink/af_netlink.c:2524 genl_rcv+0x24/0x40 net/netlink/genetlink.c:861 netlink_unicast_kernel net/netlink/af_netlink.c:1328 [inline] netlink_unicast+0x7bf/0x990 net/netlink/af_netlink.c:1354 netlink_sendmsg+0xa26/0xd60 net/netlink/af_netlink.c:1902 sock_sendmsg_nosec net/socket.c:716 [inline] sock_sendmsg net/socket.c:736 [inline] ____sys_sendmsg+0x59e/0x8f0 net/socket.c:2482 ___sys_sendmsg net/socket.c:2536 [inline] __sys_sendmsg+0x2a9/0x390 net/socket.c:2565 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f750dc8c169 RSP: 002b:00007f750e9c0168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f750ddac120 RCX: 00007f750dc8c169 RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 RBP: 00007f750dce7ca1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffffa02e1ef R14: 00007f750e9c0300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by rcu_tasks_kthre/12: #0: ffffffff8cf274b0 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x29/0xd20 kernel/rcu/tasks.h:510 1 lock held by rcu_tasks_trace/13: #0: ffffffff8cf27cb0 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x29/0xd20 kernel/rcu/tasks.h:510 1 lock held by khungtaskd/28: #0: ffffffff8cf272e0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 2 locks held by getty/3302: #0: ffff888028bf9098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 drivers/tty/tty_ldisc.c:244 #1: ffffc900031262f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6a7/0x1db0 drivers/tty/n_tty.c:2177 4 locks held by kworker/u4:10/3938: #0: ffff888012606938 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x77a/0x11f0 #1: ffffc900055bfd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7bd/0x11f0 kernel/workqueue.c:2264 #2: ffffffff8e085e90 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 net/core/net_namespace.c:563 #3: ffffffff8e092248 (rtnl_mutex){+.+.}-{3:3}, at: cangw_pernet_exit_batch+0x1c/0x90 net/can/gw.c:1250 3 locks held by kworker/1:6/18630: #0: ffff888027b63538 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x77a/0x11f0 #1: ffffc90003cafd20 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7bd/0x11f0 kernel/workqueue.c:2264 #2: ffffffff8e092248 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x15/0x30 net/ipv6/addrconf.c:4629 3 locks held by kworker/0:17/20017: #0: ffff888027b63538 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x77a/0x11f0 #1: ffffc9000b7b7d20 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7bd/0x11f0 kernel/workqueue.c:2264 #2: ffffffff8e092248 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x15/0x30 net/ipv6/addrconf.c:4629 2 locks held by syz-executor.1/23748: 3 locks held by syz-executor.2/23772: #0: ffffffff8e0f9570 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40 net/netlink/genetlink.c:860 #1: ffffffff8e0f9428 (genl_mutex){+.+.}-{3:3}, at: genl_lock net/netlink/genetlink.c:33 [inline] #1: ffffffff8e0f9428 (genl_mutex){+.+.}-{3:3}, at: genl_rcv_msg+0x125/0xf70 net/netlink/genetlink.c:848 #2: ffffffff8e092248 (rtnl_mutex){+.+.}-{3:3}, at: wg_set_device+0x100/0x2030 drivers/net/wireguard/netlink.c:504 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 28 Comm: khungtaskd Not tainted 6.1.28-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106 nmi_cpu_backtrace+0x4e1/0x560 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x1b0/0x3f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:148 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:220 [inline] watchdog+0xf18/0xf60 kernel/hung_task.c:377 kthread+0x26e/0x300 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 23748 Comm: syz-executor.1 Not tainted 6.1.28-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:write_comp_data kernel/kcov.c:235 [inline] RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x4/0x80 kernel/kcov.c:311 Code: 89 f8 89 f6 49 ff c2 4c 89 11 48 c7 44 0a 08 05 00 00 00 48 89 44 0a 10 48 89 74 0a 18 4c 89 44 0a 20 c3 0f 1f 00 4c 8b 04 24 <65> 48 8b 0d 94 9b 78 7e 65 8b 05 95 9b 78 7e a9 00 01 ff 00 74 10 RSP: 0018:ffffc900031bdce0 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffffea0001019ff8 RCX: ffff888034130000 RDX: ffffc9000adda000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffea0001019fc8 R08: ffffffff81be38ae R09: fffff940002033f9 R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffffd40002033f9 R13: 0000000000000000 R14: ffffea0001019fc0 R15: ffff88807def2000 FS: 00007f2e90c6c700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c012e9d040 CR3: 0000000036cb1000 CR4: 00000000003506e0 Call Trace: folio_memcg_kmem include/linux/memcontrol.h:538 [inline] folio_memcg+0xae/0x4f0 include/linux/memcontrol.h:430 count_memcg_folio_events include/linux/memcontrol.h:1076 [inline] shrink_folio_list+0x1ab5/0x8ee0 mm/vmscan.c:2071 evict_folios+0xb42/0x2810 mm/vmscan.c:5027 lru_gen_shrink_lruvec mm/vmscan.c:5211 [inline] shrink_lruvec+0xdbf/0x4650 mm/vmscan.c:5906