INFO: task syz.3.415:7485 blocked for more than 144 seconds. Not tainted 6.12.0-rc1-syzkaller-00306-g27cc6fdf7201 #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.3.415 state:D stack:28048 pid:7485 tgid:7479 ppid:6845 flags:0x00000006 Call Trace: context_switch kernel/sched/core.c:5315 [inline] __schedule+0xef5/0x5750 kernel/sched/core.c:6675 __schedule_loop kernel/sched/core.c:6752 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6767 schedule_timeout+0x258/0x2a0 kernel/time/timer.c:2591 do_wait_for_common kernel/sched/completion.c:95 [inline] __wait_for_common+0x3e1/0x600 kernel/sched/completion.c:116 wait_for_common kernel/sched/completion.c:127 [inline] wait_for_completion_state+0x1c/0x40 kernel/sched/completion.c:264 coredump_wait fs/coredump.c:418 [inline] do_coredump+0x82f/0x4160 fs/coredump.c:575 get_signal+0x237c/0x26d0 kernel/signal.c:2902 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fe8c10403c0 RSP: 002b:00007fe8c1f1ba78 EFLAGS: 00000246 ORIG_RAX: 000000000000014e RAX: 0000000000000000 RBX: 00007fe8c1336208 RCX: 00007fe8c117dff9 RDX: 00007fe8c1f1ba80 RSI: 00007fe8c1f1bbb0 RDI: 000000000000000b RBP: 00007fe8c11f0296 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fe8c1336208 R15: 00007ffd91d07a48 Showing all locks held in the system: 2 locks held by kworker/u8:0/11: 4 locks held by kworker/u8:1/12: #0: ffff88801baed948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x1212/0x1b30 kernel/workqueue.c:3204 #1: ffffc90000117d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x8bb/0x1b30 kernel/workqueue.c:3205 #2: ffffffff8faad210 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xbb/0xb40 net/core/net_namespace.c:580 #3: ffffffff8fac2e28 (rtnl_mutex){+.+.}-{3:3}, at: wg_destruct+0x22/0x3d0 drivers/net/wireguard/device.c:246 1 lock held by khungtaskd/30: #0: ffffffff8ddb7800 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline] #0: ffffffff8ddb7800 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline] #0: ffffffff8ddb7800 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x7f/0x390 kernel/locking/lockdep.c:6720 3 locks held by kworker/u8:8/2964: #0: ffff88814b65c148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x1212/0x1b30 kernel/workqueue.c:3204 #1: ffffc9000a247d80 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work+0x8bb/0x1b30 kernel/workqueue.c:3205 #2: ffffffff8fac2e28 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_dad_work+0xcf/0x14d0 net/ipv6/addrconf.c:4196 2 locks held by dhcpcd/4899: #0: ffff888033f2f6c8 (nlk_cb_mutex-ROUTE){+.+.}-{3:3}, at: __netlink_dump_start+0x154/0x980 net/netlink/af_netlink.c:2404 #1: ffffffff8fac2e28 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:79 [inline] #1: ffffffff8fac2e28 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_dumpit+0x18f/0x1f0 net/core/rtnetlink.c:6505 2 locks held by getty/4985: #0: ffff88802efd90a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243 #1: ffffc90002f062f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfba/0x1480 drivers/tty/n_tty.c:2211 2 locks held by syz.3.272/6667: 2 locks held by syz.0.395/7297: 1 lock held by syz.1.414/7440: 1 lock held by syz.3.415/7480: 7 locks held by syz-executor/7871: #0: ffff88802e220420 (sb_writers#8){.+.+}-{0:0}, at: ksys_write+0x12f/0x260 fs/read_write.c:736 #1: ffff88807d41ec88 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x27b/0x500 fs/kernfs/file.c:325 #2: ffff8880270334b8 (kn->active#49){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x29e/0x500 fs/kernfs/file.c:326 #3: ffffffff8f068f28 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xd2/0x4b0 drivers/net/netdevsim/bus.c:216 #4: ffff8880318700e8 (&dev->mutex){....}-{3:3}, at: device_lock include/linux/device.h:1014 [inline] #4: ffff8880318700e8 (&dev->mutex){....}-{3:3}, at: __device_driver_lock drivers/base/dd.c:1095 [inline] #4: ffff8880318700e8 (&dev->mutex){....}-{3:3}, at: device_release_driver_internal+0xa4/0x610 drivers/base/dd.c:1293 #5: ffff888066c37250 (&devlink->lock_key#18){+.+.}-{3:3}, at: nsim_drv_remove+0x4a/0x1d0 drivers/net/netdevsim/dev.c:1672 #6: ffffffff8fac2e28 (rtnl_mutex){+.+.}-{3:3}, at: unregister_netdevice_notifier_net+0x1c/0xf0 net/core/dev.c:1917 3 locks held by syz-executor/7873: #0: ffffffff8fac2e28 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:79 [inline] #0: ffffffff8fac2e28 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x372/0xea0 net/core/rtnetlink.c:6643 #1: ffff888030085428 (&wg->device_update_lock){+.+.}-{3:3}, at: wg_open+0x203/0x4e0 drivers/net/wireguard/device.c:50 #2: ffffffff8ddc30f8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 kernel/rcu/tree_exp.h:329 1 lock held by syz-executor/7945: #0: ffffffff8ddc30f8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x282/0x3b0 kernel/rcu/tree_exp.h:297 ============================================= NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.12.0-rc1-syzkaller-00306-g27cc6fdf7201 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline] watchdog+0xf0c/0x1240 kernel/hung_task.c:379 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 7297 Comm: syz.0.395 Not tainted 6.12.0-rc1-syzkaller-00306-g27cc6fdf7201 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:__lock_acquire+0x1f2/0x3ce0 kernel/locking/lockdep.c:5110 Code: 00 49 8d b7 e0 0a 00 00 48 81 ea 60 b0 98 96 48 b9 29 5c 8f c2 f5 28 5c 8f 48 c1 fa 03 48 89 34 24 48 0f af d1 48 89 54 24 20 <8b> 54 24 08 4c 8d 14 92 85 d2 4e 8d 2c d5 00 00 00 00 74 54 f6 84 RSP: 0018:ffffc90002dbf578 EFLAGS: 00000807 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 8f5c28f5c28f5c29 RDX: 0000000000000022 RSI: ffff888027b30ae0 RDI: ffffffff8ddb7808 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff901cce8f R11: 0000000000000002 R12: ffffffff8ddb7800 R13: 0000000000000000 R14: 0000000000000000 R15: ffff888027b30000 FS: 00007f27349726c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000f000 CR3: 000000006a412000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire.part.0+0x11b/0x380 kernel/locking/lockdep.c:5825 rcu_lock_acquire include/linux/rcupdate.h:337 [inline] rcu_read_lock include/linux/rcupdate.h:849 [inline] page_ref_add_unless.constprop.0+0x36/0x390 include/linux/page_ref.h:235 folio_ref_add_unless include/linux/page_ref.h:248 [inline] folio_try_get include/linux/page_ref.h:264 [inline] filemap_get_entry+0x152/0x3c0 mm/filemap.c:1852 shmem_get_folio_gfp+0x221/0x1530 mm/shmem.c:2259 shmem_fault+0x200/0xae0 mm/shmem.c:2536 __do_fault+0x10a/0x490 mm/memory.c:4876 do_shared_fault mm/memory.c:5346 [inline] do_fault mm/memory.c:5420 [inline] do_pte_missing+0x1a8/0x3e50 mm/memory.c:3965 handle_pte_fault mm/memory.c:5751 [inline] __handle_mm_fault+0x100a/0x2a10 mm/memory.c:5894 handle_mm_fault+0x3fa/0xaa0 mm/memory.c:6062 do_user_addr_fault+0x7a3/0x13f0 arch/x86/mm/fault.c:1389 handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x5c/0xc0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:rep_stos_alternative+0x5b/0x80 arch/x86/lib/clear_page_64.S:103 Code: 73 ef eb de 66 66 2e 0f 1f 84 00 00 00 00 00 48 89 07 48 89 47 08 48 89 47 10 48 89 47 18 48 89 47 20 48 89 47 28 48 89 47 30 <48> 89 47 38 48 83 c7 40 48 83 e9 40 48 83 f9 40 73 d3 83 f9 08 73 RSP: 0018:ffffc90002dbfec8 EFLAGS: 00050202 RAX: 0000000000000000 RBX: 02000000000001fd RCX: 01ffffffffff123d RDX: 0000000000040000 RSI: ffffffff843b90c0 RDI: 000000000000efc5 RBP: 0200000000000202 R08: 0000000000000000 R09: fffffbfff20399d1 R10: ffffffff901cce8f R11: 0000000000000000 R12: 0000000000000005 R13: 0000000000000000 R14: 8400000000000007 R15: 0000000000000000 __clear_user arch/x86/include/asm/uaccess_64.h:183 [inline] clear_user arch/x86/include/asm/uaccess_64.h:200 [inline] keyctl_capabilities+0x100/0x140 security/keys/keyctl.c:1864 __do_sys_keyctl+0x4a7/0x590 security/keys/keyctl.c:2018 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f2733b7dff9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f2734972038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa RAX: ffffffffffffffda RBX: 00007f2733d35f80 RCX: 00007f2733b7dff9 RDX: 02000000000001ff RSI: 0000000000000003 RDI: 020000000000001f RBP: 00007f2733bf0296 R08: 8400000000000007 R09: 0000000000000000 R10: 000000000000000f R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f2733d35f80 R15: 00007ffe701351f8