INFO: task syz-executor.5:10911 blocked for more than 140 seconds. Y4`Ҙ: renamed from lo Not tainted 4.14.295-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.5 D28968 10911 7995 0x00000004 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 *** Guest State *** CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000002 RIP = 0x0000000000000009 schedule_timeout+0x80a/0xe90 kernel/time/timer.c:1724 RFLAGS=0x00000046 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 do_wait_for_common kernel/sched/completion.c:91 [inline] __wait_for_common kernel/sched/completion.c:112 [inline] wait_for_common+0x272/0x430 kernel/sched/completion.c:123 flush_work+0x3fe/0x770 kernel/workqueue.c:2894 DS: sel=0xd1d5, attr=0x00093, limit=0x0000ffff, base=0x00000000000d1d50 SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 ES: sel=0x0140, attr=0x00093, limit=0x0000ffff, base=0x0000000000001400 __cancel_work_timer+0x321/0x460 kernel/workqueue.c:2965 FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GDTR: limit=0x0000ffff, base=0x0000000000000000 LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 p9_conn_destroy net/9p/trans_fd.c:898 [inline] p9_fd_close+0x28d/0x420 net/9p/trans_fd.c:925 IDTR: limit=0x0000ffff, base=0x0000000000000000 p9_client_create+0x736/0x12c0 net/9p/client.c:1093 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 Interruptibility = 00000002 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff8116119e RSP = 0xffff8880670af9b8 v9fs_session_init+0x1c5/0x1540 fs/9p/v9fs.c:422 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f290057c700 GSBase=ffff8880ba500000 TRBase=fffffe000003e000 GDTBase=fffffe000003c000 IDTBase=fffffe0000000000 CR0=0000000080050033 CR3=000000009aa7b000 CR4=00000000003426e0 Sysenter RSP=fffffe000003e000 CS:RIP=0010:ffffffff87401690 EFER = 0x0000000000000d01 PAT = 0x0407050600070106 *** Control State *** PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 EntryControls=0000d1ff ExitControls=002fefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 v9fs_mount+0x73/0x860 fs/9p/vfs_super.c:135 VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 reason=80000021 qualification=0000000000000000 mount_fs+0x92/0x2a0 fs/super.c:1237 IDTVectoring: info=00000000 errcode=00000000 vfs_kern_mount.part.0+0x5b/0x470 fs/namespace.c:1046 TSC Offset = 0xffffff6b4eb8c24a EPT pointer = 0x000000006c9a101e vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2572 [inline] do_mount+0xe65/0x2a30 fs/namespace.c:2905 Virtual processor ID = 0x0001 SYSC_mount fs/namespace.c:3121 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3098 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f7df8c375a9 RSP: 002b:00007f7df7568168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f7df8d58120 RCX: 00007f7df8c375a9 RDX: 0000000020000080 RSI: 0000000020000300 RDI: 0000000000000000 RBP: 00007f7df8c92580 R08: 0000000020000740 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc8beae4df R14: 00007f7df7568300 R15: 0000000000022000 Showing all locks held in the system: netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 2 locks held by kworker/1:1/24: #0: ("events"){+.+.}, at: [] process_one_work+0x6b0/0x14a0 kernel/workqueue.c:2088 #1: ((&m->rq)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 kernel/workqueue.c:2092 2 locks held by kworker/0:1/25: #0: ("events"){+.+.}, at: [] process_one_work+0x6b0/0x14a0 kernel/workqueue.c:2088 #1: ((&m->rq)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 kernel/workqueue.c:2092 1 lock held by khungtaskd/1526: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 3 locks held by kworker/u4:5/9335: #0: ("%s""netns"){+.+.}, at: [] process_one_work+0x6b0/0x14a0 kernel/workqueue.c:2088 #1: (net_cleanup_work){+.+.}, at: [] process_one_work+0x6e6/0x14a0 kernel/workqueue.c:2092 #2: (net_mutex){+.+.}, at: [] cleanup_net+0x110/0x840 net/core/net_namespace.c:453 2 locks held by syz-executor.3/12771: #0: (&sb->s_type->i_mutex_key#13){+.+.}, at: [] inode_lock include/linux/fs.h:719 [inline] #0: (&sb->s_type->i_mutex_key#13){+.+.}, at: [] __sock_release+0x86/0x2b0 net/socket.c:601 #1: (rtnl_mutex){+.+.}, at: [] ip_mc_drop_socket+0x81/0x220 net/ipv4/igmp.c:2662 1 lock held by syz-executor.2/12794: #0: (rtnl_mutex){+.+.}, at: [] rtnl_lock net/core/rtnetlink.c:72 [inline] #0: (rtnl_mutex){+.+.}, at: [] rtnetlink_rcv_msg+0x31d/0xb10 net/core/rtnetlink.c:4317 1 lock held by syz-executor.2/12804: #0: (rtnl_mutex){+.+.}, at: [] rtnl_lock net/core/rtnetlink.c:72 [inline] #0: (rtnl_mutex){+.+.}, at: [] rtnetlink_rcv_msg+0x31d/0xb10 net/core/rtnetlink.c:4317 1 lock held by syz-executor.1/12786: #0: (rtnl_mutex){+.+.}, at: [] do_ip_setsockopt.constprop.0+0x181/0x2900 net/ipv4/ip_sockglue.c:645 1 lock held by syz-executor.1/12802: #0: (rtnl_mutex){+.+.}, at: [] do_ip_setsockopt.constprop.0+0x181/0x2900 net/ipv4/ip_sockglue.c:645 1 lock held by syz-executor.1/12806: #0: (rtnl_mutex){+.+.}, at: [] dev_ioctl+0x214/0xbe0 net/core/dev_ioctl.c:565 1 lock held by syz-executor.1/12812: #0: (rtnl_mutex){+.+.}, at: [] dev_ioctl+0x631/0xbe0 net/core/dev_ioctl.c:514 1 lock held by syz-executor.4/12797: #0: (rtnl_mutex){+.+.}, at: [] do_ipv6_setsockopt.constprop.0+0x2af/0x3790 net/ipv6/ipv6_sockglue.c:166 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1526 Comm: khungtaskd Not tainted 4.14.295-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 12797 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 task: ffff8880ab8f81c0 task.stack: ffff88808df90000 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x50 kernel/kcov.c:60 RSP: 0018:ffff88808df97950 EFLAGS: 00000202 RAX: ffff8880ab8f81c0 RBX: fffffffffffff2ca RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff87cf1380 RDI: ffffffff87cd0700 RBP: ffffffff8bedbb00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffffffdbe0 R13: ffffffffffffdbe0 R14: 0000000000000000 R15: ffffffff8bedbb50 FS: 0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2f021000 CR3: 0000000008e6a000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: percpu_counter_add_batch+0x82/0x160 lib/percpu_counter.c:91 vm_acct_memory include/linux/mman.h:26 [inline] vm_unacct_memory include/linux/mman.h:31 [inline] exit_mmap+0x36e/0x4d0 mm/mmap.c:3092 __mmput kernel/fork.c:931 [inline] mmput kernel/fork.c:952 [inline] mmput+0xfa/0x420 kernel/fork.c:947 exit_mm kernel/exit.c:548 [inline] do_exit+0x984/0x2850 kernel/exit.c:855 do_group_exit+0x100/0x2e0 kernel/exit.c:965 get_signal+0x38d/0x1ca0 kernel/signal.c:2412 do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:792 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7fa7da7375a9 RSP: 002b:00007fa7d90aa168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffea RBX: 00007fa7da857f80 RCX: 00007fa7da7375a9 RDX: 0000000000000030 RSI: 0000000000000029 RDI: 0000000000000003 RBP: 00007fa7da792580 R08: 0000000000000090 R09: 0000000000000000 R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcabeb030f R14: 00007fa7d90aa300 R15: 0000000000022000 Code: ff ff 48 89 df e8 41 ba 29 00 e9 9f fe ff ff 4c 89 e7 e8 34 ba 29 00 e9 2c fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <65> 48 8b 04 25 c0 7f 02 00 48 85 c0 74 1a 65 8b 15 7b 37 ad 7e