NOHZ: local_softirq_pending 08 NOHZ: local_softirq_pending 08 NOHZ: local_softirq_pending 08 NOHZ: local_softirq_pending 08 NOHZ: local_softirq_pending 08 INFO: task syz-executor.4:2302 blocked for more than 140 seconds. Not tainted 4.19.128-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.4 D27288 2302 17159 0x00000004 Call Trace: context_switch kernel/sched/core.c:2826 [inline] __schedule+0x8a2/0x1fc0 kernel/sched/core.c:3515 schedule+0x8d/0x1b0 kernel/sched/core.c:3559 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:589 [inline] rwsem_down_write_failed+0x3d4/0x7a0 kernel/locking/rwsem-xadd.c:618 call_rwsem_down_write_failed+0x13/0x20 arch/x86/lib/rwsem.S:117 __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x4f/0x90 kernel/locking/rwsem.c:72 register_netdevice_notifier+0x7b/0x5a0 net/core/dev.c:1643 raw_init+0x296/0x340 net/can/raw.c:343 can_create+0x27c/0x4a0 net/can/af_can.c:184 __sock_create+0x3d5/0x740 net/socket.c:1276 sock_create net/socket.c:1316 [inline] __sys_socket+0xef/0x200 net/socket.c:1346 __do_sys_socket net/socket.c:1355 [inline] __se_sys_socket net/socket.c:1353 [inline] __x64_sys_socket+0x6f/0xb0 net/socket.c:1353 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45ca59 Code: Bad RIP value. RSP: 002b:00007fd952d67c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 0000000000507960 RCX: 000000000045ca59 RDX: 0000000000000001 RSI: 0000000000000003 RDI: 000000000000001d RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 0000000000000b9b R14: 00000000004cdfa5 R15: 00007fd952d686d4 Showing all locks held in the system: 1 lock held by khungtaskd/1079: #0: 00000000e4350326 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4440 3 locks held by kworker/u4:2/12272: #0: 000000000da42f36 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x78b/0x1580 kernel/workqueue.c:2126 #1: 0000000095d38d44 (net_cleanup_work){+.+.}, at: process_one_work+0x7c1/0x1580 kernel/workqueue.c:2130 #2: 0000000038fea8a7 (pernet_ops_rwsem){++++}, at: cleanup_net+0xa8/0x850 net/core/net_namespace.c:520 1 lock held by syz-executor.4/2302: #0: 0000000038fea8a7 (pernet_ops_rwsem){++++}, at: register_netdevice_notifier+0x7b/0x5a0 net/core/dev.c:1643 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1079 Comm: khungtaskd Not tainted 4.19.128-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1eb lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x962/0xe40 kernel/hung_task.c:287 kthread+0x30b/0x410 kernel/kthread.c:246 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 3692 Comm: systemd-journal Not tainted 4.19.128-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline] RIP: 0010:mod_lruvec_page_state include/linux/memcontrol.h:713 [inline] RIP: 0010:kmem_freepages.isra.0+0x195/0x620 mm/slab.c:1448 Code: 00 00 00 65 4c 89 60 28 48 f7 04 24 00 02 00 00 0f 85 e8 02 00 00 48 83 3d af 9b 15 07 00 0f 84 83 04 00 00 48 8b 3c 24 57 9d <0f> 1f 44 00 00 e8 21 ed cf ff 48 8b 55 08 48 8d 42 ff 83 e2 01 48 RSP: 0018:ffff888093ec7c60 EFLAGS: 00000082 RAX: 0000000000000001 RBX: ffff88821bc46680 RCX: ffffffff8356636f RDX: 0000000000000000 RSI: ffffffff83566311 RDI: 0000000000000082 RBP: ffffea000253cf00 R08: ffff888093ebc280 R09: ffffed1025fff789 R10: ffffed1025fff788 R11: ffff88812fffbc43 R12: fffffffffffffffe R13: 0000000000000001 R14: 0000000000000002 R15: dead000000000100 FS: 00007f3e85ac48c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3e83281000 CR3: 0000000093d3f000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: slab_destroy+0x1f/0x50 mm/slab.c:1713 slabs_destroy+0x6a/0x90 mm/slab.c:1729 cache_flusharray mm/slab.c:3490 [inline] ___cache_free+0x277/0x380 mm/slab.c:3532 qlink_free mm/kasan/quarantine.c:147 [inline] qlist_free_all+0x79/0x110 mm/kasan/quarantine.c:166 quarantine_reduce+0x164/0x1a0 mm/kasan/quarantine.c:259 kasan_kmalloc+0x95/0xc0 mm/kasan/kasan.c:538 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc mm/slab.c:3397 [inline] kmem_cache_alloc+0x111/0x370 mm/slab.c:3557 prepare_creds+0x39/0x410 kernel/cred.c:255 do_faccessat+0x94/0x7a0 fs/open.c:359 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f3e84d809c7 Code: 83 c4 08 48 3d 01 f0 ff ff 73 01 c3 48 8b 0d c8 d4 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 15 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a1 d4 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffd082638a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000015 RAX: ffffffffffffffda RBX: 00007ffd082667c0 RCX: 00007f3e84d809c7 RDX: 00007f3e857f1a00 RSI: 0000000000000000 RDI: 00005579f63aa9a3 RBP: 00007ffd082638e0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000069 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ffd082667c0 R15: 00007ffd08263dd0