[ 1982] 0 1982 17618 12709 31 3 0 0 syz-executor0 [ 2027] 0 2027 17618 12709 31 3 0 0 syz-executor0 [ 2057] 0 2057 17585 8224 23 3 0 0 syz-executor4 [ 2074] 0 2074 17618 12709 31 3 0 0 syz-executor0 [ 2082] 0 2082 17618 8238 24 3 0 0 syz-executor4 INFO: task syz-executor4:14601 blocked for more than 140 seconds. Not tainted 4.14.90+ #29 [ 2100] 0 2100 17585 8464 25 4 0 0 syz-executor3 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2114] 0 2114 17585 8464 25 4 0 0 syz-executor3 syz-executor4 D30248 14601 1843 0x00000004 Call Trace: [ 2140] 0 2140 17618 12709 31 3 0 0 syz-executor0 [ 2161] 0 2161 17585 8464 25 4 0 0 syz-executor3 [ 2178] 0 2178 17585 8464 25 4 0 0 syz-executor3 schedule+0x7f/0x1b0 kernel/sched/core.c:3490 __lock_sock+0x11d/0x210 net/core/sock.c:2237 [ 2188] 0 2188 17618 12709 31 3 0 0 syz-executor0 lock_sock_nested+0xe3/0x100 net/core/sock.c:2758 [ 2190] 0 2190 17585 8468 25 4 0 0 syz-executor3 lock_sock include/net/sock.h:1452 [inline] packet_setsockopt+0x4d8/0x2680 net/packet/af_packet.c:3671 [ 2208] 0 2208 17684 8440 26 4 0 0 syz-executor2 [ 2219] 0 2219 17585 8464 25 4 0 0 syz-executor3 [ 2251] 0 2251 17585 8223 23 3 0 0 syz-executor2 SYSC_setsockopt net/socket.c:1864 [inline] SyS_setsockopt+0x132/0x220 net/socket.c:1843 [ 2267] 0 2267 17618 12709 31 3 0 0 syz-executor0 [ 2277] 0 2277 17618 12709 31 3 0 0 syz-executor4 do_syscall_64+0x19b/0x4b0 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2281] 0 2281 17651 11235 29 3 0 0 syz-executor4 [ 2304] 0 2304 17585 8464 25 4 0 0 syz-executor3 RIP: 0033:0x457669 [ 2326] 0 2326 17651 8470 25 4 0 0 syz-executor3 RSP: 002b:00007f65e1b54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2334] 0 2334 17618 12709 31 3 0 0 syz-executor0 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457669 RDX: 0000000000000005 RSI: 0000000000000107 RDI: 0000000000000003 RBP: 000000000072bfa0 R08: 0000000000000010 R09: 0000000000000000 [ 2335] 0 2335 17651 8470 25 4 0 0 syz-executor3 [ 2372] 0 2372 17651 8471 25 4 0 0 syz-executor3 R10: 0000000020000080 R11: 0000000000000246 R12: 00007f65e1b556d4 [ 2395] 0 2395 17618 12709 31 3 0 0 syz-executor0 R13: 00000000004c4eba R14: 00000000004d8f70 R15: 00000000ffffffff [ 2410] 0 2410 17585 8464 25 4 0 0 syz-executor3 INFO: task syz-executor4:14607 blocked for more than 140 seconds. [ 2430] 0 2430 17618 12709 31 3 0 0 syz-executor0 Not tainted 4.14.90+ #29 [ 2453] 0 2453 17585 8464 25 4 0 0 syz-executor3 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2461] 0 2461 17585 8464 25 4 0 0 syz-executor3 [ 2474] 0 2474 17618 12709 31 3 0 0 syz-executor0 syz-executor4 D28408 14607 1843 0x00000004 [ 2515] 0 2515 17585 8464 25 4 0 0 syz-executor3 [ 2551] 0 2551 17618 8410 26 4 0 0 syz-executor2 [ 2556] 0 2556 17585 8424 25 4 0 0 syz-executor2 Call Trace: schedule+0x7f/0x1b0 kernel/sched/core.c:3490 __lock_sock+0x11d/0x210 net/core/sock.c:2237 [ 2557] 0 2557 17618 12709 31 3 0 0 syz-executor0 lock_sock_nested+0xe3/0x100 net/core/sock.c:2758 lock_sock include/net/sock.h:1452 [inline] packet_setsockopt+0x4d8/0x2680 net/packet/af_packet.c:3671 [ 2596] 0 2596 17585 8442 24 3 0 0 syz-executor3 [ 2601] 0 2601 17618 12709 31 3 0 0 syz-executor0 [ 2602] 0 2602 17618 8446 24 3 0 0 syz-executor3 [ 2636] 0 2636 17585 8464 25 4 0 0 syz-executor3 [ 2659] 0 2659 17618 8469 25 4 0 0 syz-executor3 SYSC_setsockopt net/socket.c:1864 [inline] SyS_setsockopt+0x132/0x220 net/socket.c:1843 [ 2665] 0 2665 17585 8415 28 4 0 0 syz-executor5 do_syscall_64+0x19b/0x4b0 arch/x86/entry/common.c:289 [ 2699] 0 2699 17618 12709 31 3 0 0 syz-executor0 entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2710] 0 2710 17585 8464 25 4 0 0 syz-executor3 RIP: 0033:0x457669 RSP: 002b:00007f65e1b33c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2738] 0 2738 17618 8470 25 4 0 0 syz-executor3 [ 2744] 0 2744 17618 12709 31 3 0 0 syz-executor0 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457669 RDX: 0000000000000005 RSI: 0000000000000107 RDI: 000000000000000b RBP: 000000000072c040 R08: 0000000000000010 R09: 0000000000000000 [ 2784] 0 2784 17618 8234 25 3 0 0 syz-executor2 [ 2785] 0 2785 17585 8232 23 3 0 0 syz-executor4 R10: 0000000020000080 R11: 0000000000000246 R12: 00007f65e1b346d4 [ 2790] 0 2790 17651 8236 25 3 0 0 syz-executor2 R13: 00000000004c4eba R14: 00000000004d8f70 R15: 00000000ffffffff [ 2800] 0 2800 17618 12709 31 3 0 0 syz-executor0 Showing all locks held in the system: [ 2814] 0 2814 17618 8409 25 4 0 0 syz-executor1 [ 2826] 0 2826 17684 12805 31 3 0 0 syz-executor4 1 lock held by khungtaskd/23: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x74/0x20f kernel/locking/lockdep.c:4541 2 locks held by getty/1753: #0: (&tty->ldisc_sem){++++}, at: [] tty_ldisc_ref_wait+0x20/0x80 drivers/tty/tty_ldisc.c:275 #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1ff/0x1700 drivers/tty/n_tty.c:2156 3 locks held by kworker/u4:25/6483: #0: ("%s""netns"){+.+.}, at: [] process_one_work+0x784/0x1670 kernel/workqueue.c:2085 [ 2848] 0 2848 17618 12709 31 3 0 0 syz-executor0 #1: (net_cleanup_work){+.+.}, at: [] process_one_work+0x7bc/0x1670 kernel/workqueue.c:2089 #2: (net_mutex){+.+.}, at: [] cleanup_net+0x14c/0x880 net/core/net_namespace.c:449 ============================================= [ 2864] 0 2864 17585 8464 25 4 0 0 syz-executor3 [ 2911] 0 2911 17618 12709 31 3 0 0 syz-executor0 [ 2916] 0 2916 17585 8464 25 4 0 0 syz-executor3 [ 2919] 0 2919 17585 8464 25 4 0 0 syz-executor3 [ 2984] 0 2984 17618 12709 31 3 0 0 syz-executor0 [ 3003] 0 3003 17585 8464 25 4 0 0 syz-executor3 [ 3014] 0 3014 17585 8466 26 4 0 0 syz-executor3 [ 3015] 0 3015 17585 8407 24 4 0 0 syz-executor2 NMI backtrace for cpu 1 CPU: 1 PID: 23 Comm: khungtaskd Not tainted 4.14.90+ #29 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xb9/0x11b lib/dump_stack.c:53 nmi_cpu_backtrace.cold.0+0x47/0x85 lib/nmi_backtrace.c:101 [ 3023] 0 3023 17618 12709 31 3 0 0 syz-executor0 nmi_trigger_cpumask_backtrace+0x121/0x146 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:196 [inline] watchdog+0x574/0xa70 kernel/hung_task.c:252 kthread+0x348/0x420 kernel/kthread.c:232 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:402 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 14597 Comm: syz-executor4 Not tainted 4.14.90+ #29 task: ffff88801be54680 task.stack: ffff8881cb7a0000 RIP: 0010:__sanitizer_cov_trace_pc+0x29/0x60 kernel/kcov.c:74 RSP: 0000:ffff8881cb7a72b8 EFLAGS: 00000246 RAX: ffff88801be54680 RBX: 0000000000000000 RCX: 0000000000040000 RDX: 0000000000000001 RSI: ffffc90005147000 RDI: ffff8881da389900 RBP: ffffffffffffffff R08: 0000000000000001 R09: 0000000000000000 R10: ffff88801be54f00 R11: 0000000000000001 R12: ffff8881da389900 R13: ffff8881cb7a73e8 R14: ffff8881cb7a73f0 R15: 0000000000000000 FS: 00007f65e1b76700(0000) GS:ffff8881db800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb6ce86ed61 CR3: 0000000181100005 CR4: 00000000001606b0 DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: list_lru_count_one+0x54/0x1d0 mm/list_lru.c:182 list_lru_shrink_count include/linux/list_lru.h:117 [inline] super_cache_count+0x18a/0x2a0 fs/super.c:144 do_shrink_slab mm/vmscan.c:328 [inline] shrink_slab.part.8+0x25c/0xa30 mm/vmscan.c:504 shrink_slab mm/vmscan.c:468 [inline] shrink_node+0x8c8/0xbf0 mm/vmscan.c:2665 shrink_zones mm/vmscan.c:2812 [inline] do_try_to_free_pages+0x349/0xde0 mm/vmscan.c:2874 try_to_free_pages+0x204/0x6b0 mm/vmscan.c:3080 __perform_reclaim mm/page_alloc.c:3593 [inline] __alloc_pages_direct_reclaim mm/page_alloc.c:3614 [inline] __alloc_pages_slowpath mm/page_alloc.c:4001 [inline] __alloc_pages_nodemask+0xa8a/0x2180 mm/page_alloc.c:4210 __alloc_pages include/linux/gfp.h:461 [inline] __alloc_pages_node include/linux/gfp.h:474 [inline] alloc_pages_node include/linux/gfp.h:488 [inline] __vmalloc_area_node mm/vmalloc.c:1702 [inline] __vmalloc_node_range+0x283/0x680 mm/vmalloc.c:1760 __vmalloc_node mm/vmalloc.c:1805 [inline] __vmalloc_node_flags mm/vmalloc.c:1819 [inline] vzalloc+0x63/0x80 mm/vmalloc.c:1858 alloc_one_pg_vec_page net/packet/af_packet.c:4211 [inline] alloc_pg_vec net/packet/af_packet.c:4236 [inline] packet_set_ring+0xa11/0x1700 net/packet/af_packet.c:4320 packet_setsockopt+0x588/0x2680 net/packet/af_packet.c:3688 SYSC_setsockopt net/socket.c:1864 [inline] SyS_setsockopt+0x132/0x220 net/socket.c:1843 do_syscall_64+0x19b/0x4b0 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x457669 RSP: 002b:00007f65e1b75c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457669 RDX: 0000000000000005 RSI: 0000000000000107 RDI: 0000000000000003 RBP: 000000000072bf00 R08: 000000000000018f R09: 0000000000000000 R10: 0000000020000040 R11: 0000000000000246 R12: 00007f65e1b766d4 R13: 00000000004c4eba R14: 00000000004d8f70 R15: 00000000ffffffff Code: 90 90 65 48 8b 04 25 c0 de 01 00 48 85 c0 74 1a 65 8b 15 3b f5 d0 5d 81 e2 00 01 1f 00 75 0b 8b 90 a8 11 00 00 83 fa 01 74 01 c3 <48> c7 c2 00 00 00 81 48 81 ea 00 00 00 a2 48 03 14 24 48 8b b0