INFO: task syz-executor.2:22593 blocked for more than 143 seconds. Not tainted 5.3.0-rc3+ #133 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.2 D26232 22593 7825 0x80004006 Call Trace: context_switch kernel/sched/core.c:3254 [inline] __schedule+0x755/0x1580 kernel/sched/core.c:3880 schedule+0xa8/0x270 kernel/sched/core.c:3944 rwsem_down_write_slowpath+0x708/0xf60 kernel/locking/rwsem.c:1214 __down_write kernel/locking/rwsem.c:1365 [inline] down_write+0x13c/0x150 kernel/locking/rwsem.c:1501 unregister_netdevice_notifier+0x7e/0x390 net/core/dev.c:1713 raw_release+0x57/0x700 net/can/raw.c:359 __sock_release+0xce/0x280 net/socket.c:590 sock_close+0x1e/0x30 net/socket.c:1268 __fput+0x2ff/0x890 fs/file_table.c:280 ____fput+0x16/0x20 fs/file_table.c:313 task_work_run+0x145/0x1c0 kernel/task_work.c:113 exit_task_work include/linux/task_work.h:22 [inline] do_exit+0x92f/0x2e50 kernel/exit.c:879 do_group_exit+0x135/0x360 kernel/exit.c:983 get_signal+0x47c/0x2500 kernel/signal.c:2729 do_signal+0x87/0x1700 arch/x86/kernel/signal.c:815 exit_to_usermode_loop+0x286/0x380 arch/x86/entry/common.c:159 prepare_exit_to_usermode arch/x86/entry/common.c:194 [inline] syscall_return_slowpath arch/x86/entry/common.c:274 [inline] do_syscall_64+0x5a9/0x6a0 arch/x86/entry/common.c:299 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459829 Code: 24 60 48 8b 42 08 48 8b 4a 10 48 8b 5a 18 48 8b 72 20 48 8b 7a 28 48 8b 3f 4c 8b 42 30 48 8b 52 38 48 85 d2 76 62 48 89 44 24 <58> 4c 89 44 24 28 48 89 0c 24 48 89 5c 24 08 48 c7 44 24 10 00 00 RSP: 002b:00007f2c01487c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: 0000000000000004 RBX: 0000000000000003 RCX: 0000000000459829 RDX: 0000000000000001 RSI: 0000000000000003 RDI: 000000000000001d RBP: 000000000075c1c0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c014886d4 R13: 00000000004c847a R14: 00000000004df018 R15: 00000000ffffffff Showing all locks held in the system: 1 lock held by khungtaskd/1057: #0: 00000000f0fc210f (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e kernel/locking/lockdep.c:5256 2 locks held by getty/8719: #0: 0000000089e6e21f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: 000000002e632230 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8720: #0: 0000000050794984 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: 0000000010dd14cd (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8721: #0: 000000007813c0b9 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: 000000002b892061 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8722: #0: 0000000091b63c64 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: 000000000f02b297 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8723: #0: 0000000019cb4cfd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: 00000000dd8a972f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8724: #0: 00000000bcac220b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: 00000000cdb3e4f5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8725: #0: 000000007cd4d5cf (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: 0000000050266630 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 4 locks held by kworker/u4:8/17043: #0: 0000000096b78611 ((wq_completion)netns){+.+.}, at: __write_once_size include/linux/compiler.h:226 [inline] #0: 0000000096b78611 ((wq_completion)netns){+.+.}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: 0000000096b78611 ((wq_completion)netns){+.+.}, at: atomic64_set include/asm-generic/atomic-instrumented.h:855 [inline] #0: 0000000096b78611 ((wq_completion)netns){+.+.}, at: atomic_long_set include/asm-generic/atomic-long.h:40 [inline] #0: 0000000096b78611 ((wq_completion)netns){+.+.}, at: set_work_data kernel/workqueue.c:620 [inline] #0: 0000000096b78611 ((wq_completion)netns){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:647 [inline] #0: 0000000096b78611 ((wq_completion)netns){+.+.}, at: process_one_work+0x88b/0x1740 kernel/workqueue.c:2240 #1: 000000006d445fbe (net_cleanup_work){+.+.}, at: process_one_work+0x8c1/0x1740 kernel/workqueue.c:2244 #2: 000000002e0c14da (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0xa70 net/core/net_namespace.c:556 #3: 00000000748e558c (rcu_state.barrier_mutex){+.+.}, at: rcu_barrier+0x47/0x310 kernel/rcu/tree.c:2830 2 locks held by syz-executor.2/22593: #0: 00000000225f7a39 (&sb->s_type->i_mutex_key#12){+.+.}, at: inode_lock include/linux/fs.h:778 [inline] #0: 00000000225f7a39 (&sb->s_type->i_mutex_key#12){+.+.}, at: __sock_release+0x89/0x280 net/socket.c:589 #1: 000000002e0c14da (pernet_ops_rwsem){++++}, at: unregister_netdevice_notifier+0x7e/0x390 net/core/dev.c:1713 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1057 Comm: khungtaskd Not tainted 5.3.0-rc3+ #133 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 nmi_cpu_backtrace.cold+0x70/0xb2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x23b/0x28b lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:205 [inline] watchdog+0x9d0/0xef0 kernel/hung_task.c:289 kthread+0x361/0x430 kernel/kthread.c:255 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 8630 Comm: rsyslogd Not tainted 5.3.0-rc3+ #133 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:qlink_to_object mm/kasan/quarantine.c:137 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:142 [inline] RIP: 0010:qlist_free_all+0x39/0x150 mm/kasan/quarantine.c:167 Code: 53 48 83 ec 08 48 8b 37 48 85 f6 0f 84 0d 01 00 00 4d 85 e4 49 89 fe 4d 89 e7 0f 84 8c 00 00 00 49 63 87 34 01 00 00 4c 8b 2e <48> 29 c6 48 83 3d 34 37 26 07 00 0f 84 f2 00 00 00 9c 58 0f 1f 44 RSP: 0018:ffff888093f77a48 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000286 RCX: ffffea0001aa7947 RDX: 0000000000000000 RSI: ffff88809f946e00 RDI: 0000000000000007 RBP: ffff888093f77a78 R08: ffff88808830a140 R09: fffffbfff14a8f52 R10: fffffbfff14a8f51 R11: ffffffff8a547a8f R12: 0000000000000000 R13: ffff88809f946cc0 R14: ffff888093f77a88 R15: ffff88821b69e540 FS: 00007f0cd7fba700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000ddd000 CR3: 0000000099121000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x169/0x1b0 mm/kasan/quarantine.c:260 __kasan_kmalloc.constprop.0+0xa3/0xe0 mm/kasan/common.c:468 kasan_slab_alloc+0xf/0x20 mm/kasan/common.c:495 slab_post_alloc_hook mm/slab.h:520 [inline] slab_alloc mm/slab.c:3319 [inline] kmem_cache_alloc_trace+0x141/0x790 mm/slab.c:3548 kmalloc include/linux/slab.h:552 [inline] syslog_print kernel/printk/printk.c:1346 [inline] do_syslog kernel/printk/printk.c:1519 [inline] do_syslog+0x5fa/0x1820 kernel/printk/printk.c:1493 kmsg_read+0x8f/0xc0 fs/proc/kmsg.c:40 proc_reg_read+0x1fc/0x2c0 fs/proc/inode.c:223 __vfs_read+0x8a/0x110 fs/read_write.c:425 vfs_read+0x1f0/0x440 fs/read_write.c:461 ksys_read+0x14f/0x290 fs/read_write.c:587 __do_sys_read fs/read_write.c:597 [inline] __se_sys_read fs/read_write.c:595 [inline] __x64_sys_read+0x73/0xb0 fs/read_write.c:595 do_syscall_64+0xfd/0x6a0 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f0cdaa1a1fd Code: d1 20 00 00 75 10 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e fa ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 a7 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007f0cd7fb9e30 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000000de1170 RCX: 00007f0cdaa1a1fd RDX: 0000000000000fff RSI: 00007f0cd97ee5a0 RDI: 0000000000000004 RBP: 0000000000000000 R08: 0000000000dcc260 R09: 0000000004000001 R10: 0000000000000001 R11: 0000000000000293 R12: 000000000065e420 R13: 00007f0cd7fba9c0 R14: 00007f0cdb05f040 R15: 0000000000000003