INFO: task syz-executor.1:11865 blocked for more than 143 seconds. Not tainted 5.6.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.1 D28680 11865 9782 0x00000004 Call Trace: context_switch kernel/sched/core.c:3386 [inline] __schedule+0x934/0x1f90 kernel/sched/core.c:4082 schedule+0xdc/0x2b0 kernel/sched/core.c:4156 __lock_sock+0x165/0x290 net/core/sock.c:2413 lock_sock_nested+0xfe/0x120 net/core/sock.c:2938 virtio_transport_release+0xc4/0xd60 net/vmw_vsock/virtio_transport_common.c:832 vsock_assign_transport+0xf3/0x3b0 net/vmw_vsock/af_vsock.c:454 vsock_stream_connect+0x2b3/0xc70 net/vmw_vsock/af_vsock.c:1288 __sys_connect_file+0x161/0x1c0 net/socket.c:1857 __sys_connect+0x174/0x1b0 net/socket.c:1874 __do_sys_connect net/socket.c:1885 [inline] __se_sys_connect net/socket.c:1882 [inline] __x64_sys_connect+0x73/0xb0 net/socket.c:1882 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:294 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45c6c9 Code: 08 48 c7 44 24 10 00 00 00 00 48 89 74 24 18 48 89 7c 24 20 48 89 54 24 28 48 89 4c 24 30 0f 57 c0 0f 11 44 24 38 48 c7 44 24 <48> 00 00 00 00 e8 ad 53 ff ff 48 8b 44 24 50 48 8b 4c 24 58 48 89 RSP: 002b:00007fe59cea2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 00007fe59cea36d4 RCX: 000000000045c6c9 RDX: 0000000000000010 RSI: 00000000200000c0 RDI: 0000000000000004 RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 0000000000000096 R14: 00000000004c3161 R15: 000000000076bf2c INFO: task syz-executor.1:11873 blocked for more than 143 seconds. Not tainted 5.6.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.1 D27784 11873 9782 0x00000004 Call Trace: context_switch kernel/sched/core.c:3386 [inline] __schedule+0x934/0x1f90 kernel/sched/core.c:4082 schedule+0xdc/0x2b0 kernel/sched/core.c:4156 __lock_sock+0x165/0x290 net/core/sock.c:2413 lock_sock_nested+0xfe/0x120 net/core/sock.c:2938 virtio_transport_release+0xc4/0xd60 net/vmw_vsock/virtio_transport_common.c:832 vsock_assign_transport+0xf3/0x3b0 net/vmw_vsock/af_vsock.c:454 vsock_stream_connect+0x2b3/0xc70 net/vmw_vsock/af_vsock.c:1288 __sys_connect_file+0x161/0x1c0 net/socket.c:1857 __sys_connect+0x174/0x1b0 net/socket.c:1874 __do_sys_connect net/socket.c:1885 [inline] __se_sys_connect net/socket.c:1882 [inline] __x64_sys_connect+0x73/0xb0 net/socket.c:1882 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:294 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45c6c9 Code: 08 48 c7 44 24 10 00 00 00 00 48 89 74 24 18 48 89 7c 24 20 48 89 54 24 28 48 89 4c 24 30 0f 57 c0 0f 11 44 24 38 48 c7 44 24 <48> 00 00 00 00 e8 ad 53 ff ff 48 8b 44 24 50 48 8b 4c 24 58 48 89 RSP: 002b:00007fe59ce81c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 00007fe59ce826d4 RCX: 000000000045c6c9 RDX: 0000000000000010 RSI: 00000000200000c0 RDI: 0000000000000004 RBP: 000000000076bfc8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 0000000000000096 R14: 00000000004c3161 R15: 000000000076bfd4 Showing all locks held in the system: 1 lock held by khungtaskd/1122: #0: ffffffff89bac240 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 kernel/locking/lockdep.c:5333 1 lock held by rsyslogd/9648: 2 locks held by getty/9738: #0: ffff8880992c8090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc9000584b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 drivers/tty/n_tty.c:2156 2 locks held by getty/9739: #0: ffff8880a02ec090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc9000586b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 drivers/tty/n_tty.c:2156 2 locks held by getty/9740: #0: ffff888097a1d090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc900058672e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 drivers/tty/n_tty.c:2156 2 locks held by getty/9741: #0: ffff88808f13e090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc900058632e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 drivers/tty/n_tty.c:2156 2 locks held by getty/9742: #0: ffff8880a978a090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc9000585f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 drivers/tty/n_tty.c:2156 2 locks held by getty/9743: #0: ffff8880a01ad090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc9000580b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 drivers/tty/n_tty.c:2156 2 locks held by getty/9744: #0: ffff88809b4e8090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc900057db2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 drivers/tty/n_tty.c:2156 1 lock held by syz-executor.1/11865: #0: ffff8880a06c71d0 (sk_lock-AF_VSOCK){+.+.}, at: lock_sock include/net/sock.h:1516 [inline] #0: ffff8880a06c71d0 (sk_lock-AF_VSOCK){+.+.}, at: vsock_stream_connect+0xfb/0xc70 net/vmw_vsock/af_vsock.c:1258 1 lock held by syz-executor.1/11873: #0: ffff8880a77d8110 (sk_lock-AF_VSOCK){+.+.}, at: lock_sock include/net/sock.h:1516 [inline] #0: ffff8880a77d8110 (sk_lock-AF_VSOCK){+.+.}, at: vsock_stream_connect+0xfb/0xc70 net/vmw_vsock/af_vsock.c:1258 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1122 Comm: khungtaskd Not tainted 5.6.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x70/0xb2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x23b/0x28b lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:205 [inline] watchdog+0xb11/0x10c0 kernel/hung_task.c:289 kthread+0x361/0x430 kernel/kthread.c:255 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 2694 Comm: kworker/0:2 Not tainted 5.6.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events nsim_dev_trap_report_work RIP: 0010:__read_once_size include/linux/compiler.h:199 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:155 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x20/0x50 kernel/kcov.c:187 Code: 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 65 48 8b 04 25 c0 1e 02 00 65 8b 15 64 90 8c 7e 81 e2 00 01 1f 00 48 8b 75 08 75 2b <8b> 90 80 13 00 00 83 fa 02 75 20 48 8b 88 88 13 00 00 8b 80 84 13 RSP: 0018:ffffc9000861fa10 EFLAGS: 00000046 RAX: ffff8880a05e6440 RBX: ffffc9000861fbc8 RCX: ffffffff83a2e831 RDX: 0000000000000000 RSI: ffffffff83a2e7a7 RDI: 0000000000000005 RBP: ffffc9000861fa10 R08: ffff8880a05e6440 R09: 0000000029f79a82 R10: 00000000f0fe56b4 R11: 000000000d5a86d9 R12: ffffc9000861fa78 R13: ffff8880a86d7620 R14: 0000000000000008 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600400 CR3: 00000000a72c4000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: chacha_block_generic+0xb7/0x220 lib/crypto/chacha.c:87 chacha20_block include/crypto/chacha.h:40 [inline] _extract_crng+0x141/0x270 drivers/char/random.c:982 extract_crng+0x5f/0x80 drivers/char/random.c:998 _get_random_bytes+0x181/0x430 drivers/char/random.c:1534 get_random_bytes+0x35/0x40 drivers/char/random.c:1547 eth_random_addr include/linux/etherdevice.h:224 [inline] nsim_dev_trap_skb_build drivers/net/netdevsim/dev.c:331 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:376 [inline] nsim_dev_trap_report_work+0x2fa/0xaf0 drivers/net/netdevsim/dev.c:415 process_one_work+0xa05/0x17a0 kernel/workqueue.c:2264 worker_thread+0x98/0xe40 kernel/workqueue.c:2410 kthread+0x361/0x430 kernel/kthread.c:255 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352