INFO: task syz-executor.0:18150 blocked for more than 143 seconds. Not tainted 5.10.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.0 state:D stack:28064 pid:18150 ppid: 8495 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:3774 [inline] __schedule+0x893/0x2130 kernel/sched/core.c:4523 schedule+0xcf/0x270 kernel/sched/core.c:4601 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:4660 __mutex_lock_common kernel/locking/mutex.c:1033 [inline] __mutex_lock+0x3e2/0x10e0 kernel/locking/mutex.c:1103 tc_new_tfilter+0x928/0x2130 net/sched/cls_api.c:2020 rtnetlink_rcv_msg+0x80e/0xad0 net/core/rtnetlink.c:5553 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2494 netlink_unicast_kernel net/netlink/af_netlink.c:1304 [inline] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1330 netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1919 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:671 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2353 ___sys_sendmsg+0xf3/0x170 net/socket.c:2407 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2440 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45deb9 Code: Unable to access opcode bytes at RIP 0x45de8f. RSP: 002b:00007f54b3490c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000000000002e680 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 RBP: 000000000118c0b0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118c07c R13: 00007ffced10690f R14: 00007f54b34919c0 R15: 000000000118c07c INFO: task syz-executor.5:18145 blocked for more than 144 seconds. Not tainted 5.10.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.5 state:D stack:29592 pid:18145 ppid: 8619 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:3774 [inline] __schedule+0x893/0x2130 kernel/sched/core.c:4523 schedule+0xcf/0x270 kernel/sched/core.c:4601 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:4660 __mutex_lock_common kernel/locking/mutex.c:1033 [inline] __mutex_lock+0x3e2/0x10e0 kernel/locking/mutex.c:1103 do_ipv6_setsockopt.constprop.0+0x2f6/0x4140 net/ipv6/ipv6_sockglue.c:417 ipv6_setsockopt+0xd6/0x180 net/ipv6/ipv6_sockglue.c:1003 udpv6_setsockopt+0x76/0xc0 net/ipv6/udp.c:1626 __sys_setsockopt+0x2db/0x610 net/socket.c:2132 __do_sys_setsockopt net/socket.c:2143 [inline] __se_sys_setsockopt net/socket.c:2140 [inline] __x64_sys_setsockopt+0xba/0x150 net/socket.c:2140 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45deb9 Code: Unable to access opcode bytes at RIP 0x45de8f. RSP: 002b:00007f66bcd4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000030bc0 RCX: 000000000045deb9 RDX: 000000000000001b RSI: 0000000000000029 RDI: 0000000000000003 RBP: 000000000118bf70 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c R13: 00007ffc49503d2f R14: 00007f66bcd4e9c0 R15: 000000000118bf2c Showing all locks held in the system: 3 locks held by kworker/1:1/55: #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: atomic64_set include/asm-generic/atomic-instrumented.h:856 [inline] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: atomic_long_set include/asm-generic/atomic-long.h:41 [inline] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:616 [inline] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:643 [inline] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 kernel/workqueue.c:2243 #1: ffffc90000f8fda8 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 kernel/workqueue.c:2247 #2: ffffffff8c927f88 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 net/switchdev/switchdev.c:74 1 lock held by khungtaskd/1657: #0: ffffffff8b337160 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6253 1 lock held by in:imklog/8184: #0: ffff8880209b1270 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:932 3 locks held by kworker/1:9/11013: #0: ffff8881474dbd38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ffff8881474dbd38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: atomic64_set include/asm-generic/atomic-instrumented.h:856 [inline] #0: ffff8881474dbd38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: atomic_long_set include/asm-generic/atomic-long.h:41 [inline] #0: ffff8881474dbd38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:616 [inline] #0: ffff8881474dbd38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:643 [inline] #0: ffff8881474dbd38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 kernel/workqueue.c:2243 #1: ffffc9000255fda8 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 kernel/workqueue.c:2247 #2: ffffffff8c927f88 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 net/ipv6/addrconf.c:4569 1 lock held by syz-executor.0/18120: 1 lock held by syz-executor.0/18150: #0: ffffffff8c927f88 (rtnl_mutex){+.+.}-{3:3}, at: tc_new_tfilter+0x928/0x2130 net/sched/cls_api.c:2020 1 lock held by syz-executor.5/18145: #0: ffffffff8c927f88 (rtnl_mutex){+.+.}-{3:3}, at: do_ipv6_setsockopt.constprop.0+0x2f6/0x4140 net/ipv6/ipv6_sockglue.c:417 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1657 Comm: khungtaskd Not tainted 5.10.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x107/0x163 lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x44/0xd7 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:209 [inline] watchdog+0xd43/0xfa0 kernel/hung_task.c:294 kthread+0x3af/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 18120 Comm: syz-executor.0 Not tainted 5.10.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:kasan_mem_to_shadow include/linux/kasan.h:35 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:134 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:165 [inline] RIP: 0010:check_memory_region_inline mm/kasan/generic.c:183 [inline] RIP: 0010:check_memory_region+0x52/0x180 mm/kasan/generic.c:192 Code: 39 c7 0f 86 05 01 00 00 49 83 e9 01 48 89 fd 48 b8 00 00 00 00 00 fc ff df 4d 89 ca 48 c1 ed 03 49 c1 ea 03 48 01 c5 49 01 c2 <48> 89 e8 49 8d 5a 01 48 89 da 48 29 ea 48 83 fa 10 7e 63 41 89 eb RSP: 0018:ffffc90001f6ecf0 EFLAGS: 00000286 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffffff815621b1 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8cec8a08 RBP: fffffbfff19d9141 R08: 0000000000000000 R09: ffffffff8cec8a0f R10: fffffbfff19d9141 R11: 0000000000000000 R12: ffff8880141b3c68 R13: 0000000000000001 R14: 1ffff920003eddbf R15: ffff8880141b3c00 FS: 00007f54b34d3700(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f5520534000 CR3: 000000001d0e4000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: instrument_atomic_read include/linux/instrumented.h:71 [inline] test_bit include/asm-generic/bitops/instrumented-non-atomic.h:134 [inline] cpumask_test_cpu include/linux/cpumask.h:367 [inline] trace_lock_release include/trace/events/lock.h:58 [inline] lock_release+0xa1/0x710 kernel/locking/lockdep.c:5447 __mutex_unlock_slowpath+0x81/0x610 kernel/locking/mutex.c:1228 tcf_idr_check_alloc+0x29e/0x3b0 net/sched/act_api.c:540 tcf_police_init+0x347/0x13a0 net/sched/act_police.c:81 tcf_action_init_1+0x1a3/0x990 net/sched/act_api.c:997 tcf_exts_validate+0x138/0x420 net/sched/cls_api.c:3048 rsvp_change+0x291/0x27a0 net/sched/cls_rsvp.h:502 tc_new_tfilter+0x1398/0x2130 net/sched/cls_api.c:2129 rtnetlink_rcv_msg+0x80e/0xad0 net/core/rtnetlink.c:5553 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2494 netlink_unicast_kernel net/netlink/af_netlink.c:1304 [inline] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1330 netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1919 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:671 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2353 ___sys_sendmsg+0xf3/0x170 net/socket.c:2407 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2440 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45deb9 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f54b34d2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000000000002e680 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c R13: 00007ffced10690f R14: 00007f54b34d39c0 R15: 000000000118bf2c