INFO: task syz-executor.3:13594 blocked for more than 143 seconds. Not tainted 5.1.0+ #7 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.3 D27344 13594 10311 0x00000004 Call Trace: context_switch kernel/sched/core.c:2817 [inline] __schedule+0x7d1/0x1580 kernel/sched/core.c:3444 schedule+0xa8/0x260 kernel/sched/core.c:3508 schedule_timeout+0x717/0xc50 kernel/time/timer.c:1783 do_wait_for_common kernel/sched/completion.c:83 [inline] __wait_for_common kernel/sched/completion.c:104 [inline] wait_for_common kernel/sched/completion.c:115 [inline] wait_for_completion+0x29c/0x440 kernel/sched/completion.c:136 crypto_wait_req include/linux/crypto.h:680 [inline] crypto_wait_req include/linux/crypto.h:675 [inline] tls_sw_sendmsg+0x13a6/0x17b0 net/tls/tls_sw.c:1072 inet_sendmsg+0x147/0x5e0 net/ipv4/af_inet.c:802 sock_sendmsg_nosec net/socket.c:660 [inline] sock_sendmsg+0xf2/0x170 net/socket.c:671 ___sys_sendmsg+0x81d/0x960 net/socket.c:2292 __sys_sendmsg+0x105/0x1d0 net/socket.c:2330 __do_sys_sendmsg net/socket.c:2339 [inline] __se_sys_sendmsg net/socket.c:2337 [inline] __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2337 do_syscall_64+0x103/0x670 arch/x86/entry/common.c:298 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x458da9 Code: 05 0c cc 45 00 48 89 04 24 48 c7 44 24 08 01 00 00 00 e8 6a 3e fd ff 48 8b 44 24 18 48 89 04 24 e8 0c 3d fd ff 48 8d 05 e5 cb <45> 00 48 89 04 24 48 c7 44 24 08 01 00 00 00 e8 43 3e fd ff 48 8b RSP: 002b:00007ffbcd8f3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 RDX: 0000000000004000 RSI: 00000000200002c0 RDI: 0000000000000003 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffbcd8f46d4 R13: 00000000004c650b R14: 00000000004db060 R15: 00000000ffffffff INFO: task syz-executor.3:13607 blocked for more than 143 seconds. Not tainted 5.1.0+ #7 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.3 D29904 13607 10311 0x00000004 Call Trace: context_switch kernel/sched/core.c:2817 [inline] __schedule+0x7d1/0x1580 kernel/sched/core.c:3444 schedule+0xa8/0x260 kernel/sched/core.c:3508 __lock_sock+0x165/0x290 net/core/sock.c:2394 lock_sock_nested+0xfe/0x120 net/core/sock.c:2919 lock_sock include/net/sock.h:1525 [inline] tls_sw_sendmsg+0x25d/0x17b0 net/tls/tls_sw.c:900 inet_sendmsg+0x147/0x5e0 net/ipv4/af_inet.c:802 sock_sendmsg_nosec net/socket.c:660 [inline] sock_sendmsg+0xf2/0x170 net/socket.c:671 __sys_sendto+0x262/0x380 net/socket.c:1964 __do_sys_sendto net/socket.c:1976 [inline] __se_sys_sendto net/socket.c:1972 [inline] __x64_sys_sendto+0xe1/0x1a0 net/socket.c:1972 do_syscall_64+0x103/0x670 arch/x86/entry/common.c:298 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x458da9 Code: 05 0c cc 45 00 48 89 04 24 48 c7 44 24 08 01 00 00 00 e8 6a 3e fd ff 48 8b 44 24 18 48 89 04 24 e8 0c 3d fd ff 48 8d 05 e5 cb <45> 00 48 89 04 24 48 c7 44 24 08 01 00 00 00 e8 43 3e fd ff 48 8b RSP: 002b:00007ffbcd8d2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458da9 RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000004000 R11: 0000000000000246 R12: 00007ffbcd8d36d4 R13: 00000000004c684e R14: 00000000004db4b0 R15: 00000000ffffffff Showing all locks held in the system: 3 locks held by kworker/u4:2/34: #0: 00000000ce2bd5a9 (&rq->lock){-.-.}, at: rq_lock kernel/sched/sched.h:1168 [inline] #0: 00000000ce2bd5a9 (&rq->lock){-.-.}, at: __schedule+0x1f5/0x1580 kernel/sched/core.c:3396 #1: 00000000d644a20e (rcu_read_lock){....}, at: __update_idle_core+0x45/0x3f0 kernel/sched/fair.c:6087 #2: 00000000d644a20e (rcu_read_lock){....}, at: batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:405 [inline] #2: 00000000d644a20e (rcu_read_lock){....}, at: batadv_nc_worker+0xe3/0x760 net/batman-adv/network-coding.c:718 1 lock held by khungtaskd/1042: #0: 00000000d644a20e (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e kernel/locking/lockdep.c:5148 1 lock held by rsyslogd/7598: 2 locks held by getty/7688: #0: 000000007570d7cd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000000399530a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156 2 locks held by getty/7689: #0: 000000000e44a5b2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000006c10e2e8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156 2 locks held by getty/7690: #0: 000000008e2806e9 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000f92bb1ed (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156 2 locks held by getty/7691: #0: 00000000d359f426 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 0000000078b317c3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156 2 locks held by getty/7692: #0: 000000004c21aff8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 0000000063458ae1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156 2 locks held by getty/7693: #0: 00000000a62d26d1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000001f4c94b9 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156 2 locks held by getty/7694: #0: 00000000e805945e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000032aaeeb (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156 1 lock held by syz-executor.3/13594: #0: 00000000076fb35b (sk_lock-AF_INET6){+.+.}, at: lock_sock include/net/sock.h:1525 [inline] #0: 00000000076fb35b (sk_lock-AF_INET6){+.+.}, at: tls_sw_sendmsg+0x25d/0x17b0 net/tls/tls_sw.c:900 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.1.0+ #7 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 nmi_cpu_backtrace.cold+0x63/0xa4 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1be/0x236 lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:204 [inline] watchdog+0x9b7/0xec0 kernel/hung_task.c:288 kthread+0x357/0x430 kernel/kthread.c:253 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x2/0x10 arch/x86/include/asm/irqflags.h:57