INFO: task kworker/u4:4:1146 blocked for more than 143 seconds.
      Not tainted 5.14.0-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/u4:4    state:D stack:20760 pid: 1146 ppid:     2 flags:0x00004000
Workqueue: netns cleanup_net
Call Trace:
 context_switch kernel/sched/core.c:4940 [inline]
 __schedule+0xc8d/0x1270 kernel/sched/core.c:6287
 schedule+0x14b/0x210 kernel/sched/core.c:6366
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6425
 __mutex_lock_common+0xdff/0x2550 kernel/locking/mutex.c:669
 __mutex_lock kernel/locking/mutex.c:729 [inline]
 mutex_lock_nested+0x1a/0x20 kernel/locking/mutex.c:743
 tc_action_net_exit include/net/act_api.h:155 [inline]
 gate_exit_net+0x2c/0x100 net/sched/act_gate.c:624
 ops_exit_list net/core/net_namespace.c:171 [inline]
 cleanup_net+0x7ec/0xc50 net/core/net_namespace.c:591
 process_one_work+0x853/0x1140 kernel/workqueue.c:2297
 worker_thread+0xac1/0x1320 kernel/workqueue.c:2444
 kthread+0x453/0x480 kernel/kthread.c:319
 ret_from_fork+0x1f/0x30
INFO: task syz-executor.5:10963 blocked for more than 143 seconds.
      Not tainted 5.14.0-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.5  state:D stack:26608 pid:10963 ppid:     1 flags:0x00004004
Call Trace:
 context_switch kernel/sched/core.c:4940 [inline]
 __schedule+0xc8d/0x1270 kernel/sched/core.c:6287
 schedule+0x14b/0x210 kernel/sched/core.c:6366
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6425
 __mutex_lock_common+0xdff/0x2550 kernel/locking/mutex.c:669
 __mutex_lock kernel/locking/mutex.c:729 [inline]
 mutex_lock_nested+0x1a/0x20 kernel/locking/mutex.c:743
 rtnl_lock net/core/rtnetlink.c:72 [inline]
 rtnetlink_rcv_msg+0x8ed/0xe60 net/core/rtnetlink.c:5569
 netlink_rcv_skb+0x200/0x470 net/netlink/af_netlink.c:2504
 netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
 netlink_unicast+0x814/0x9f0 net/netlink/af_netlink.c:1340
 netlink_sendmsg+0xa29/0xe50 net/netlink/af_netlink.c:1929
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg net/socket.c:724 [inline]
 __sys_sendto+0x560/0x720 net/socket.c:2036
 __do_sys_sendto net/socket.c:2048 [inline]
 __se_sys_sendto net/socket.c:2044 [inline]
 __x64_sys_sendto+0xda/0xf0 net/socket.c:2044
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x41958c
RSP: 002b:00007ffcd29e8c30 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00000000014a4320 RCX: 000000000041958c
RDX: 0000000000000028 RSI: 00000000014a4370 RDI: 0000000000000003
RBP: 0000000000000000 R08: 00007ffcd29e8c84 R09: 000000000000000c
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
R13: 00000000014a4370 R14: 0000000000000003 R15: 0000000000000000
INFO: task syz-executor.3:10965 blocked for more than 144 seconds.
      Not tainted 5.14.0-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.3  state:D stack:26360 pid:10965 ppid:     1 flags:0x00004004
Call Trace:
 context_switch kernel/sched/core.c:4940 [inline]
 __schedule+0xc8d/0x1270 kernel/sched/core.c:6287
 schedule+0x14b/0x210 kernel/sched/core.c:6366
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6425
 __mutex_lock_common+0xdff/0x2550 kernel/locking/mutex.c:669
 __mutex_lock kernel/locking/mutex.c:729 [inline]
 mutex_lock_nested+0x1a/0x20 kernel/locking/mutex.c:743
 rtnl_lock net/core/rtnetlink.c:72 [inline]
 rtnetlink_rcv_msg+0x8ed/0xe60 net/core/rtnetlink.c:5569
 netlink_rcv_skb+0x200/0x470 net/netlink/af_netlink.c:2504
 netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
 netlink_unicast+0x814/0x9f0 net/netlink/af_netlink.c:1340
 netlink_sendmsg+0xa29/0xe50 net/netlink/af_netlink.c:1929
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg net/socket.c:724 [inline]
 __sys_sendto+0x560/0x720 net/socket.c:2036
 __do_sys_sendto net/socket.c:2048 [inline]
 __se_sys_sendto net/socket.c:2044 [inline]
 __x64_sys_sendto+0xda/0xf0 net/socket.c:2044
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x41958c
RSP: 002b:00007ffe691873c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00000000014a4320 RCX: 000000000041958c
RDX: 0000000000000028 RSI: 00000000014a4370 RDI: 0000000000000003
RBP: 0000000000000000 R08: 00007ffe69187414 R09: 000000000000000c
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
R13: 00000000014a4370 R14: 0000000000000003 R15: 0000000000000000

Showing all locks held in the system:
1 lock held by khungtaskd/26:
 #0: ffffffff8c91c080 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30
3 locks held by kworker/1:1/31:
 #0: ffff888011064d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x7ca/0x1140
 #1: ffffc90000e6fd20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x808/0x1140 kernel/workqueue.c:2272
 #2: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 net/core/link_watch.c:251
4 locks held by kworker/u4:4/1146:
 #0: ffff8881443a3138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x7ca/0x1140
 #1: ffffc900049efd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x808/0x1140 kernel/workqueue.c:2272
 #2: ffffffff8d9504f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf0/0xc50 net/core/net_namespace.c:553
 #3: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: tc_action_net_exit include/net/act_api.h:155 [inline]
 #3: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: gate_exit_net+0x2c/0x100 net/sched/act_gate.c:624
3 locks held by kworker/1:3/2965:
 #0: ffff888025d6d938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x7ca/0x1140
 #1: ffffc900012dfd20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x808/0x1140 kernel/workqueue.c:2272
 #2: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 net/ipv6/addrconf.c:4590
1 lock held by in:imklog/6219:
 #0: ffff8880784919f0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0x24e/0x2f0 fs/file.c:990
3 locks held by kworker/1:5/8230:
 #0: ffff888011064d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x7ca/0x1140
 #1: ffffc9000e87fd20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x808/0x1140 kernel/workqueue.c:2272
 #2: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 net/switchdev/switchdev.c:74
3 locks held by kworker/u4:7/10444:
 #0: ffff888018780938 ((wq_completion)cfg80211){+.+.}-{0:0}, at: process_one_work+0x7ca/0x1140
 #1: ffffc9001682fd20 ((work_completion)(&(&rdev->dfs_update_channels_wk)->work)){+.+.}-{0:0}, at: process_one_work+0x808/0x1140 kernel/workqueue.c:2272
 #2: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: cfg80211_dfs_channels_update_work+0xbc/0x660 net/wireless/mlme.c:842
1 lock held by syz-executor.0/10940:
 #0: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: tun_detach drivers/net/tun.c:684 [inline]
 #0: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3c/0x130 drivers/net/tun.c:3397
1 lock held by syz-executor.1/10947:
 #0: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: tun_detach drivers/net/tun.c:684 [inline]
 #0: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3c/0x130 drivers/net/tun.c:3397
2 locks held by syz-executor.4/10952:
1 lock held by syz-executor.5/10963:
 #0: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:72 [inline]
 #0: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x8ed/0xe60 net/core/rtnetlink.c:5569
1 lock held by syz-executor.3/10965:
 #0: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:72 [inline]
 #0: ffffffff8d95c148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x8ed/0xe60 net/core/rtnetlink.c:5569

=============================================

NMI backtrace for cpu 1
CPU: 1 PID: 26 Comm: khungtaskd Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1dc/0x2d8 lib/dump_stack.c:106
 nmi_cpu_backtrace+0x45f/0x490 lib/nmi_backtrace.c:105
 nmi_trigger_cpumask_backtrace+0x16a/0x280 lib/nmi_backtrace.c:62
 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
 check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline]
 watchdog+0xc54/0xca0 kernel/hung_task.c:295
 kthread+0x453/0x480 kernel/kthread.c:319
 ret_from_fork+0x1f/0x30
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 10 Comm: kworker/u4:1 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: events_unbound flush_memcg_stats_dwork
RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:84 [inline]
RIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline]
RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]
RIP: 0010:kasan_check_range+0x73/0x2f0 mm/kasan/generic.c:189
Code: 8d 54 37 ff 49 c1 ea 03 49 bd 01 00 00 00 00 fc ff df 4d 01 ea 4d 89 d6 4d 29 ce 49 83 fe 10 7f 30 4d 85 f6 0f 84 ae 01 00 00 <4c> 89 cb 4c 29 d3 0f 1f 80 00 00 00 00 45 0f b6 19 45 84 db 0f 85
RSP: 0018:ffffc90000cf79c0 EFLAGS: 00000002
RAX: 1ffffffff18fd101 RBX: 000000000001ffff RCX: ffffffff8162bd20
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8c7e8978
RBP: ffff8880b9d1f880 R08: dffffc0000000000 R09: fffffbfff18fd12f
R10: fffffbfff18fd130 R11: 0000000000000000 R12: 1ffffffff18fd12f
R13: dffffc0000000001 R14: 0000000000000001 R15: ffffffff8c7e8978
FS:  0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f92f0666000 CR3: 000000000c68e000 CR4: 00000000001506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 instrument_atomic_read include/linux/instrumented.h:71 [inline]
 test_bit include/asm-generic/bitops/instrumented-non-atomic.h:134 [inline]
 psi_group_change+0xa10/0x1000 kernel/sched/psi.c:749
 psi_enqueue kernel/sched/stats.h:82 [inline]
 enqueue_task kernel/sched/core.c:1972 [inline]
 activate_task+0x277/0x300 kernel/sched/core.c:2001
 ttwu_do_activate+0x142/0x2a0 kernel/sched/core.c:3577
 ttwu_queue kernel/sched/core.c:3774 [inline]
 try_to_wake_up+0x8d4/0xef0 kernel/sched/core.c:4097
 wake_up_worker kernel/workqueue.c:855 [inline]
 process_one_work+0x706/0x1140 kernel/workqueue.c:2260
 worker_thread+0xac1/0x1320 kernel/workqueue.c:2444
 kthread+0x453/0x480 kernel/kthread.c:319
 ret_from_fork+0x1f/0x30
----------------
Code disassembly (best guess):
   0:	8d 54 37 ff          	lea    -0x1(%rdi,%rsi,1),%edx
   4:	49 c1 ea 03          	shr    $0x3,%r10
   8:	49 bd 01 00 00 00 00 	movabs $0xdffffc0000000001,%r13
   f:	fc ff df
  12:	4d 01 ea             	add    %r13,%r10
  15:	4d 89 d6             	mov    %r10,%r14
  18:	4d 29 ce             	sub    %r9,%r14
  1b:	49 83 fe 10          	cmp    $0x10,%r14
  1f:	7f 30                	jg     0x51
  21:	4d 85 f6             	test   %r14,%r14
  24:	0f 84 ae 01 00 00    	je     0x1d8
* 2a:	4c 89 cb             	mov    %r9,%rbx <-- trapping instruction
  2d:	4c 29 d3             	sub    %r10,%rbx
  30:	0f 1f 80 00 00 00 00 	nopl   0x0(%rax)
  37:	45 0f b6 19          	movzbl (%r9),%r11d
  3b:	45 84 db             	test   %r11b,%r11b
  3e:	0f                   	.byte 0xf
  3f:	85                   	.byte 0x85