INFO: task syz-executor.3:20103 blocked for more than 143 seconds.
Not tainted 6.10.0-rc4-syzkaller-00148-g50736169ecc8 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.3 state:D stack:28704 pid:20103 tgid:20100 ppid:17462 flags:0x00000006
Call Trace:
context_switch kernel/sched/core.c:5408 [inline]
__schedule+0xf15/0x5d00 kernel/sched/core.c:6745
__schedule_loop kernel/sched/core.c:6822 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6837
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6894
rwsem_down_read_slowpath+0x61e/0xb20 kernel/locking/rwsem.c:1086
__down_read_common kernel/locking/rwsem.c:1250 [inline]
__down_read kernel/locking/rwsem.c:1263 [inline]
down_read+0x124/0x330 kernel/locking/rwsem.c:1528
inode_lock_shared include/linux/fs.h:801 [inline]
lookup_slow fs/namei.c:1708 [inline]
walk_component+0x342/0x5b0 fs/namei.c:2004
link_path_walk.part.0.constprop.0+0x77f/0xcd0 fs/namei.c:2331
link_path_walk fs/namei.c:2255 [inline]
path_lookupat+0x93/0x770 fs/namei.c:2492
do_o_path fs/namei.c:3778 [inline]
path_openat+0x1a47/0x29f0 fs/namei.c:3800
do_filp_open+0x1dc/0x430 fs/namei.c:3834
do_sys_openat2+0x17a/0x1e0 fs/open.c:1405
do_sys_open fs/open.c:1420 [inline]
__do_sys_openat fs/open.c:1436 [inline]
__se_sys_openat fs/open.c:1431 [inline]
__x64_sys_openat+0x175/0x210 fs/open.c:1431
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff5eb47cf29
RSP: 002b:00007ff5ec1d20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00007ff5eb5b4050 RCX: 00007ff5eb47cf29
RDX: 0000000000200002 RSI: 00000000200001c0 RDI: ffffffffffffff9c
RBP: 00007ff5eb4ec074 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007ff5eb5b4050 R15: 00007fff33f70e18
Showing all locks held in the system:
1 lock held by khungtaskd/30:
#0: ffffffff8dbb1920 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
#0: ffffffff8dbb1920 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline]
#0: ffffffff8dbb1920 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340 kernel/locking/lockdep.c:6614
3 locks held by kworker/u8:2/35:
2 locks held by getty/4835:
#0: ffff88802aa6c0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243
#1: ffffc90002f062f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfc8/0x1490 drivers/tty/n_tty.c:2211
2 locks held by syz-fuzzer/5092:
2 locks held by kworker/1:9/10727:
#0: ffff888015480948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x12bf/0x1b60 kernel/workqueue.c:3206
#1: ffffc9000341fd80 (xfrm_state_gc_work){+.+.}-{0:0}, at: process_one_work+0x957/0x1b60 kernel/workqueue.c:3207
2 locks held by syz-executor.3/20101:
1 lock held by syz-executor.3/20103:
#0: ffff888051b00188 (&type->i_mutex_dir_key#27){++++}-{3:3}, at: inode_lock_shared include/linux/fs.h:801 [inline]
#0: ffff888051b00188 (&type->i_mutex_dir_key#27){++++}-{3:3}, at: lookup_slow fs/namei.c:1708 [inline]
#0: ffff888051b00188 (&type->i_mutex_dir_key#27){++++}-{3:3}, at: walk_component+0x342/0x5b0 fs/namei.c:2004
1 lock held by syz-executor.3/20302:
#0: ffffffff8dbbd0b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 kernel/rcu/tree_exp.h:323
1 lock held by syz-executor.2/21057:
#0: ffff88805a95a610 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:791 [inline]
#0: ffff88805a95a610 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x270 net/socket.c:658
1 lock held by syz-executor.2/21064:
#0: ffffffff8dbbd0b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 kernel/rcu/tree_exp.h:323
1 lock held by syz-executor.0/21075:
#0: ffff8880b923ebd8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested kernel/sched/core.c:567 [inline]
#0: ffff8880b923ebd8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x7e/0x130 kernel/sched/core.c:552
1 lock held by syz-executor.0/21079:
#0: ffff88802d6c44b8 (&nft_net->commit_mutex){+.+.}-{3:3}, at: nf_tables_valid_genid+0x33/0x130 net/netfilter/nf_tables_api.c:10759
=============================================
NMI backtrace for cpu 0
CPU: 0 PID: 30 Comm: khungtaskd Not tainted 6.10.0-rc4-syzkaller-00148-g50736169ecc8 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114
nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]
watchdog+0xf86/0x1240 kernel/hung_task.c:379
kthread+0x2c1/0x3a0 kernel/kthread.c:389
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 10727 Comm: kworker/1:9 Not tainted 6.10.0-rc4-syzkaller-00148-g50736169ecc8 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
Workqueue: events nsim_dev_trap_report_work
RIP: 0010:memset_orig+0x46/0xb0 arch/x86/lib/memset_64.S:72
Code: 41 83 e1 07 75 70 48 89 d1 48 c1 e9 06 74 35 0f 1f 44 00 00 48 ff c9 48 89 07 48 89 47 08 48 89 47 10 48 89 47 18 48 89 47 20 <48> 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d8 0f 1f 84 00
RSP: 0018:ffffc9000341fab8 EFLAGS: 00000202
RAX: fbfbfbfbfbfbfbfb RBX: ffff88801bae4000 RCX: 0000000000000001
RDX: 0000000000000200 RSI: 00000000000000fb RDI: ffffed100375c980
RBP: ffff888015442140 R08: 0000000000002000 R09: 0000000000000000
R10: ffffed100375c800 R11: 0000000000000004 R12: 0000000000000000
R13: ffffffff88bc3c18 R14: ffff888015442140 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b32444000 CR3: 000000005fe6c000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
poison_slab_object+0xec/0x160 mm/kasan/common.c:236
__kasan_slab_free+0x32/0x50 mm/kasan/common.c:256
kasan_slab_free include/linux/kasan.h:184 [inline]
slab_free_hook mm/slub.c:2196 [inline]
slab_free mm/slub.c:4437 [inline]
kfree+0x12a/0x3b0 mm/slub.c:4558
skb_kfree_head net/core/skbuff.c:1069 [inline]
skb_free_head+0x108/0x1d0 net/core/skbuff.c:1081
skb_release_data+0x75c/0x980 net/core/skbuff.c:1108
skb_release_all net/core/skbuff.c:1173 [inline]
__kfree_skb net/core/skbuff.c:1187 [inline]
consume_skb net/core/skbuff.c:1409 [inline]
consume_skb+0xd0/0x170 net/core/skbuff.c:1403
nsim_dev_trap_report drivers/net/netdevsim/dev.c:821 [inline]
nsim_dev_trap_report_work+0x878/0xc80 drivers/net/netdevsim/dev.c:850
process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
process_scheduled_works kernel/workqueue.c:3312 [inline]
worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
kthread+0x2c1/0x3a0 kernel/kthread.c:389
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244