INFO: task syz-executor.3:20103 blocked for more than 143 seconds. Not tainted 6.10.0-rc4-syzkaller-00148-g50736169ecc8 #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.3 state:D stack:28704 pid:20103 tgid:20100 ppid:17462 flags:0x00000006 Call Trace: context_switch kernel/sched/core.c:5408 [inline] __schedule+0xf15/0x5d00 kernel/sched/core.c:6745 __schedule_loop kernel/sched/core.c:6822 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6837 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6894 rwsem_down_read_slowpath+0x61e/0xb20 kernel/locking/rwsem.c:1086 __down_read_common kernel/locking/rwsem.c:1250 [inline] __down_read kernel/locking/rwsem.c:1263 [inline] down_read+0x124/0x330 kernel/locking/rwsem.c:1528 inode_lock_shared include/linux/fs.h:801 [inline] lookup_slow fs/namei.c:1708 [inline] walk_component+0x342/0x5b0 fs/namei.c:2004 link_path_walk.part.0.constprop.0+0x77f/0xcd0 fs/namei.c:2331 link_path_walk fs/namei.c:2255 [inline] path_lookupat+0x93/0x770 fs/namei.c:2492 do_o_path fs/namei.c:3778 [inline] path_openat+0x1a47/0x29f0 fs/namei.c:3800 do_filp_open+0x1dc/0x430 fs/namei.c:3834 do_sys_openat2+0x17a/0x1e0 fs/open.c:1405 do_sys_open fs/open.c:1420 [inline] __do_sys_openat fs/open.c:1436 [inline] __se_sys_openat fs/open.c:1431 [inline] __x64_sys_openat+0x175/0x210 fs/open.c:1431 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ff5eb47cf29 RSP: 002b:00007ff5ec1d20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007ff5eb5b4050 RCX: 00007ff5eb47cf29 RDX: 0000000000200002 RSI: 00000000200001c0 RDI: ffffffffffffff9c RBP: 00007ff5eb4ec074 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000006e R14: 00007ff5eb5b4050 R15: 00007fff33f70e18 Showing all locks held in the system: 1 lock held by khungtaskd/30: #0: ffffffff8dbb1920 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline] #0: ffffffff8dbb1920 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline] #0: ffffffff8dbb1920 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340 kernel/locking/lockdep.c:6614 3 locks held by kworker/u8:2/35: 2 locks held by getty/4835: #0: ffff88802aa6c0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243 #1: ffffc90002f062f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfc8/0x1490 drivers/tty/n_tty.c:2211 2 locks held by syz-fuzzer/5092: 2 locks held by kworker/1:9/10727: #0: ffff888015480948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x12bf/0x1b60 kernel/workqueue.c:3206 #1: ffffc9000341fd80 (xfrm_state_gc_work){+.+.}-{0:0}, at: process_one_work+0x957/0x1b60 kernel/workqueue.c:3207 2 locks held by syz-executor.3/20101: 1 lock held by syz-executor.3/20103: #0: ffff888051b00188 (&type->i_mutex_dir_key#27){++++}-{3:3}, at: inode_lock_shared include/linux/fs.h:801 [inline] #0: ffff888051b00188 (&type->i_mutex_dir_key#27){++++}-{3:3}, at: lookup_slow fs/namei.c:1708 [inline] #0: ffff888051b00188 (&type->i_mutex_dir_key#27){++++}-{3:3}, at: walk_component+0x342/0x5b0 fs/namei.c:2004 1 lock held by syz-executor.3/20302: #0: ffffffff8dbbd0b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 kernel/rcu/tree_exp.h:323 1 lock held by syz-executor.2/21057: #0: ffff88805a95a610 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:791 [inline] #0: ffff88805a95a610 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x270 net/socket.c:658 1 lock held by syz-executor.2/21064: #0: ffffffff8dbbd0b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 kernel/rcu/tree_exp.h:323 1 lock held by syz-executor.0/21075: #0: ffff8880b923ebd8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested kernel/sched/core.c:567 [inline] #0: ffff8880b923ebd8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x7e/0x130 kernel/sched/core.c:552 1 lock held by syz-executor.0/21079: #0: ffff88802d6c44b8 (&nft_net->commit_mutex){+.+.}-{3:3}, at: nf_tables_valid_genid+0x33/0x130 net/netfilter/nf_tables_api.c:10759 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 30 Comm: khungtaskd Not tainted 6.10.0-rc4-syzkaller-00148-g50736169ecc8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114 nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline] watchdog+0xf86/0x1240 kernel/hung_task.c:379 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 10727 Comm: kworker/1:9 Not tainted 6.10.0-rc4-syzkaller-00148-g50736169ecc8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Workqueue: events nsim_dev_trap_report_work RIP: 0010:memset_orig+0x46/0xb0 arch/x86/lib/memset_64.S:72 Code: 41 83 e1 07 75 70 48 89 d1 48 c1 e9 06 74 35 0f 1f 44 00 00 48 ff c9 48 89 07 48 89 47 08 48 89 47 10 48 89 47 18 48 89 47 20 <48> 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d8 0f 1f 84 00 RSP: 0018:ffffc9000341fab8 EFLAGS: 00000202 RAX: fbfbfbfbfbfbfbfb RBX: ffff88801bae4000 RCX: 0000000000000001 RDX: 0000000000000200 RSI: 00000000000000fb RDI: ffffed100375c980 RBP: ffff888015442140 R08: 0000000000002000 R09: 0000000000000000 R10: ffffed100375c800 R11: 0000000000000004 R12: 0000000000000000 R13: ffffffff88bc3c18 R14: ffff888015442140 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b32444000 CR3: 000000005fe6c000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: poison_slab_object+0xec/0x160 mm/kasan/common.c:236 __kasan_slab_free+0x32/0x50 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2196 [inline] slab_free mm/slub.c:4437 [inline] kfree+0x12a/0x3b0 mm/slub.c:4558 skb_kfree_head net/core/skbuff.c:1069 [inline] skb_free_head+0x108/0x1d0 net/core/skbuff.c:1081 skb_release_data+0x75c/0x980 net/core/skbuff.c:1108 skb_release_all net/core/skbuff.c:1173 [inline] __kfree_skb net/core/skbuff.c:1187 [inline] consume_skb net/core/skbuff.c:1409 [inline] consume_skb+0xd0/0x170 net/core/skbuff.c:1403 nsim_dev_trap_report drivers/net/netdevsim/dev.c:821 [inline] nsim_dev_trap_report_work+0x878/0xc80 drivers/net/netdevsim/dev.c:850 process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244