INFO: task syz.1.46:6237 blocked for more than 143 seconds. Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.1.46 state:D stack:25272 pid:6237 tgid:6236 ppid:5833 task_flags:0x400140 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:5382 [inline] __schedule+0x168f/0x4c70 kernel/sched/core.c:6767 __schedule_loop kernel/sched/core.c:6845 [inline] schedule+0x165/0x360 kernel/sched/core.c:6860 percpu_rwsem_wait+0x2ab/0x300 kernel/locking/percpu-rwsem.c:162 __percpu_down_read+0xe3/0x120 kernel/locking/percpu-rwsem.c:177 percpu_down_read include/linux/percpu-rwsem.h:66 [inline] __sb_start_write include/linux/fs.h:1783 [inline] sb_start_write+0x185/0x1c0 include/linux/fs.h:1919 mnt_want_write+0x41/0x90 fs/namespace.c:556 do_rmdir+0x165/0x630 fs/namei.c:4497 __do_sys_rmdir fs/namei.c:4528 [inline] __se_sys_rmdir fs/namei.c:4526 [inline] __x64_sys_rmdir+0x47/0x50 fs/namei.c:4526 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f3e5198e969 RSP: 002b:00007f3e52852038 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 RAX: ffffffffffffffda RBX: 00007f3e51bb5fa0 RCX: 00007f3e5198e969 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000000c0 RBP: 00007f3e51a10ab1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f3e51bb5fa0 R15: 00007ffe8e020338 Showing all locks held in the system: 1 lock held by khungtaskd/31: #0: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline] #0: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline] #0: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6764 3 locks held by kworker/u8:2/36: #0: ffff88801a089148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3213 [inline] #0: ffff88801a089148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b1/0x17a0 kernel/workqueue.c:3319 #1: ffffc90000ad7c60 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3214 [inline] #1: ffffc90000ad7c60 ((linkwatch_work).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ec/0x17a0 kernel/workqueue.c:3319 #2: ffffffff8f2e5008 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0xe/0x60 net/core/link_watch.c:303 5 locks held by kworker/u8:3/53: #0: ffff88801aef3948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3213 [inline] #0: ffff88801aef3948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x9b1/0x17a0 kernel/workqueue.c:3319 #1: ffffc90000be7c60 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3214 [inline] #1: ffffc90000be7c60 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ec/0x17a0 kernel/workqueue.c:3319 #2: ffffffff8f2d84d0 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x145/0xbd0 net/core/net_namespace.c:608 #3: ffffffff8f2e5008 (rtnl_mutex){+.+.}-{4:4}, at: default_device_exit_batch+0xdc/0x890 net/core/dev.c:12514 #4: ffffffff8df437b8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock kernel/rcu/tree_exp.h:304 [inline] #4: ffffffff8df437b8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x2f4/0x730 kernel/rcu/tree_exp.h:998 3 locks held by kworker/u8:6/3471: #0: ffff88814cb25148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3213 [inline] #0: ffff88814cb25148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b1/0x17a0 kernel/workqueue.c:3319 #1: ffffc9000b70fc60 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3214 [inline] #1: ffffc9000b70fc60 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ec/0x17a0 kernel/workqueue.c:3319 #2: ffffffff8f2e5008 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:130 [inline] #2: ffffffff8f2e5008 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_dad_work+0x112/0x14b0 net/ipv6/addrconf.c:4198 2 locks held by getty/5586: #0: ffff88803098b0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243 #1: ffffc900036c32f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400 drivers/tty/n_tty.c:2222 1 lock held by syz.1.46/6237: #0: ffff88807bae6420 (sb_writers#25){++++}-{0:0}, at: mnt_want_write+0x41/0x90 fs/namespace.c:556 1 lock held by syz-executor/7281: 1 lock held by syz-executor/7631: #0: ffffffff8f2e5008 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:130 [inline] #0: ffffffff8f2e5008 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 net/ipv4/devinet.c:979 1 lock held by syz-executor/7854: #0: ffffffff8f2e5008 (rtnl_mutex){+.+.}-{4:4}, at: __tun_chr_ioctl+0x37a/0x1d90 drivers/net/tun.c:3038 1 lock held by syz.0.221/7911: #0: ffffffff8df437b8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock kernel/rcu/tree_exp.h:336 [inline] #0: ffffffff8df437b8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x3b7/0x730 kernel/rcu/tree_exp.h:998 6 locks held by dhcpcd-run-hook/7945: ============================================= NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 nmi_cpu_backtrace+0x39e/0x3d0 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline] watchdog+0xfee/0x1030 kernel/hung_task.c:437 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 7947 Comm: rm Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:ima_file_mmap+0x0/0x1f0 security/integrity/ima/ima_main.c:458 Code: ff 4c 89 e7 e8 b1 b6 ac fd e9 36 fd ff ff 66 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 RSP: 0018:ffffc900039d7908 EFLAGS: 00000293 RAX: ffffffff846951b4 RBX: 0000000000000012 RCX: 0000000000000012 RDX: 0000000000000003 RSI: 0000000000000003 RDI: ffff88804b29bc00 RBP: 0000000000000000 R08: 0000000000000012 R09: 0000000000000002 R10: dffffc0000000000 R11: ffffed10058963c1 R12: ffff88802c4b2388 R13: 1ffff9200073af30 R14: 0000000000000003 R15: ffff88804b29bc00 FS: 0000000000000000(0000) GS:ffff8881260fb000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f13008b2286 CR3: 00000000320d0000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: security_mmap_file+0x7a4/0xa60 security/security.c:2982 vm_mmap_pgoff+0x12c/0x4c0 mm/util.c:573 elf_map fs/binfmt_elf.c:391 [inline] elf_load+0x245/0x6c0 fs/binfmt_elf.c:414 load_elf_binary+0x1050/0x27a0 fs/binfmt_elf.c:1180 search_binary_handler fs/exec.c:1778 [inline] exec_binprm fs/exec.c:1810 [inline] bprm_execve+0x999/0x1440 fs/exec.c:1862 do_execveat_common+0x510/0x6a0 fs/exec.c:1968 do_execve fs/exec.c:2042 [inline] __do_sys_execve fs/exec.c:2118 [inline] __se_sys_execve fs/exec.c:2113 [inline] __x64_sys_execve+0x94/0xb0 fs/exec.c:2113 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f13007f8107 Code: Unable to access opcode bytes at 0x7f13007f80dd. RSP: 002b:00007ffc138f0be8 EFLAGS: 00000246 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 000055acae3d00c8 RCX: 00007f13007f8107 RDX: 000055acae3d00e8 RSI: 000055acae3d00c8 RDI: 000055acae3d0170 RBP: 000055acae3d0170 R08: 00007ffc138f4e28 R09: 0000000000000000 R10: 0000000000000008 R11: 0000000000000246 R12: 000055acae3d00e8 R13: 00007f13009bde8b R14: 000055acae3d00e8 R15: 0000000000000000