INFO: task syz.9.533:10335 blocked for more than 143 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.9.533 state:D stack:24344 pid:10335 tgid:10334 ppid:7718 task_flags:0x400140 flags:0x00000004
Call Trace:
context_switch kernel/sched/core.c:5382 [inline]
__schedule+0x168f/0x4c70 kernel/sched/core.c:6767
__schedule_loop kernel/sched/core.c:6845 [inline]
schedule+0x165/0x360 kernel/sched/core.c:6860
percpu_rwsem_wait+0x2ab/0x300 kernel/locking/percpu-rwsem.c:162
__percpu_down_read+0xe3/0x120 kernel/locking/percpu-rwsem.c:177
percpu_down_read include/linux/percpu-rwsem.h:66 [inline]
__sb_start_write include/linux/fs.h:1783 [inline]
sb_start_write+0x185/0x1c0 include/linux/fs.h:1919
mnt_want_write+0x41/0x90 fs/namespace.c:556
open_last_lookups fs/namei.c:3789 [inline]
path_openat+0x85d/0x3830 fs/namei.c:4036
do_filp_open+0x1fa/0x410 fs/namei.c:4066
do_sys_openat2+0x121/0x1c0 fs/open.c:1429
do_sys_open fs/open.c:1444 [inline]
__do_sys_openat fs/open.c:1460 [inline]
__se_sys_openat fs/open.c:1455 [inline]
__x64_sys_openat+0x138/0x170 fs/open.c:1455
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f8e2a18e969
RSP: 002b:00007f8e2b0be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00007f8e2a3b5fa0 RCX: 00007f8e2a18e969
RDX: 000000000000275a RSI: 0000200000000100 RDI: ffffffffffffff9c
RBP: 00007f8e2a210ab1 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f8e2a3b5fa0 R15: 00007fffe529a348
Showing all locks held in the system:
1 lock held by khungtaskd/31:
#0: ffffffff8df3dee0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#0: ffffffff8df3dee0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
#0: ffffffff8df3dee0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6764
5 locks held by kworker/u8:2/36:
2 locks held by kworker/u8:6/1089:
2 locks held by getty/5583:
#0: ffff88803055e0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243
#1: ffffc90002ffe2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400 drivers/tty/n_tty.c:2222
1 lock held by udevd/9862:
2 locks held by udevd/10189:
#0: ffff888022a2e3a0 (&sb->s_type->i_mutex_key#7){++++}-{4:4}, at: inode_lock_shared include/linux/fs.h:877 [inline]
#0: ffff888022a2e3a0 (&sb->s_type->i_mutex_key#7){++++}-{4:4}, at: blkdev_read_iter+0x2f8/0x440 block/fops.c:808
#1: ffff8880b88399d8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:605
1 lock held by syz.9.533/10335:
#0: ffff88802f0e0420 (sb_writers#25){++++}-{0:0}, at: mnt_want_write+0x41/0x90 fs/namespace.c:556
3 locks held by syz-executor/12892:
#0: ffff8880b89399d8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:605
#1: ffff8880b8923b08 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x39e/0x6d0 kernel/sched/psi.c:987
#2: ffff88807a093758 (&sb->s_type->i_lock_key#9){+.+.}-{3:3}, at: spin_trylock include/linux/spinlock.h:361 [inline]
#2: ffff88807a093758 (&sb->s_type->i_lock_key#9){+.+.}-{3:3}, at: lock_for_kill+0x84/0x210 fs/dcache.c:705
2 locks held by syz.2.1023/13285:
2 locks held by dhcpcd-run-hook/13307:
#0: ffff8880b89399d8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:605
#1: ffff8880b8923b08 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x39e/0x6d0 kernel/sched/psi.c:987
=============================================
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
nmi_cpu_backtrace+0x39e/0x3d0 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline]
watchdog+0xfee/0x1030 kernel/hung_task.c:437
kthread+0x711/0x8a0 kernel/kthread.c:464
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:153
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 13310 Comm: rm Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:file_ref_inc include/linux/file_ref.h:121 [inline]
RIP: 0010:get_file include/linux/fs.h:1133 [inline]
RIP: 0010:__mmap_new_file_vma mm/vma.c:2352 [inline]
RIP: 0010:__mmap_new_vma mm/vma.c:2417 [inline]
RIP: 0010:__mmap_region mm/vma.c:2519 [inline]
RIP: 0010:mmap_region+0xf23/0x1e50 mm/vma.c:2597
Code: 24 18 01 00 00 48 89 44 24 50 49 8d be 60 01 00 00 be 08 00 00 00 e8 1c 3f 0e 00 41 bf 01 00 00 00 f0 4d 0f c1 be 60 01 00 00 <31> ff 4c 89 fe e8 83 6c ae ff 4d 85 ff 78 74 e8 99 67 ae ff 4c 8b
RSP: 0018:ffffc9000418f2c0 EFLAGS: 00000202
RAX: ffffc9000418f301 RBX: ffff88806733f2a0 RCX: ffffffff82118924
RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88807e407820
RBP: ffffc9000418f730 R08: ffff88807e407827 R09: 1ffff1100fc80f04
R10: dffffc0000000000 R11: ffffed100fc80f05 R12: ffff88806733f280
R13: ffffc9000418f3d0 R14: ffff88807e4076c0 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8881261f6000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055aa8d186008 CR3: 000000007f374000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
do_mmap+0xc68/0x1100 mm/mmap.c:561
vm_mmap_pgoff+0x31b/0x4c0 mm/util.c:579
elf_map fs/binfmt_elf.c:387 [inline]
elf_load+0x140/0x6c0 fs/binfmt_elf.c:414
load_elf_interp+0x469/0xaf0 fs/binfmt_elf.c:681
load_elf_binary+0x19d2/0x27a0 fs/binfmt_elf.c:1246
search_binary_handler fs/exec.c:1778 [inline]
exec_binprm fs/exec.c:1810 [inline]
bprm_execve+0x999/0x1440 fs/exec.c:1862
do_execveat_common+0x510/0x6a0 fs/exec.c:1968
do_execve fs/exec.c:2042 [inline]
__do_sys_execve fs/exec.c:2118 [inline]
__se_sys_execve fs/exec.c:2113 [inline]
__x64_sys_execve+0x94/0xb0 fs/exec.c:2113
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6e5ef70107
Code: Unable to access opcode bytes at 0x7f6e5ef700dd.
RSP: 002b:00007fff92965db8 EFLAGS: 00000246 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00005577b8e42fe0 RCX: 00007f6e5ef70107
RDX: 00005577b8e43000 RSI: 00005577b8e42fe0 RDI: 00005577b8e43088
RBP: 00005577b8e43088 R08: 00007fff92968e28 R09: 0000000000000000
R10: 0000000000000008 R11: 0000000000000246 R12: 00005577b8e43000
R13: 00007f6e5f135e8b R14: 00005577b8e43000 R15: 0000000000000000