INFO: task syz.7.595:12011 blocked for more than 143 seconds.
Tainted: G W syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.7.595 state:D stack:26024 pid:12011 tgid:12009 ppid:11446 task_flags:0x400140 flags:0x00004004
Call Trace:
context_switch kernel/sched/core.c:5357 [inline]
__schedule+0x16f3/0x4c20 kernel/sched/core.c:6961
__schedule_loop kernel/sched/core.c:7043 [inline]
rt_mutex_schedule+0x77/0xf0 kernel/sched/core.c:7339
rt_mutex_slowlock_block kernel/locking/rtmutex.c:1647 [inline]
__rt_mutex_slowlock kernel/locking/rtmutex.c:1721 [inline]
__rt_mutex_slowlock_locked+0x1e04/0x25e0 kernel/locking/rtmutex.c:1760
rt_mutex_slowlock+0xb5/0x160 kernel/locking/rtmutex.c:1800
__rt_mutex_lock kernel/locking/rtmutex.c:1815 [inline]
rwbase_write_lock+0x14f/0x750 kernel/locking/rwbase_rt.c:244
__super_lock fs/super.c:57 [inline]
super_lock+0x25c/0x3b0 fs/super.c:121
user_get_super+0xc8/0x120 fs/super.c:998
quotactl_block fs/quota/quota.c:890 [inline]
__do_sys_quotactl fs/quota/quota.c:955 [inline]
__se_sys_quotactl+0x4da/0x950 fs/quota/quota.c:917
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f7017f0ebe9
RSP: 002b:00007f701616e038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3
RAX: ffffffffffffffda RBX: 00007f7018135fa0 RCX: 00007f7017f0ebe9
RDX: 000000000000ee01 RSI: 0000200000000040 RDI: ffffffff80000202
RBP: 00007f7017f91e19 R08: 0000000000000000 R09: 0000000000000000
R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f7018136038 R14: 00007f7018135fa0 R15: 00007fff5f7bba98
INFO: lockdep is turned off.
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 39 Comm: khungtaskd Tainted: G W syzkaller #0 PREEMPT_{RT,(full)}
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
Call Trace:
dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
nmi_cpu_backtrace+0x39e/0x3d0 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:328 [inline]
watchdog+0xf93/0xfe0 kernel/hung_task.c:491
kthread+0x70e/0x8a0 kernel/kthread.c:463
ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 13888 Comm: dhcpcd-run-hook Tainted: G W syzkaller #0 PREEMPT_{RT,(full)}
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:on_stack arch/x86/include/asm/stacktrace.h:56 [inline]
RIP: 0010:stack_access_ok arch/x86/kernel/unwind_orc.c:393 [inline]
RIP: 0010:deref_stack_reg+0x5c/0x230 arch/x86/kernel/unwind_orc.c:403
Code: 00 4c 89 04 24 74 16 48 89 df e8 ff b7 aa 00 4c 8b 04 24 48 be 00 00 00 00 00 fc ff df 48 89 5c 24 10 49 8b 5f 08 4d 8d 77 10 <4d> 89 f5 49 c1 ed 03 41 80 7c 35 00 00 74 16 4c 89 f7 e8 cd b7 aa
RSP: 0018:ffffc9000123ee60 EFLAGS: 00000246
RAX: fffffffffffffff0 RBX: ffffc90001238000 RCX: 0000000000000000
RDX: ffffc9000123f028 RSI: dffffc0000000000 RDI: ffffc9000123efe8
RBP: dffffc0000000000 R08: ffffc9000123efd8 R09: 0000000000000000
R10: ffffc9000123f038 R11: fffff52000247e09 R12: 1ffff92000247dfe
R13: ffffc9000123f038 R14: ffffc9000123eff8 R15: ffffc9000123efe8
FS: 00007ff9ba14ec80(0000) GS:ffff8881269c5000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fff405a2ff8 CR3: 000000009427e000 CR4: 00000000003526f0
Call Trace:
unwind_next_frame+0x17c4/0x2390 arch/x86/kernel/unwind_orc.c:-1
__unwind_start+0x5b9/0x760 arch/x86/kernel/unwind_orc.c:758
unwind_start arch/x86/include/asm/unwind.h:64 [inline]
arch_stack_walk+0xe4/0x150 arch/x86/kernel/stacktrace.c:24
stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
poison_kmalloc_redzone mm/kasan/common.c:388 [inline]
__kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:405
kasan_kmalloc include/linux/kasan.h:260 [inline]
__do_kmalloc_node mm/slub.c:4365 [inline]
__kmalloc_node_track_caller_noprof+0x1f3/0x450 mm/slub.c:4384
kmalloc_reserve+0x136/0x290 net/core/skbuff.c:600
__alloc_skb+0x142/0x2d0 net/core/skbuff.c:669
alloc_skb include/linux/skbuff.h:1336 [inline]
nlmsg_new include/net/netlink.h:1055 [inline]
audit_buffer_alloc kernel/audit.c:1795 [inline]
audit_log_start+0x152/0x850 kernel/audit.c:1913
common_lsm_audit+0xba/0x2e0 security/lsm_audit.c:442
smack_log+0x394/0x3f0 security/smack/smack_access.c:391
smk_tskacc+0x2fc/0x370 security/smack/smack_access.c:255
smack_inode_permission+0x28f/0x320 security/smack/smack_lsm.c:1217
security_inode_permission+0xf8/0x310 security/security.c:2324
may_lookup fs/namei.c:1851 [inline]
link_path_walk+0x851/0xea0 fs/namei.c:2445
path_lookupat+0x97/0x430 fs/namei.c:2653
filename_lookup+0x212/0x570 fs/namei.c:2683
vfs_statx+0xf8/0x550 fs/stat.c:353
vfs_fstatat+0x118/0x170 fs/stat.c:375
__do_sys_newfstatat fs/stat.c:542 [inline]
__se_sys_newfstatat fs/stat.c:536 [inline]
__x64_sys_newfstatat+0x116/0x190 fs/stat.c:536
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff9ba308b0a
Code: 48 8b 15 f1 f2 0d 00 f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 07 31 c0 c3 0f 1f 40 00 48 8b 15 b9 f2 0d 00 f7
RSP: 002b:00007fff74a87338 EFLAGS: 00000246 ORIG_RAX: 0000000000000106
RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ff9ba308b0a
RDX: 00007fff74a87348 RSI: 000055ac6c46c330 RDI: 00000000ffffff9c
RBP: 000055ac6c465040 R08: 0000000000000001 R09: 3c00000040001201
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff9ba490322
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000