INFO: task syz.1.205:6997 blocked for more than 143 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.1.205 state:D stack:27000 pid:6997 tgid:6993 ppid:5827 task_flags:0x400740 flags:0x00080002 Call Trace: context_switch kernel/sched/core.c:5282 [inline] __schedule+0x14ed/0x5040 kernel/sched/core.c:6894 __schedule_loop kernel/sched/core.c:6976 [inline] schedule+0x165/0x360 kernel/sched/core.c:6991 schedule_timeout+0x9a/0x270 kernel/time/sleep_timeout.c:75 do_wait_for_common kernel/sched/completion.c:100 [inline] __wait_for_common+0x3da/0x710 kernel/sched/completion.c:121 wait_for_common kernel/sched/completion.c:132 [inline] wait_for_completion_state+0x1c/0x40 kernel/sched/completion.c:269 coredump_wait fs/coredump.c:534 [inline] vfs_coredump+0x94b/0x3e60 fs/coredump.c:1196 get_signal+0x1108/0x1340 kernel/signal.c:3019 arch_do_signal_or_restart+0x9a/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:41 [inline] exit_to_user_mode_loop+0x87/0x4e0 kernel/entry/common.c:75 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline] do_syscall_64+0x2c1/0xf80 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fb170b8f749 RSP: 002b:00007fb16edf6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007fb170de6090 RCX: 00007fb170b8f749 RDX: 0000000000000040 RSI: 0000000000000029 RDI: 000000000000000e RBP: 00007fb170c13f91 R08: 00000000000004e0 R09: 0000000000000000 R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fb170de6128 R14: 00007fb170de6090 R15: 00007ffd1ef45268 Showing all locks held in the system: 1 lock held by khungtaskd/31: #0: ffffffff8e13efa0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:312 [inline] #0: ffffffff8e13efa0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:850 [inline] #0: ffffffff8e13efa0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775 2 locks held by kworker/u8:3/37: #0: ffff8881456cd948 ((wq_completion)iou_exit){+.+.}-{0:0}, at: process_one_work+0x841/0x15a0 kernel/workqueue.c:3254 #1: ffffc90000ad7c40 ((work_completion)(&ctx->exit_work)){+.+.}-{0:0}, at: process_one_work+0x868/0x15a0 kernel/workqueue.c:3255 2 locks held by getty/5578: #0: ffff88814cfdd0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243 #1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x449/0x1460 drivers/tty/n_tty.c:2211 1 lock held by syz-executor/5830: #0: ffffffff8e1445b8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock kernel/rcu/tree_exp.h:343 [inline] #0: ffffffff8e1445b8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x36e/0x6e0 kernel/rcu/tree_exp.h:961 5 locks held by kworker/u8:20/7229: #0: ffff8880b863ab98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0xad/0x140 kernel/sched/core.c:652 #1: ffff8880b8624588 (psi_seq){-.-.}-{0:0}, at: psi_task_switch+0x53/0x880 kernel/sched/psi.c:933 #2: ffff8880b8626118 (&base->lock){-.-.}-{2:2}, at: __mod_timer+0x8ee/0xf30 kernel/time/timer.c:1117 #3: ffffffff8e1fe0e8 (jump_label_mutex){+.+.}-{4:4}, at: jump_label_lock kernel/jump_label.c:27 [inline] #3: ffffffff8e1fe0e8 (jump_label_mutex){+.+.}-{4:4}, at: static_key_enable_cpuslocked+0xcb/0x240 kernel/jump_label.c:207 #4: ffffffff8dfea348 (text_mutex){+.+.}-{4:4}, at: arch_jump_label_transform_apply+0x17/0x30 arch/x86/kernel/jump_label.c:145 ============================================= NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 nmi_cpu_backtrace+0x274/0x2d0 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline] __sys_info lib/sys_info.c:157 [inline] sys_info+0x135/0x170 lib/sys_info.c:165 check_hung_uninterruptible_tasks kernel/hung_task.c:375 [inline] watchdog+0xe88/0xee0 kernel/hung_task.c:588 kthread+0x389/0x480 kernel/kthread.c:467 ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 5830 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:memset_orig+0x3a/0xb0 arch/x86/lib/memset_64.S:71 Code: 01 48 0f af c1 41 89 f9 41 83 e1 07 75 74 48 89 d1 48 c1 e9 06 74 39 66 0f 1f 84 00 00 00 00 00 48 ff c9 48 89 07 48 89 47 08 <48> 89 47 10 48 89 47 18 48 89 47 20 48 89 47 28 48 89 47 30 48 89 RSP: 0018:ffffc90003d17c58 EFLAGS: 00000202 RAX: 0000000000000000 RBX: ffff888022f4a200 RCX: 0000000000000016 RDX: 0000000000001000 RSI: 0000000000000000 RDI: ffff888022f4ac40 RBP: 0000000000000cc0 R08: 00000000f6ccafc2 R09: 0000000000000000 R10: ffff888022f4a200 R11: ffffffff81acb3b0 R12: 0000000000001000 R13: ffff888022f4a200 R14: ffff88801bec5640 R15: ffff888034021e00 FS: 000055558f2cf500(0000) GS:ffff888125c0a000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055558f2f2608 CR3: 00000000634ca000 CR4: 00000000003526f0 Call Trace: slab_post_alloc_hook mm/slub.c:4956 [inline] slab_alloc_node mm/slub.c:5267 [inline] kmem_cache_alloc_noprof+0x3a1/0x710 mm/slub.c:5274 getname_flags+0xb8/0x540 fs/namei.c:146 getname include/linux/fs.h:2497 [inline] getname_maybe_null include/linux/fs.h:2504 [inline] vfs_fstatat+0x43/0x170 fs/stat.c:370 __do_sys_newfstatat fs/stat.c:542 [inline] __se_sys_newfstatat fs/stat.c:536 [inline] __x64_sys_newfstatat+0x116/0x190 fs/stat.c:536 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f171058de3a Code: 48 89 f2 b9 00 01 00 00 48 89 fe bf 9c ff ff ff e9 0b 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 90 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 a8 ff ff ff f7 RSP: 002b:00007fff099abe48 EFLAGS: 00000286 ORIG_RAX: 0000000000000106 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f171058de3a RDX: 00007fff099abe70 RSI: 00007fff099abf00 RDI: 00000000ffffff9c RBP: 00007fff099abf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000100 R11: 0000000000000286 R12: 00007fff099acf90 R13: 00007f1710613d7d R14: 000000000005ad92 R15: 00007fff099acfd0