INFO: task syz.1.205:6997 blocked for more than 143 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.1.205 state:D stack:27000 pid:6997 tgid:6993 ppid:5827 task_flags:0x400740 flags:0x00080002
Call Trace:
context_switch kernel/sched/core.c:5282 [inline]
__schedule+0x14ed/0x5040 kernel/sched/core.c:6894
__schedule_loop kernel/sched/core.c:6976 [inline]
schedule+0x165/0x360 kernel/sched/core.c:6991
schedule_timeout+0x9a/0x270 kernel/time/sleep_timeout.c:75
do_wait_for_common kernel/sched/completion.c:100 [inline]
__wait_for_common+0x3da/0x710 kernel/sched/completion.c:121
wait_for_common kernel/sched/completion.c:132 [inline]
wait_for_completion_state+0x1c/0x40 kernel/sched/completion.c:269
coredump_wait fs/coredump.c:534 [inline]
vfs_coredump+0x94b/0x3e60 fs/coredump.c:1196
get_signal+0x1108/0x1340 kernel/signal.c:3019
arch_do_signal_or_restart+0x9a/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:41 [inline]
exit_to_user_mode_loop+0x87/0x4e0 kernel/entry/common.c:75
__exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline]
syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline]
syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline]
syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline]
do_syscall_64+0x2c1/0xf80 arch/x86/entry/syscall_64.c:100
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb170b8f749
RSP: 002b:00007fb16edf6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fb170de6090 RCX: 00007fb170b8f749
RDX: 0000000000000040 RSI: 0000000000000029 RDI: 000000000000000e
RBP: 00007fb170c13f91 R08: 00000000000004e0 R09: 0000000000000000
R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fb170de6128 R14: 00007fb170de6090 R15: 00007ffd1ef45268
Showing all locks held in the system:
1 lock held by khungtaskd/31:
#0: ffffffff8e13efa0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:312 [inline]
#0: ffffffff8e13efa0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:850 [inline]
#0: ffffffff8e13efa0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775
2 locks held by kworker/u8:3/37:
#0: ffff8881456cd948 ((wq_completion)iou_exit){+.+.}-{0:0}, at: process_one_work+0x841/0x15a0 kernel/workqueue.c:3254
#1: ffffc90000ad7c40 ((work_completion)(&ctx->exit_work)){+.+.}-{0:0}, at: process_one_work+0x868/0x15a0 kernel/workqueue.c:3255
2 locks held by getty/5578:
#0: ffff88814cfdd0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243
#1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x449/0x1460 drivers/tty/n_tty.c:2211
1 lock held by syz-executor/5830:
#0: ffffffff8e1445b8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock kernel/rcu/tree_exp.h:343 [inline]
#0: ffffffff8e1445b8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x36e/0x6e0 kernel/rcu/tree_exp.h:961
5 locks held by kworker/u8:20/7229:
#0: ffff8880b863ab98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0xad/0x140 kernel/sched/core.c:652
#1: ffff8880b8624588 (psi_seq){-.-.}-{0:0}, at: psi_task_switch+0x53/0x880 kernel/sched/psi.c:933
#2: ffff8880b8626118 (&base->lock){-.-.}-{2:2}, at: __mod_timer+0x8ee/0xf30 kernel/time/timer.c:1117
#3: ffffffff8e1fe0e8 (jump_label_mutex){+.+.}-{4:4}, at: jump_label_lock kernel/jump_label.c:27 [inline]
#3: ffffffff8e1fe0e8 (jump_label_mutex){+.+.}-{4:4}, at: static_key_enable_cpuslocked+0xcb/0x240 kernel/jump_label.c:207
#4: ffffffff8dfea348 (text_mutex){+.+.}-{4:4}, at: arch_jump_label_transform_apply+0x17/0x30 arch/x86/kernel/jump_label.c:145
=============================================
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Call Trace:
dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120
nmi_cpu_backtrace+0x274/0x2d0 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline]
__sys_info lib/sys_info.c:157 [inline]
sys_info+0x135/0x170 lib/sys_info.c:165
check_hung_uninterruptible_tasks kernel/hung_task.c:375 [inline]
watchdog+0xe88/0xee0 kernel/hung_task.c:588
kthread+0x389/0x480 kernel/kthread.c:467
ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 5830 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
RIP: 0010:memset_orig+0x3a/0xb0 arch/x86/lib/memset_64.S:71
Code: 01 48 0f af c1 41 89 f9 41 83 e1 07 75 74 48 89 d1 48 c1 e9 06 74 39 66 0f 1f 84 00 00 00 00 00 48 ff c9 48 89 07 48 89 47 08 <48> 89 47 10 48 89 47 18 48 89 47 20 48 89 47 28 48 89 47 30 48 89
RSP: 0018:ffffc90003d17c58 EFLAGS: 00000202
RAX: 0000000000000000 RBX: ffff888022f4a200 RCX: 0000000000000016
RDX: 0000000000001000 RSI: 0000000000000000 RDI: ffff888022f4ac40
RBP: 0000000000000cc0 R08: 00000000f6ccafc2 R09: 0000000000000000
R10: ffff888022f4a200 R11: ffffffff81acb3b0 R12: 0000000000001000
R13: ffff888022f4a200 R14: ffff88801bec5640 R15: ffff888034021e00
FS: 000055558f2cf500(0000) GS:ffff888125c0a000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055558f2f2608 CR3: 00000000634ca000 CR4: 00000000003526f0
Call Trace:
slab_post_alloc_hook mm/slub.c:4956 [inline]
slab_alloc_node mm/slub.c:5267 [inline]
kmem_cache_alloc_noprof+0x3a1/0x710 mm/slub.c:5274
getname_flags+0xb8/0x540 fs/namei.c:146
getname include/linux/fs.h:2497 [inline]
getname_maybe_null include/linux/fs.h:2504 [inline]
vfs_fstatat+0x43/0x170 fs/stat.c:370
__do_sys_newfstatat fs/stat.c:542 [inline]
__se_sys_newfstatat fs/stat.c:536 [inline]
__x64_sys_newfstatat+0x116/0x190 fs/stat.c:536
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f171058de3a
Code: 48 89 f2 b9 00 01 00 00 48 89 fe bf 9c ff ff ff e9 0b 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 90 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 a8 ff ff ff f7
RSP: 002b:00007fff099abe48 EFLAGS: 00000286 ORIG_RAX: 0000000000000106
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f171058de3a
RDX: 00007fff099abe70 RSI: 00007fff099abf00 RDI: 00000000ffffff9c
RBP: 00007fff099abf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000100 R11: 0000000000000286 R12: 00007fff099acf90
R13: 00007f1710613d7d R14: 000000000005ad92 R15: 00007fff099acfd0