INFO: task syz.0.842:9051 blocked for more than 143 seconds. Not tainted 6.15.0-rc3-syzkaller-00132-gd4cb1ecc2290 #0 Blocked by coredump. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.0.842 state:D stack:27096 pid:9051 tgid:9046 ppid:5822 task_flags:0x40044c flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5382 [inline] __schedule+0x16e2/0x4cd0 kernel/sched/core.c:6767 __schedule_loop kernel/sched/core.c:6845 [inline] schedule+0x165/0x360 kernel/sched/core.c:6860 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6917 rwsem_down_write_slowpath+0xbec/0x1030 kernel/locking/rwsem.c:1176 __down_write_common kernel/locking/rwsem.c:1304 [inline] __down_write kernel/locking/rwsem.c:1313 [inline] down_write+0x1ab/0x1f0 kernel/locking/rwsem.c:1578 mmap_write_lock include/linux/mmap_lock.h:128 [inline] exit_mmap+0x28b/0xba0 mm/mmap.c:1292 __mmput+0x118/0x420 kernel/fork.c:1379 exit_mm+0x1da/0x2c0 kernel/exit.c:589 do_exit+0x859/0x2550 kernel/exit.c:940 do_group_exit+0x21c/0x2d0 kernel/exit.c:1102 get_signal+0x125e/0x1310 kernel/signal.c:3034 arch_do_signal_or_restart+0x95/0x780 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x8b/0x120 kernel/entry/common.c:218 do_syscall_64+0x103/0x210 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f057a18e969 RSP: 002b:00007f057af6b0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f057a3b6088 RCX: 00007f057a18e969 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f057a3b6088 RBP: 00007f057a3b6080 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f057a3b608c R13: 0000000000000000 R14: 00007fffa969cf80 R15: 00007fffa969d068 INFO: task syz.2.848:9077 blocked for more than 143 seconds. Not tainted 6.15.0-rc3-syzkaller-00132-gd4cb1ecc2290 #0 Blocked by coredump. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.2.848 state:D stack:25656 pid:9077 tgid:9076 ppid:5833 task_flags:0x40054c flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:5382 [inline] __schedule+0x16e2/0x4cd0 kernel/sched/core.c:6767 __schedule_loop kernel/sched/core.c:6845 [inline] schedule+0x165/0x360 kernel/sched/core.c:6860 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6917 rwsem_down_write_slowpath+0xbec/0x1030 kernel/locking/rwsem.c:1176 __down_write_common kernel/locking/rwsem.c:1304 [inline] __down_write kernel/locking/rwsem.c:1313 [inline] down_write+0x1ab/0x1f0 kernel/locking/rwsem.c:1578 mmap_write_lock include/linux/mmap_lock.h:128 [inline] exit_mmap+0x28b/0xba0 mm/mmap.c:1292 __mmput+0x118/0x420 kernel/fork.c:1379 exit_mm+0x1da/0x2c0 kernel/exit.c:589 do_exit+0x859/0x2550 kernel/exit.c:940 do_group_exit+0x21c/0x2d0 kernel/exit.c:1102 get_signal+0x125e/0x1310 kernel/signal.c:3034 arch_do_signal_or_restart+0x95/0x780 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x8b/0x120 kernel/entry/common.c:218 do_syscall_64+0x103/0x210 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ff0ddb8e969 RSP: 002b:00007ff0de97c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: fffffffffffffe00 RBX: 00007ff0dddb5fa0 RCX: 00007ff0ddb8e969 RDX: 000000000000003d RSI: 0000200000001680 RDI: 0000000000000006 RBP: 00007ff0ddc10ab1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ff0dddb5fa0 R15: 00007ffe725c8ed8 INFO: task syz.1.850:9082 blocked for more than 143 seconds. Not tainted 6.15.0-rc3-syzkaller-00132-gd4cb1ecc2290 #0 Blocked by coredump. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.1.850 state:D stack:27096 pid:9082 tgid:9082 ppid:5829 task_flags:0x40004c flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5382 [inline] __schedule+0x16e2/0x4cd0 kernel/sched/core.c:6767 __schedule_loop kernel/sched/core.c:6845 [inline] schedule+0x165/0x360 kernel/sched/core.c:6860 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6917 rwsem_down_write_slowpath+0xbec/0x1030 kernel/locking/rwsem.c:1176 __down_write_common kernel/locking/rwsem.c:1304 [inline] __down_write kernel/locking/rwsem.c:1313 [inline] down_write+0x1ab/0x1f0 kernel/locking/rwsem.c:1578 mmap_write_lock include/linux/mmap_lock.h:128 [inline] exit_mmap+0x28b/0xba0 mm/mmap.c:1292 __mmput+0x118/0x420 kernel/fork.c:1379 exit_mm+0x1da/0x2c0 kernel/exit.c:589 do_exit+0x859/0x2550 kernel/exit.c:940 do_group_exit+0x21c/0x2d0 kernel/exit.c:1102 __do_sys_exit_group kernel/exit.c:1113 [inline] __se_sys_exit_group kernel/exit.c:1111 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1111 x64_sys_call+0x21ba/0x21c0 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f15dff8e969 RSP: 002b:00007ffd27573088 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f15dff8e969 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffd275730ec R08: 000000082757317f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 00000000000000ac R13: 00000000000927c0 R14: 00000000000220fb R15: 00007ffd27573140 Showing all locks held in the system: 1 lock held by khungtaskd/31: #0: ffffffff8df3b860 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline] #0: ffffffff8df3b860 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline] #0: ffffffff8df3b860 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6764 2 locks held by udevd/5200: #0: ffffffff8dff3f30 (dup_mmap_sem){.+.+}-{0:0}, at: dup_mm kernel/fork.c:1733 [inline] #0: ffffffff8dff3f30 (dup_mmap_sem){.+.+}-{0:0}, at: copy_mm+0x1d0/0x2100 kernel/fork.c:1786 #1: ffff88807e339fe0 (&mm->mmap_lock){++++}-{4:4}, at: mmap_write_lock_killable include/linux/mmap_lock.h:146 [inline] #1: ffff88807e339fe0 (&mm->mmap_lock){++++}-{4:4}, at: dup_mmap kernel/fork.c:620 [inline] #1: ffff88807e339fe0 (&mm->mmap_lock){++++}-{4:4}, at: dup_mm kernel/fork.c:1734 [inline] #1: ffff88807e339fe0 (&mm->mmap_lock){++++}-{4:4}, at: copy_mm+0x25b/0x2100 kernel/fork.c:1786 2 locks held by getty/5584: #0: ffff88803097c0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243 #1: ffffc9000333b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400 drivers/tty/n_tty.c:2222 1 lock held by syz-executor/5812: #0: ffff888026f029e0 (&mm->mmap_lock){++++}-{4:4}, at: mmap_write_lock_killable include/linux/mmap_lock.h:146 [inline] #0: ffff888026f029e0 (&mm->mmap_lock){++++}-{4:4}, at: vm_mmap_pgoff+0x1bd/0x4c0 mm/util.c:577 2 locks held by syz-executor/5824: #0: ffffffff8dff3f30 (dup_mmap_sem){.+.+}-{0:0}, at: dup_mm kernel/fork.c:1733 [inline] #0: ffffffff8dff3f30 (dup_mmap_sem){.+.+}-{0:0}, at: copy_mm+0x1d0/0x2100 kernel/fork.c:1786 #1: ffff888031826fe0 (&mm->mmap_lock){++++}-{4:4}, at: mmap_write_lock_killable include/linux/mmap_lock.h:146 [inline] #1: ffff888031826fe0 (&mm->mmap_lock){++++}-{4:4}, at: dup_mmap kernel/fork.c:620 [inline] #1: ffff888031826fe0 (&mm->mmap_lock){++++}-{4:4}, at: dup_mm kernel/fork.c:1734 [inline] #1: ffff888031826fe0 (&mm->mmap_lock){++++}-{4:4}, at: copy_mm+0x25b/0x2100 kernel/fork.c:1786 1 lock held by syz.0.842/9051: #0: ffff8880202947e0 (&mm->mmap_lock){++++}-{4:4}, at: mmap_write_lock include/linux/mmap_lock.h:128 [inline] #0: ffff8880202947e0 (&mm->mmap_lock){++++}-{4:4}, at: exit_mmap+0x28b/0xba0 mm/mmap.c:1292 1 lock held by syz.2.848/9077: #0: ffff88807ffbd1e0 (&mm->mmap_lock){++++}-{4:4}, at: mmap_write_lock include/linux/mmap_lock.h:128 [inline] #0: ffff88807ffbd1e0 (&mm->mmap_lock){++++}-{4:4}, at: exit_mmap+0x28b/0xba0 mm/mmap.c:1292 1 lock held by sed/9081: #0: ffff88807ffbbde0 (&mm->mmap_lock){++++}-{4:4}, at: mmap_write_lock_killable include/linux/mmap_lock.h:146 [inline] #0: ffff88807ffbbde0 (&mm->mmap_lock){++++}-{4:4}, at: vm_mmap_pgoff+0x1bd/0x4c0 mm/util.c:577 1 lock held by syz.1.850/9082: #0: ffff8880117e15e0 (&mm->mmap_lock){++++}-{4:4}, at: mmap_write_lock include/linux/mmap_lock.h:128 [inline] #0: ffff8880117e15e0 (&mm->mmap_lock){++++}-{4:4}, at: exit_mmap+0x28b/0xba0 mm/mmap.c:1292 ============================================= NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-rc3-syzkaller-00132-gd4cb1ecc2290 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 nmi_cpu_backtrace+0x39e/0x3d0 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline] watchdog+0xfee/0x1030 kernel/hung_task.c:437 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 7033 Comm: kworker/u8:8 Not tainted 6.15.0-rc3-syzkaller-00132-gd4cb1ecc2290 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:check_kcov_mode kernel/kcov.c:194 [inline] RIP: 0010:write_comp_data kernel/kcov.c:246 [inline] RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x37/0x90 kernel/kcov.c:314 Code: 08 10 75 92 65 8b 0d 58 4e b5 10 81 e1 00 01 ff 00 74 11 81 f9 00 01 00 00 75 5b 83 ba 3c 16 00 00 00 74 52 8b 8a 18 16 00 00 <83> f9 03 75 47 48 8b 8a 20 16 00 00 44 8b 8a 1c 16 00 00 49 c1 e1 RSP: 0018:ffffc90010907680 EFLAGS: 00000246 RAX: ffffffff820f0a59 RBX: 00002aaaaaaab000 RCX: 0000000000000000 RDX: ffff8880264b8000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: ffffffff820f0a29 R12: ffff88801a07aaa8 R13: fffffffffffffeff R14: ffff88801a07aaa8 R15: ffffc900109076f8 FS: 0000000000000000(0000) GS:ffff8881260cf000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005633287814d8 CR3: 000000000dd36000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_read_lock include/linux/rcupdate.h:842 [inline] ___pte_offset_map+0x59/0x2a0 mm/pgtable-generic.c:287 __pte_offset_map include/linux/mm.h:3134 [inline] __pte_offset_map_lock+0x46/0x1e0 mm/pgtable-generic.c:398 get_locked_pte include/linux/mm.h:2843 [inline] __text_poke+0x29c/0xbf0 arch/x86/kernel/alternative.c:2269 text_poke arch/x86/kernel/alternative.c:2354 [inline] text_poke_bp_batch+0x76b/0x940 arch/x86/kernel/alternative.c:2743 text_poke_flush arch/x86/kernel/alternative.c:2856 [inline] text_poke_finish+0x30/0x50 arch/x86/kernel/alternative.c:2863 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_disable_cpuslocked+0xc5/0x1b0 kernel/jump_label.c:240 static_key_disable+0x1a/0x20 kernel/jump_label.c:248 toggle_allocation_gate+0x1a1/0x240 mm/kfence/core.c:855 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xadb/0x17a0 kernel/workqueue.c:3319 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245