INFO: task syz.4.2487:14189 blocked for more than 143 seconds.
Tainted: G L syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.4.2487 state:D stack:25112 pid:14189 tgid:14188 ppid:13108 task_flags:0x400040 flags:0x00080002
Call Trace:
context_switch kernel/sched/core.c:5295 [inline]
__schedule+0x153e/0x4fe0 kernel/sched/core.c:6907
__schedule_loop kernel/sched/core.c:6989 [inline]
schedule+0x164/0x360 kernel/sched/core.c:7004
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7061
rwsem_down_read_slowpath+0x61e/0x920 kernel/locking/rwsem.c:1086
__down_read_common kernel/locking/rwsem.c:1261 [inline]
__down_read kernel/locking/rwsem.c:1274 [inline]
down_read+0x99/0x2e0 kernel/locking/rwsem.c:1539
__super_lock fs/super.c:60 [inline]
super_lock+0x2d6/0x3d0 fs/super.c:122
user_get_super+0xc8/0x120 fs/super.c:1001
quotactl_block fs/quota/quota.c:889 [inline]
__do_sys_quotactl fs/quota/quota.c:955 [inline]
__se_sys_quotactl+0x540/0x9e0 fs/quota/quota.c:917
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f5b1cf9acb9
RSP: 002b:00007f5b1ddd8028 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3
RAX: ffffffffffffffda RBX: 00007f5b1d215fa0 RCX: 00007f5b1cf9acb9
RDX: 0000000000000000 RSI: 00002000000000c0 RDI: ffffffff80000800
RBP: 00007f5b1d008bf7 R08: 0000000000000000 R09: 0000000000000000
R10: 0000200000000240 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5b1d216038 R14: 00007f5b1d215fa0 R15: 00007ffc6448d268
Showing all locks held in the system:
1 lock held by khungtaskd/31:
#0: ffffffff8e55dda0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:312 [inline]
#0: ffffffff8e55dda0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:850 [inline]
#0: ffffffff8e55dda0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775
3 locks held by kworker/u8:5/148:
#0: ffff88801b08c148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x855/0x15a0 kernel/workqueue.c:3254
#1: ffffc90002ed7c40 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x87c/0x15a0 kernel/workqueue.c:3255
#2: ffffffff8f9b6788 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0xe/0x60 net/core/link_watch.c:303
1 lock held by dhcpcd/5495:
#0: ffffffff8f9b6788 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:130 [inline]
#0: ffffffff8f9b6788 (rtnl_mutex){+.+.}-{4:4}, at: devinet_ioctl+0x32b/0x1b30 net/ipv4/devinet.c:1120
2 locks held by getty/5581:
#0: ffff88803639b0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243
#1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x45c/0x13c0 drivers/tty/n_tty.c:2211
2 locks held by syz-executor/5830:
3 locks held by kworker/0:4/5930:
#0: ffff8880b863abe0 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x31/0x150 kernel/sched/core.c:647
#1: ffff8880b8624588 (psi_seq){-.-.}-{0:0}, at: psi_task_switch+0x53/0x880 kernel/sched/psi.c:933
#2: ffffffff8e55de00 (rcu_read_lock_bh){....}-{1:3}, at: local_bh_disable include/linux/bottom_half.h:20 [inline]
#2: ffffffff8e55de00 (rcu_read_lock_bh){....}-{1:3}, at: rcu_read_lock_bh include/linux/rcupdate.h:903 [inline]
#2: ffffffff8e55de00 (rcu_read_lock_bh){....}-{1:3}, at: keep_key_fresh drivers/net/wireguard/send.c:129 [inline]
#2: ffffffff8e55de00 (rcu_read_lock_bh){....}-{1:3}, at: wg_packet_create_data_done drivers/net/wireguard/send.c:259 [inline]
#2: ffffffff8e55de00 (rcu_read_lock_bh){....}-{1:3}, at: wg_packet_tx_worker+0x24a/0x7c0 drivers/net/wireguard/send.c:276
5 locks held by kworker/u8:20/6882:
#0: ffff88801c28e948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x855/0x15a0 kernel/workqueue.c:3254
#1: ffffc900037e7c40 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x87c/0x15a0 kernel/workqueue.c:3255
#2: ffffffff8f9a7890 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xfe/0x7b0 net/core/net_namespace.c:670
#3: ffffffff8f9b6788 (rtnl_mutex){+.+.}-{4:4}, at: default_device_exit_batch+0xe5/0xa10 net/core/dev.c:13072
#4: ffffffff8e564038 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock kernel/rcu/tree_exp.h:311 [inline]
#4: ffffffff8e564038 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x2d0/0x770 kernel/rcu/tree_exp.h:961
3 locks held by kworker/0:10/10018:
#0: ffff88801b04e148 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x855/0x15a0 kernel/workqueue.c:3254
#1: ffffc900037a7c40 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x87c/0x15a0 kernel/workqueue.c:3255
#2: ffffffff8f9b6788 (rtnl_mutex){+.+.}-{4:4}, at: reg_check_chans_work+0xa5/0xf50 net/wireless/reg.c:2462
1 lock held by syz.4.2487/14189:
#0: ffff8880543140e0 (&type->s_umount_key#67){++++}-{4:4}, at: __super_lock fs/super.c:60 [inline]
#0: ffff8880543140e0 (&type->s_umount_key#67){++++}-{4:4}, at: super_lock+0x2d6/0x3d0 fs/super.c:122
1 lock held by syz.2.2770/15186:
#0: ffff8880543140e0 (&type->s_umount_key#67){++++}-{4:4}, at: __super_lock fs/super.c:60 [inline]
#0: ffff8880543140e0 (&type->s_umount_key#67){++++}-{4:4}, at: super_lock+0x2d6/0x3d0 fs/super.c:122
1 lock held by syz-executor/15909:
#0: ffffffff8f9b6788 (rtnl_mutex){+.+.}-{4:4}, at: tun_detach drivers/net/tun.c:634 [inline]
#0: ffffffff8f9b6788 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x3e/0x1c0 drivers/net/tun.c:3436
2 locks held by syz-executor/17380:
#0: ffffffff8f11b488 (&ops->srcu#2){.+.+}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:312 [inline]
#0: ffffffff8f11b488 (&ops->srcu#2){.+.+}-{0:0}, at: rcu_read_lock include/linux/rcupdate.h:850 [inline]
#0: ffffffff8f11b488 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0x23/0x250 net/core/rtnetlink.c:570
#1: ffffffff8f9b6788 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock net/core/rtnetlink.c:80 [inline]
#1: ffffffff8f9b6788 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock net/core/rtnetlink.c:341 [inline]
#1: ffffffff8f9b6788 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x8a1/0x1be0 net/core/rtnetlink.c:4071
3 locks held by syz.9.3416/17508:
#0: ffff8880555ad1c0 (&tty->legacy_mutex){+.+.}-{4:4}, at: tty_set_ldisc+0x52/0x560 drivers/tty/tty_ldisc.c:528
#1: ffff8880555ad0a0 (&tty->ldisc_sem){++++}-{0:0}, at: __tty_ldisc_lock drivers/tty/tty_ldisc.c:289 [inline]
#1: ffff8880555ad0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_lock+0x6c/0xc0 drivers/tty/tty_ldisc.c:313
#2: ffffffff8f9b6788 (rtnl_mutex){+.+.}-{4:4}, at: ldisc_open+0x4b8/0x840 drivers/net/caif/caif_serial.c:336
1 lock held by syz.9.3416/17511:
#0: ffff8880555ad1c0 (&tty->legacy_mutex){+.+.}-{4:4}, at: tty_set_ldisc+0x52/0x560 drivers/tty/tty_ldisc.c:528
1 lock held by syz.9.3416/17512:
#0: ffff8880555ad1c0 (&tty->legacy_mutex){+.+.}-{4:4}, at: __tty_hangup+0xe8/0x680 drivers/tty/tty_io.c:581
2 locks held by syz.7.3420/17516:
#0: ffffffff8fa24970 (cb_lock){++++}-{4:4}, at: genl_rcv+0x19/0x40 net/netlink/genetlink.c:1218
#1: ffffffff8f9b6788 (rtnl_mutex){+.+.}-{4:4}, at: nl80211_pre_doit+0x5f/0x8e0 net/wireless/nl80211.c:17949
7 locks held by syz.5.3422/17536:
2 locks held by udevadm/17538:
=============================================
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT(full)
Tainted: [L]=SOFTLOCKUP
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026
Call Trace:
dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120
nmi_cpu_backtrace+0x274/0x2d0 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline]
__sys_info lib/sys_info.c:157 [inline]
sys_info+0x135/0x170 lib/sys_info.c:165
check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline]
watchdog+0xf90/0xfe0 kernel/hung_task.c:515
kthread+0x388/0x470 kernel/kthread.c:467
ret_from_fork+0x51b/0xa40 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 17535 Comm: syz.5.3422 Tainted: G L syzkaller #0 PREEMPT(full)
Tainted: [L]=SOFTLOCKUP
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026
RIP: 0010:__lock_acquire+0x300/0x2cf0 kernel/locking/lockdep.c:5174
Code: 00 49 89 54 c7 18 65 8b 15 19 82 53 11 31 f6 85 d2 40 0f 95 c6 31 d2 41 83 be fc 0a 00 00 00 0f 95 c2 c1 e2 0d c1 e6 0e 09 d6 <8b> 54 24 20 c1 e2 0f 0f b7 d2 09 f2 41 83 e5 03 41 c1 e5 10 41 09
RSP: 0018:ffffc9000c0d7370 EFLAGS: 00000046
RAX: 000000000000000f RBX: 0000000000000000 RCX: 000000000000001e
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000003 R08: ffffffff8236e10a R09: ffffffff8e55de60
R10: dffffc0000000000 R11: fffff9400029c551 R12: 0000000000000000
R13: 0000000000000002 R14: ffff888032b0dac0 R15: ffff888032b0e5d8
FS: 0000000000000000(0000) GS:ffff8881256f0000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000110c4265f5 CR3: 0000000075ac0000 CR4: 00000000003526f0
Call Trace:
lock_acquire+0x106/0x330 kernel/locking/lockdep.c:5868
rcu_lock_acquire include/linux/rcupdate.h:312 [inline]
rcu_read_lock_sched include/linux/rcupdate.h:948 [inline]
pfn_valid+0xd6/0x480 include/linux/mmzone.h:2197
page_table_check_clear+0x21/0x5f0 mm/page_table_check.c:70
ptep_get_and_clear_full arch/x86/include/asm/jump_label.h:-1 [inline]
clear_full_ptes include/linux/pgtable.h:906 [inline]
zap_present_folio_ptes mm/memory.c:1646 [inline]
zap_present_ptes mm/memory.c:1715 [inline]
do_zap_pte_range mm/memory.c:1817 [inline]
zap_pte_range mm/memory.c:1919 [inline]
zap_pmd_range mm/memory.c:2011 [inline]
zap_pud_range mm/memory.c:2039 [inline]
zap_p4d_range mm/memory.c:2060 [inline]
unmap_page_range+0x3468/0x4940 mm/memory.c:2081
unmap_single_vma mm/memory.c:2123 [inline]
unmap_vmas+0x48f/0x6a0 mm/memory.c:2161
exit_mmap+0x283/0x9c0 mm/mmap.c:1301
__mmput+0x118/0x430 kernel/fork.c:1174
exit_mm+0x168/0x220 kernel/exit.c:581
do_exit+0x62e/0x2310 kernel/exit.c:959
do_group_exit+0x21b/0x2d0 kernel/exit.c:1112
__do_sys_exit_group kernel/exit.c:1123 [inline]
__se_sys_exit_group kernel/exit.c:1121 [inline]
__x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1121
x64_sys_call+0x221a/0x2240 arch/x86/include/generated/asm/syscalls_64.h:232
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f9288d9acb9
Code: Unable to access opcode bytes at 0x7f9288d9ac8f.
RSP: 002b:00007ffd2fa40108 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9288d9acb9
RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00007ffd2fa4016c R08: 0000000000000000 R09: 00000000000927c0
R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000071
R13: 00000000000927c0 R14: 0000000000097193 R15: 00007ffd2fa401c0