INFO: task syz-executor:5824 blocked for more than 143 seconds.
Tainted: G L syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor state:D stack:21376 pid:5824 tgid:5824 ppid:1 task_flags:0x400140 flags:0x00080002
Call Trace:
context_switch kernel/sched/core.c:5295 [inline]
__schedule+0x1585/0x5340 kernel/sched/core.c:6907
__schedule_loop kernel/sched/core.c:6989 [inline]
schedule+0x164/0x360 kernel/sched/core.c:7004
io_schedule+0x7f/0xd0 kernel/sched/core.c:7831
folio_wait_bit_common+0x6d8/0xbc0 mm/filemap.c:1323
folio_lock include/linux/pagemap.h:1170 [inline]
truncate_inode_pages_range+0xad3/0xe30 mm/truncate.c:458
evict+0x631/0xb10 fs/inode.c:848
dispose_list fs/inode.c:888 [inline]
evict_inodes+0x75a/0x7f0 fs/inode.c:942
generic_shutdown_super+0xaa/0x2d0 fs/super.c:632
kill_block_super+0x44/0x90 fs/super.c:1725
deactivate_locked_super+0xbc/0x130 fs/super.c:476
cleanup_mnt+0x437/0x4d0 fs/namespace.c:1312
task_work_run+0x1d9/0x270 kernel/task_work.c:233
resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
__exit_to_user_mode_loop kernel/entry/common.c:67 [inline]
exit_to_user_mode_loop+0xed/0x480 kernel/entry/common.c:98
__exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline]
syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline]
syscall_exit_to_user_mode include/linux/entry-common.h:325 [inline]
do_syscall_64+0x32d/0xf80 arch/x86/entry/syscall_64.c:100
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7efcf5f9d1d7
RSP: 002b:00007fff0f049b08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
RAX: 0000000000000000 RBX: 00007efcf6031c3b RCX: 00007efcf5f9d1d7
RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fff0f049bc0
RBP: 00007fff0f049bc0 R08: 00007fff0f04abc0 R09: 00000000ffffffff
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff0f04ac50
R13: 00007efcf6031c3b R14: 000000000003c557 R15: 00007fff0f04ac90
Showing all locks held in the system:
1 lock held by khungtaskd/30:
#0: ffffffff8e7602e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:312 [inline]
#0: ffffffff8e7602e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:850 [inline]
#0: ffffffff8e7602e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775
2 locks held by getty/5583:
#0: ffff888036da00a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243
#1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x45c/0x13c0 drivers/tty/n_tty.c:2211
1 lock held by syz-executor/5824:
#0: ffff88805db140e0 (&type->s_umount_key#117){+.+.}-{4:4}, at: __super_lock fs/super.c:58 [inline]
#0: ffff88805db140e0 (&type->s_umount_key#117){+.+.}-{4:4}, at: __super_lock_excl fs/super.c:73 [inline]
#0: ffff88805db140e0 (&type->s_umount_key#117){+.+.}-{4:4}, at: deactivate_super+0xa9/0xe0 fs/super.c:508
=============================================
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT(full)
Tainted: [L]=SOFTLOCKUP
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120
nmi_cpu_backtrace+0x274/0x2d0 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline]
__sys_info lib/sys_info.c:157 [inline]
sys_info+0x135/0x170 lib/sys_info.c:165
check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline]
watchdog+0xfd9/0x1030 kernel/hung_task.c:515
kthread+0x388/0x470 kernel/kthread.c:467
ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 9089 Comm: sed Tainted: G L syzkaller #0 PREEMPT(full)
Tainted: [L]=SOFTLOCKUP
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
RIP: 0010:match_held_lock+0xe/0xb0 kernel/locking/lockdep.c:5309
Code: 41 5f c3 cc cc cc cc cc 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 41 56 53 bb 01 00 00 00 48 39 77 10 74 6a <81> 7f 20 00 00 20 00 72 5f 48 8b 46 08 48 85 c0 75 17 31 db 49 89
RSP: 0018:ffffc90002fd7438 EFLAGS: 00000083
RAX: 0000000000000001 RBX: 0000000000000001 RCX: 0000000000000046
RDX: 0000000000000000 RSI: ffffffff8e760340 RDI: ffff888023db2958
RBP: 00000000ffffffff R08: ffff88807f78a5f3 R09: 1ffff1100fef14be
R10: dffffc0000000000 R11: ffffed100fef14bf R12: 0000000000000246
R13: ffff888023db1e40 R14: ffffffff8e760340 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff888125560000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000561a90aee008 CR3: 000000007b610000 CR4: 00000000003526f0
Call Trace:
__lock_is_held kernel/locking/lockdep.c:5601 [inline]
lock_is_held_type+0x89/0x150 kernel/locking/lockdep.c:5940
lock_is_held include/linux/lockdep.h:249 [inline]
__might_resched+0x37/0x4d0 kernel/sched/core.c:8846
down_write+0x76/0x200 kernel/locking/rwsem.c:1589
anon_vma_lock_write mm/internal.h:220 [inline]
__anon_vma_prepare+0x21c/0x4a0 mm/rmap.c:208
__vmf_anon_prepare mm/memory.c:3734 [inline]
vmf_anon_prepare mm/internal.h:502 [inline]
do_cow_fault mm/memory.c:5819 [inline]
do_fault mm/memory.c:5935 [inline]
do_pte_missing+0x3117/0x3750 mm/memory.c:4477
handle_pte_fault mm/memory.c:6317 [inline]
__handle_mm_fault mm/memory.c:6455 [inline]
handle_mm_fault+0x1bec/0x3310 mm/memory.c:6624
do_user_addr_fault+0x75b/0x1340 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6a/0xc0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
RIP: 0010:rep_stos_alternative+0x40/0x80 arch/x86/lib/clear_page_64.S:76
Code: c9 75 f6 e9 d2 5f 04 00 48 89 07 48 83 c7 08 83 e9 08 74 ef 83 f9 08 73 ef eb de 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 <48> 89 07 48 89 47 08 48 89 47 10 48 89 47 18 48 89 47 20 48 89 47
RSP: 0018:ffffc90002fd7a68 EFLAGS: 00050206
RAX: 0000000000000000 RBX: 0000561a90aee010 RCX: 0000000000000ff8
RDX: 0000000000000000 RSI: ffffffff8e16401c RDI: 0000561a90aee008
RBP: dffffc0000000000 R08: ffffffff821644df R09: ffff8880203f0f80
R10: dffffc0000000000 R11: ffffed10047b63c9 R12: 0000561a90aee008
R13: 0000000000000008 R14: 0000000000000ff8 R15: ffff888029d0e918
__clear_user arch/x86/include/asm/uaccess_64.h:188 [inline]
clear_user arch/x86/include/asm/uaccess_64.h:205 [inline]
padzero fs/binfmt_elf.c:133 [inline]
elf_load+0x4cc/0x6a0 fs/binfmt_elf.c:435
load_elf_binary+0x1173/0x2980 fs/binfmt_elf.c:1188
search_binary_handler fs/exec.c:1664 [inline]
exec_binprm fs/exec.c:1696 [inline]
bprm_execve+0x93d/0x1460 fs/exec.c:1748
do_execveat_common+0x50d/0x690 fs/exec.c:1846
__do_sys_execve fs/exec.c:1930 [inline]
__se_sys_execve fs/exec.c:1924 [inline]
__x64_sys_execve+0x97/0xc0 fs/exec.c:1924
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb9d16df107
Code: Unable to access opcode bytes at 0x7fb9d16df0dd.
RSP: 002b:00007ffef5c72848 EFLAGS: 00000246 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 000055994e4aa190 RCX: 00007fb9d16df107
RDX: 000055994e4aa1b8 RSI: 000055994e4aa190 RDI: 000055994e4aa270
RBP: 000055994e4aa270 R08: 00007ffef5c78e15 R09: 0000000000000000
R10: 0000000000000008 R11: 0000000000000246 R12: 000055994e4aa1b8
R13: 00007fb9d18a4e8b R14: 000055994e4aa1b8 R15: 0000000000000000