INFO: task syz-executor:5824 blocked for more than 143 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor state:D stack:21376 pid:5824 tgid:5824 ppid:1 task_flags:0x400140 flags:0x00080002 Call Trace: context_switch kernel/sched/core.c:5295 [inline] __schedule+0x1585/0x5340 kernel/sched/core.c:6907 __schedule_loop kernel/sched/core.c:6989 [inline] schedule+0x164/0x360 kernel/sched/core.c:7004 io_schedule+0x7f/0xd0 kernel/sched/core.c:7831 folio_wait_bit_common+0x6d8/0xbc0 mm/filemap.c:1323 folio_lock include/linux/pagemap.h:1170 [inline] truncate_inode_pages_range+0xad3/0xe30 mm/truncate.c:458 evict+0x631/0xb10 fs/inode.c:848 dispose_list fs/inode.c:888 [inline] evict_inodes+0x75a/0x7f0 fs/inode.c:942 generic_shutdown_super+0xaa/0x2d0 fs/super.c:632 kill_block_super+0x44/0x90 fs/super.c:1725 deactivate_locked_super+0xbc/0x130 fs/super.c:476 cleanup_mnt+0x437/0x4d0 fs/namespace.c:1312 task_work_run+0x1d9/0x270 kernel/task_work.c:233 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] __exit_to_user_mode_loop kernel/entry/common.c:67 [inline] exit_to_user_mode_loop+0xed/0x480 kernel/entry/common.c:98 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:325 [inline] do_syscall_64+0x32d/0xf80 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7efcf5f9d1d7 RSP: 002b:00007fff0f049b08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: 0000000000000000 RBX: 00007efcf6031c3b RCX: 00007efcf5f9d1d7 RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fff0f049bc0 RBP: 00007fff0f049bc0 R08: 00007fff0f04abc0 R09: 00000000ffffffff R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff0f04ac50 R13: 00007efcf6031c3b R14: 000000000003c557 R15: 00007fff0f04ac90 Showing all locks held in the system: 1 lock held by khungtaskd/30: #0: ffffffff8e7602e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:312 [inline] #0: ffffffff8e7602e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:850 [inline] #0: ffffffff8e7602e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775 2 locks held by getty/5583: #0: ffff888036da00a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243 #1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x45c/0x13c0 drivers/tty/n_tty.c:2211 1 lock held by syz-executor/5824: #0: ffff88805db140e0 (&type->s_umount_key#117){+.+.}-{4:4}, at: __super_lock fs/super.c:58 [inline] #0: ffff88805db140e0 (&type->s_umount_key#117){+.+.}-{4:4}, at: __super_lock_excl fs/super.c:73 [inline] #0: ffff88805db140e0 (&type->s_umount_key#117){+.+.}-{4:4}, at: deactivate_super+0xa9/0xe0 fs/super.c:508 ============================================= NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 nmi_cpu_backtrace+0x274/0x2d0 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline] __sys_info lib/sys_info.c:157 [inline] sys_info+0x135/0x170 lib/sys_info.c:165 check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline] watchdog+0xfd9/0x1030 kernel/hung_task.c:515 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 9089 Comm: sed Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:match_held_lock+0xe/0xb0 kernel/locking/lockdep.c:5309 Code: 41 5f c3 cc cc cc cc cc 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 41 56 53 bb 01 00 00 00 48 39 77 10 74 6a <81> 7f 20 00 00 20 00 72 5f 48 8b 46 08 48 85 c0 75 17 31 db 49 89 RSP: 0018:ffffc90002fd7438 EFLAGS: 00000083 RAX: 0000000000000001 RBX: 0000000000000001 RCX: 0000000000000046 RDX: 0000000000000000 RSI: ffffffff8e760340 RDI: ffff888023db2958 RBP: 00000000ffffffff R08: ffff88807f78a5f3 R09: 1ffff1100fef14be R10: dffffc0000000000 R11: ffffed100fef14bf R12: 0000000000000246 R13: ffff888023db1e40 R14: ffffffff8e760340 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888125560000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000561a90aee008 CR3: 000000007b610000 CR4: 00000000003526f0 Call Trace: __lock_is_held kernel/locking/lockdep.c:5601 [inline] lock_is_held_type+0x89/0x150 kernel/locking/lockdep.c:5940 lock_is_held include/linux/lockdep.h:249 [inline] __might_resched+0x37/0x4d0 kernel/sched/core.c:8846 down_write+0x76/0x200 kernel/locking/rwsem.c:1589 anon_vma_lock_write mm/internal.h:220 [inline] __anon_vma_prepare+0x21c/0x4a0 mm/rmap.c:208 __vmf_anon_prepare mm/memory.c:3734 [inline] vmf_anon_prepare mm/internal.h:502 [inline] do_cow_fault mm/memory.c:5819 [inline] do_fault mm/memory.c:5935 [inline] do_pte_missing+0x3117/0x3750 mm/memory.c:4477 handle_pte_fault mm/memory.c:6317 [inline] __handle_mm_fault mm/memory.c:6455 [inline] handle_mm_fault+0x1bec/0x3310 mm/memory.c:6624 do_user_addr_fault+0x75b/0x1340 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6a/0xc0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 RIP: 0010:rep_stos_alternative+0x40/0x80 arch/x86/lib/clear_page_64.S:76 Code: c9 75 f6 e9 d2 5f 04 00 48 89 07 48 83 c7 08 83 e9 08 74 ef 83 f9 08 73 ef eb de 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 <48> 89 07 48 89 47 08 48 89 47 10 48 89 47 18 48 89 47 20 48 89 47 RSP: 0018:ffffc90002fd7a68 EFLAGS: 00050206 RAX: 0000000000000000 RBX: 0000561a90aee010 RCX: 0000000000000ff8 RDX: 0000000000000000 RSI: ffffffff8e16401c RDI: 0000561a90aee008 RBP: dffffc0000000000 R08: ffffffff821644df R09: ffff8880203f0f80 R10: dffffc0000000000 R11: ffffed10047b63c9 R12: 0000561a90aee008 R13: 0000000000000008 R14: 0000000000000ff8 R15: ffff888029d0e918 __clear_user arch/x86/include/asm/uaccess_64.h:188 [inline] clear_user arch/x86/include/asm/uaccess_64.h:205 [inline] padzero fs/binfmt_elf.c:133 [inline] elf_load+0x4cc/0x6a0 fs/binfmt_elf.c:435 load_elf_binary+0x1173/0x2980 fs/binfmt_elf.c:1188 search_binary_handler fs/exec.c:1664 [inline] exec_binprm fs/exec.c:1696 [inline] bprm_execve+0x93d/0x1460 fs/exec.c:1748 do_execveat_common+0x50d/0x690 fs/exec.c:1846 __do_sys_execve fs/exec.c:1930 [inline] __se_sys_execve fs/exec.c:1924 [inline] __x64_sys_execve+0x97/0xc0 fs/exec.c:1924 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fb9d16df107 Code: Unable to access opcode bytes at 0x7fb9d16df0dd. RSP: 002b:00007ffef5c72848 EFLAGS: 00000246 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 000055994e4aa190 RCX: 00007fb9d16df107 RDX: 000055994e4aa1b8 RSI: 000055994e4aa190 RDI: 000055994e4aa270 RBP: 000055994e4aa270 R08: 00007ffef5c78e15 R09: 0000000000000000 R10: 0000000000000008 R11: 0000000000000246 R12: 000055994e4aa1b8 R13: 00007fb9d18a4e8b R14: 000055994e4aa1b8 R15: 0000000000000000