INFO: task syz.3.30:6032 blocked for more than 143 seconds.
Not tainted 6.14.0-rc1-syzkaller-00020-g0de63bb7d919 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.3.30 state:D stack:24096 pid:6032 tgid:6030 ppid:5837 task_flags:0x400040 flags:0x00004004
Call Trace:
context_switch kernel/sched/core.c:5377 [inline]
__schedule+0xf43/0x5890 kernel/sched/core.c:6764
__schedule_loop kernel/sched/core.c:6841 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6856
kvm_swap_active_memslots+0x2e5/0x7c0 virt/kvm/kvm_main.c:1575
kvm_activate_memslot virt/kvm/kvm_main.c:1719 [inline]
kvm_create_memslot virt/kvm/kvm_main.c:1785 [inline]
kvm_set_memslot+0xd3b/0x1380 virt/kvm/kvm_main.c:1897
kvm_set_memory_region+0xe82/0x1610 virt/kvm/kvm_main.c:2045
kvm_set_internal_memslot+0x9f/0xe0 virt/kvm/kvm_main.c:2068
__x86_set_memory_region+0x2f7/0x740 arch/x86/kvm/x86.c:12848
kvm_alloc_apic_access_page+0x9e/0x110 arch/x86/kvm/lapic.c:2698
vmx_vcpu_create+0x5d4/0xcf0 arch/x86/kvm/vmx/vmx.c:7602
kvm_arch_vcpu_create+0x643/0xab0 arch/x86/kvm/x86.c:12307
kvm_vm_ioctl_create_vcpu virt/kvm/kvm_main.c:4115 [inline]
kvm_vm_ioctl+0xf4f/0x3d70 virt/kvm/kvm_main.c:5064
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:906 [inline]
__se_sys_ioctl fs/ioctl.c:892 [inline]
__x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6bfd38cda9
RSP: 002b:00007f6bfe174038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f6bfd5a6080 RCX: 00007f6bfd38cda9
RDX: 0000000000000038 RSI: 000000000000ae41 RDI: 0000000000000003
RBP: 00007f6bfd40e2a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000001 R14: 00007f6bfd5a6080 R15: 00007fff7d4f2a38
Showing all locks held in the system:
3 locks held by kworker/u8:0/11:
#0: ffff8880b863ed58 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x29/0x130 kernel/sched/core.c:598
#1: ffff8880b8628a88 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x2c1/0x8e0 kernel/sched/psi.c:987
#2: ffff8880b862a518 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x12f/0x1e0 kernel/time/timer.c:1046
1 lock held by khungtaskd/30:
#0: ffffffff8e1bc140 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
#0: ffffffff8e1bc140 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline]
#0: ffffffff8e1bc140 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x7f/0x390 kernel/locking/lockdep.c:6746
2 locks held by kworker/u8:3/51:
#0: ffff88814669b948 ((wq_completion)iou_exit){+.+.}-{0:0}, at: process_one_work+0x12cd/0x1b30 kernel/workqueue.c:3211
#1: ffffc90000bc7d18 ((work_completion)(&ctx->exit_work)){+.+.}-{0:0}, at: process_one_work+0x8bb/0x1b30 kernel/workqueue.c:3212
3 locks held by kworker/0:2/975:
#0: ffff88801b080d48 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x12cd/0x1b30 kernel/workqueue.c:3211
#1: ffffc90003ad7d18 ((fqdir_free_work).work){+.+.}-{0:0}, at: process_one_work+0x8bb/0x1b30 kernel/workqueue.c:3212
#2: ffffffff8e1c7480 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x48/0x700 kernel/rcu/tree.c:3741
2 locks held by kworker/u8:7/1158:
2 locks held by syz.3.30/6032:
#0: ffffc900046890a8 (&kvm->slots_lock){+.+.}-{4:4}, at: kvm_alloc_apic_access_page+0x27/0x110 arch/x86/kvm/lapic.c:2693
#1: ffffc90004689138 (&kvm->slots_arch_lock){+.+.}-{4:4}, at: kvm_set_memslot+0x34/0x1380 virt/kvm/kvm_main.c:1848
2 locks held by getty/7075:
#0: ffff88814e6300a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243
#1: ffffc9000bf532f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0xfba/0x1480 drivers/tty/n_tty.c:2211
1 lock held by syz.1.387/7941:
2 locks held by syz.2.415/8075:
2 locks held by syz.2.420/8088:
#0: ffffffff8fec1ed0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x292/0x6c0 net/core/net_namespace.c:512
#1: ffffffff8e1c7480 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x48/0x700 kernel/rcu/tree.c:3741
2 locks held by syz.1.425/8126:
#0: ffffffff8fec1ed0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x292/0x6c0 net/core/net_namespace.c:512
#1: ffffffff8fed7ea8 (rtnl_mutex){+.+.}-{4:4}, at: ppp_exit_net+0xae/0x3b0 drivers/net/ppp/ppp_generic.c:1146
2 locks held by syz.0.424/8130:
3 locks held by syz.5.427/8143:
#0: ffff888041584408 (&sb->s_type->i_mutex_key#10){+.+.}-{4:4}, at: inode_lock include/linux/fs.h:865 [inline]
#0: ffff888041584408 (&sb->s_type->i_mutex_key#10){+.+.}-{4:4}, at: __sock_release+0x86/0x270 net/socket.c:641
#1: ffff888143abb258 (sk_lock-AF_CAN){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1624 [inline]
#1: ffff888143abb258 (sk_lock-AF_CAN){+.+.}-{0:0}, at: bcm_release+0x200/0x8d0 net/can/bcm.c:1575
#2: ffffffff8e1c75b8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x1a4/0x3b0 kernel/rcu/tree_exp.h:334
5 locks held by kworker/u8:41/8174:
#0: ffff88801bef5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12cd/0x1b30 kernel/workqueue.c:3211
#1: ffffc90004c8fd18 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x8bb/0x1b30 kernel/workqueue.c:3212
#2: ffffffff8fec1ed0 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xca/0xbf0 net/core/net_namespace.c:606
#3: ffffffff8fed7ea8 (rtnl_mutex){+.+.}-{4:4}, at: cleanup_net+0x512/0xbf0 net/core/net_namespace.c:642
#4: ffffffff8e1c75b8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x282/0x3b0 kernel/rcu/tree_exp.h:302
=============================================
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.14.0-rc1-syzkaller-00020-g0de63bb7d919 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:236 [inline]
watchdog+0xf62/0x12b0 kernel/hung_task.c:399
kthread+0x3af/0x750 kernel/kthread.c:464
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 8130 Comm: syz.0.424 Not tainted 6.14.0-rc1-syzkaller-00020-g0de63bb7d919 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
RIP: 0010:const_folio_flags.constprop.0+0x1/0x70 include/linux/page-flags.h:305
Code: 89 df e8 32 5b 07 00 90 0f 0b e8 5a f6 22 00 eb bd 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 <53> 48 89 fb e8 76 15 c0 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff
RSP: 0018:ffffc900035470c0 EFLAGS: 00000293
RAX: 0000000000000000 RBX: 0000000000000003 RCX: ffffffff81f9fa40
RDX: ffff88801dffbc00 RSI: ffffffff81f9fa52 RDI: ffffea0000f16d40
RBP: ffff88807a7ba228 R08: 0000000000000007 R09: fffffffffffff000
R10: ffffea0000f16d40 R11: 0000000000000002 R12: 0000000000000000
R13: 0000000000000000 R14: ffffea0000f16d40 R15: ffff88807a7ba258
FS: 00007f2e5b9d76c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200079c0 CR3: 00000000319b2000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
folio_test_head include/linux/page-flags.h:829 [inline]
folio_test_large include/linux/page-flags.h:850 [inline]
shmem_get_folio_gfp+0x6ba/0x1530 mm/shmem.c:2533
shmem_get_folio mm/shmem.c:2628 [inline]
shmem_write_begin+0x161/0x300 mm/shmem.c:3278
generic_perform_write+0x2ba/0x920 mm/filemap.c:4189
shmem_file_write_iter+0x10e/0x140 mm/shmem.c:3454
__kernel_write_iter+0x318/0xa90 fs/read_write.c:612
dump_emit_page fs/coredump.c:884 [inline]
dump_user_range+0x389/0x8c0 fs/coredump.c:945
elf_core_dump+0x2787/0x3880 fs/binfmt_elf.c:2129
do_coredump+0x304f/0x45d0 fs/coredump.c:758
get_signal+0x23f3/0x2610 kernel/signal.c:3021
arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
irqentry_exit_to_user_mode+0x13f/0x280 kernel/entry/common.c:231
asm_exc_invalid_op+0x1a/0x20 arch/x86/include/asm/idtentry.h:621
RIP: 0033:0x14
Code: Unable to access opcode bytes at 0xffffffffffffffea.
RSP: 002b:000000000000000d EFLAGS: 00010202
RAX: 0000000000000000 RBX: 00007f2e5ada6240 RCX: 00007f2e5ab8cda9
RDX: ffffffffff600000 RSI: 0000000000000005 RDI: 0000000000000007
RBP: 00007f2e5ac0e2a0 R08: 0000000200000003 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000001 R14: 00007f2e5ada6240 R15: 00007fff1d2abab8