INFO: task syz-executor:13193 blocked for more than 143 seconds. Not tainted 6.13.0-syzkaller-04541-gdf60eac9efe8 #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor state:D stack:21296 pid:13193 tgid:13193 ppid:1 flags:0x00004006 Call Trace: context_switch kernel/sched/core.c:5373 [inline] __schedule+0x181a/0x4b90 kernel/sched/core.c:6760 __schedule_loop kernel/sched/core.c:6837 [inline] schedule+0x14b/0x320 kernel/sched/core.c:6852 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6909 __mutex_lock_common kernel/locking/mutex.c:662 [inline] __mutex_lock+0x817/0x1010 kernel/locking/mutex.c:730 lmLogClose+0xb2/0x530 fs/jfs/jfs_logmgr.c:1444 jfs_umount+0x2ce/0x3a0 fs/jfs/jfs_umount.c:114 jfs_put_super+0x8a/0x190 fs/jfs/super.c:194 generic_shutdown_super+0x139/0x2d0 fs/super.c:642 kill_block_super+0x44/0x90 fs/super.c:1710 deactivate_locked_super+0xc4/0x130 fs/super.c:473 cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1413 task_work_run+0x24f/0x310 kernel/task_work.c:239 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop kernel/entry/common.c:114 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x13f/0x340 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f8b83787057 RSP: 002b:00007ffe1c9dc2f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: 0000000000000000 RBX: 00007f8b838018f4 RCX: 00007f8b83787057 RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe1c9dc3b0 RBP: 00007ffe1c9dc3b0 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffe1c9dd430 R13: 00007f8b838018f4 R14: 00007ffe1c9dd470 R15: 0000000000000002 INFO: lockdep is turned off. NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.13.0-syzkaller-04541-gdf60eac9efe8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 nmi_cpu_backtrace+0x49c/0x4d0 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x198/0x320 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:234 [inline] watchdog+0xff6/0x1040 kernel/hung_task.c:397 kthread+0x7a9/0x920 kernel/kthread.c:464 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 5196 Comm: udevd Not tainted 6.13.0-syzkaller-04541-gdf60eac9efe8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 RIP: 0010:rcu_is_watching_curr_cpu include/linux/context_tracking.h:128 [inline] RIP: 0010:rcu_is_watching+0x15/0xb0 kernel/rcu/tree.c:716 Code: 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 41 57 41 56 53 65 ff 05 98 90 7e 7e e8 9b f6 46 0a <89> c3 83 f8 08 73 7a 49 bf 00 00 00 00 00 fc ff df 4c 8d 34 dd 50 RSP: 0018:ffffc90002f67760 EFLAGS: 00000282 RAX: 0000000000000001 RBX: 0000000000000001 RCX: ffffffff817b09e0 RDX: 0000000000000000 RSI: ffffffff8c5f41c0 RDI: ffffffff8c5f4180 RBP: ffffc90002f678b8 R08: ffffffff901a7377 R09: 1ffffffff2034e6e R10: dffffc0000000000 R11: fffffbfff2034e6f R12: 1ffff920005ecefc R13: ffffffff81ae8866 R14: 0000000000000000 R15: dffffc0000000000 FS: 00007f0959ac1c80(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fdd6e3ff000 CR3: 000000003390c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0xbf/0xa30 kernel/locking/lockdep.c:5862 rcu_lock_release include/linux/rcupdate.h:347 [inline] rcu_read_unlock include/linux/rcupdate.h:880 [inline] is_bpf_text_address+0x280/0x2a0 kernel/bpf/core.c:774 kernel_text_address+0xa7/0xe0 kernel/extable.c:125 __kernel_text_address+0xd/0x40 kernel/extable.c:79 unwind_get_return_address+0x4d/0x90 arch/x86/kernel/unwind_orc.c:369 arch_stack_walk+0xfd/0x150 arch/x86/kernel/stacktrace.c:26 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2353 [inline] slab_free mm/slub.c:4613 [inline] kmem_cache_free+0x195/0x410 mm/slub.c:4715 do_unlinkat+0x7b0/0x830 fs/namei.c:4610 __do_sys_unlink fs/namei.c:4635 [inline] __se_sys_unlink fs/namei.c:4633 [inline] __x64_sys_unlink+0x47/0x50 fs/namei.c:4633 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f0959717da7 Code: f0 ff ff 73 01 c3 48 8b 0d 7e 90 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 51 90 0d 00 f7 d8 64 89 01 48 RSP: 002b:00007ffcfe3dbcd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000057 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0959717da7 RDX: 0000000000000000 RSI: 000000001ee00d80 RDI: 0000560941e440d8 RBP: 000056097d1f4d30 R08: 000000001ee515bd R09: 7fffffffffffffff R10: 00007f0959b73038 R11: 0000000000000202 R12: 0000000000000bb8 R13: 000056097d21cbe0 R14: 0000000000000000 R15: 0000000000000000