INFO: task syz-executor:13193 blocked for more than 143 seconds.
Not tainted 6.13.0-syzkaller-04541-gdf60eac9efe8 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor state:D stack:21296 pid:13193 tgid:13193 ppid:1 flags:0x00004006
Call Trace:
context_switch kernel/sched/core.c:5373 [inline]
__schedule+0x181a/0x4b90 kernel/sched/core.c:6760
__schedule_loop kernel/sched/core.c:6837 [inline]
schedule+0x14b/0x320 kernel/sched/core.c:6852
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6909
__mutex_lock_common kernel/locking/mutex.c:662 [inline]
__mutex_lock+0x817/0x1010 kernel/locking/mutex.c:730
lmLogClose+0xb2/0x530 fs/jfs/jfs_logmgr.c:1444
jfs_umount+0x2ce/0x3a0 fs/jfs/jfs_umount.c:114
jfs_put_super+0x8a/0x190 fs/jfs/super.c:194
generic_shutdown_super+0x139/0x2d0 fs/super.c:642
kill_block_super+0x44/0x90 fs/super.c:1710
deactivate_locked_super+0xc4/0x130 fs/super.c:473
cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1413
task_work_run+0x24f/0x310 kernel/task_work.c:239
resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
exit_to_user_mode_loop kernel/entry/common.c:114 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0x13f/0x340 kernel/entry/common.c:218
do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f8b83787057
RSP: 002b:00007ffe1c9dc2f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
RAX: 0000000000000000 RBX: 00007f8b838018f4 RCX: 00007f8b83787057
RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe1c9dc3b0
RBP: 00007ffe1c9dc3b0 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffe1c9dd430
R13: 00007f8b838018f4 R14: 00007ffe1c9dd470 R15: 0000000000000002
INFO: lockdep is turned off.
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.13.0-syzkaller-04541-gdf60eac9efe8 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
nmi_cpu_backtrace+0x49c/0x4d0 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x198/0x320 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:234 [inline]
watchdog+0xff6/0x1040 kernel/hung_task.c:397
kthread+0x7a9/0x920 kernel/kthread.c:464
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 5196 Comm: udevd Not tainted 6.13.0-syzkaller-04541-gdf60eac9efe8 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
RIP: 0010:rcu_is_watching_curr_cpu include/linux/context_tracking.h:128 [inline]
RIP: 0010:rcu_is_watching+0x15/0xb0 kernel/rcu/tree.c:716
Code: 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 41 57 41 56 53 65 ff 05 98 90 7e 7e e8 9b f6 46 0a <89> c3 83 f8 08 73 7a 49 bf 00 00 00 00 00 fc ff df 4c 8d 34 dd 50
RSP: 0018:ffffc90002f67760 EFLAGS: 00000282
RAX: 0000000000000001 RBX: 0000000000000001 RCX: ffffffff817b09e0
RDX: 0000000000000000 RSI: ffffffff8c5f41c0 RDI: ffffffff8c5f4180
RBP: ffffc90002f678b8 R08: ffffffff901a7377 R09: 1ffffffff2034e6e
R10: dffffc0000000000 R11: fffffbfff2034e6f R12: 1ffff920005ecefc
R13: ffffffff81ae8866 R14: 0000000000000000 R15: dffffc0000000000
FS: 00007f0959ac1c80(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fdd6e3ff000 CR3: 000000003390c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
trace_lock_release include/trace/events/lock.h:69 [inline]
lock_release+0xbf/0xa30 kernel/locking/lockdep.c:5862
rcu_lock_release include/linux/rcupdate.h:347 [inline]
rcu_read_unlock include/linux/rcupdate.h:880 [inline]
is_bpf_text_address+0x280/0x2a0 kernel/bpf/core.c:774
kernel_text_address+0xa7/0xe0 kernel/extable.c:125
__kernel_text_address+0xd/0x40 kernel/extable.c:79
unwind_get_return_address+0x4d/0x90 arch/x86/kernel/unwind_orc.c:369
arch_stack_walk+0xfd/0x150 arch/x86/kernel/stacktrace.c:26
stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x59/0x70 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:233 [inline]
slab_free_hook mm/slub.c:2353 [inline]
slab_free mm/slub.c:4613 [inline]
kmem_cache_free+0x195/0x410 mm/slub.c:4715
do_unlinkat+0x7b0/0x830 fs/namei.c:4610
__do_sys_unlink fs/namei.c:4635 [inline]
__se_sys_unlink fs/namei.c:4633 [inline]
__x64_sys_unlink+0x47/0x50 fs/namei.c:4633
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f0959717da7
Code: f0 ff ff 73 01 c3 48 8b 0d 7e 90 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 51 90 0d 00 f7 d8 64 89 01 48
RSP: 002b:00007ffcfe3dbcd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000057
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0959717da7
RDX: 0000000000000000 RSI: 000000001ee00d80 RDI: 0000560941e440d8
RBP: 000056097d1f4d30 R08: 000000001ee515bd R09: 7fffffffffffffff
R10: 00007f0959b73038 R11: 0000000000000202 R12: 0000000000000bb8
R13: 000056097d21cbe0 R14: 0000000000000000 R15: 0000000000000000