INFO: task syz.0.675:8456 blocked for more than 143 seconds. Not tainted 6.12.0-rc1-syzkaller-00381-g2a130b7e1fcd #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.0.675 state:D stack:28592 pid:8456 tgid:8449 ppid:5227 flags:0x00000006 Call Trace: context_switch kernel/sched/core.c:5315 [inline] __schedule+0xef5/0x5750 kernel/sched/core.c:6675 __schedule_loop kernel/sched/core.c:6752 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6767 schedule_timeout+0x258/0x2a0 kernel/time/timer.c:2591 do_wait_for_common kernel/sched/completion.c:95 [inline] __wait_for_common+0x3e1/0x600 kernel/sched/completion.c:116 wait_for_common kernel/sched/completion.c:127 [inline] wait_for_completion_state+0x1c/0x40 kernel/sched/completion.c:264 coredump_wait fs/coredump.c:418 [inline] do_coredump+0x82f/0x4160 fs/coredump.c:575 get_signal+0x237c/0x26d0 kernel/signal.c:2902 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f53086403c0 RSP: 002b:00007f530957ea78 EFLAGS: 00000246 ORIG_RAX: 000000000000014e RAX: 0000000000000000 RBX: 00007f53089362e0 RCX: 00007f530877dff9 RDX: 00007f530957ea80 RSI: 00007f530957ebb0 RDI: 000000000000000b RBP: 00007f53087f0296 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f53089362e0 R15: 00007ffe4d7177c8 Showing all locks held in the system: 1 lock held by khungtaskd/30: #0: ffffffff8ddb7800 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline] #0: ffffffff8ddb7800 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline] #0: ffffffff8ddb7800 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x7f/0x390 kernel/locking/lockdep.c:6720 3 locks held by kworker/0:2/937: #0: ffff88801ac80948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1212/0x1b30 kernel/workqueue.c:3204 #1: ffffc90003bc7d80 ((fqdir_free_work).work){+.+.}-{0:0}, at: process_one_work+0x8bb/0x1b30 kernel/workqueue.c:3205 #2: ffffffff8ddc2fc0 (rcu_state.barrier_mutex){+.+.}-{3:3}, at: rcu_barrier+0x48/0x700 kernel/rcu/tree.c:4562 2 locks held by getty/4987: #0: ffff88803260a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243 #1: ffffc90002f062f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfba/0x1480 drivers/tty/n_tty.c:2211 1 lock held by syz.0.675/8454: 5 locks held by syz.3.1282/11153: 1 lock held by syz.3.1313/11254: ============================================= NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.12.0-rc1-syzkaller-00381-g2a130b7e1fcd #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline] watchdog+0xf0c/0x1240 kernel/hung_task.c:379 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 11252 Comm: syz.3.1313 Not tainted 6.12.0-rc1-syzkaller-00381-g2a130b7e1fcd #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:__list_del_entry_valid_or_report+0xc0/0x1c0 lib/list_debug.c:65 Code: 3c 07 00 0f 85 f1 00 00 00 48 8b 01 48 39 f0 75 75 48 8d 7a 08 48 b8 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 80 3c 01 00 <0f> 85 ae 00 00 00 48 8b 42 08 48 39 c6 75 5f b8 01 00 00 00 48 83 RSP: 0000:ffffc90009cb75f0 EFLAGS: 00000046 RAX: dffffc0000000000 RBX: ffffea0001319900 RCX: 1ffffd4000295dc2 RDX: ffffea00014aee08 RSI: ffffea0001319908 RDI: ffffea00014aee10 RBP: ffffea0001319908 R08: 0000000000000000 R09: fffff94000263326 R10: ffffea0001319937 R11: dffffc0000000000 R12: ffff88813fffbc80 R13: 0000000000000002 R14: ffffea0001319910 R15: ffffea0001319900 FS: 000055556c645500(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2c9e5ff8 CR3: 0000000068e2a000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __list_del_entry_valid include/linux/list.h:124 [inline] __list_del_entry include/linux/list.h:215 [inline] list_del include/linux/list.h:229 [inline] __del_page_from_free_list+0x5c/0x420 mm/page_alloc.c:697 __free_one_page+0x452/0xb10 mm/page_alloc.c:820 free_pcppages_bulk+0x2f1/0x620 mm/page_alloc.c:1201 free_unref_page_commit+0x515/0xfe0 mm/page_alloc.c:2613 free_unref_page+0x60f/0xdc0 mm/page_alloc.c:2661 __put_partials+0x14c/0x170 mm/slub.c:3145 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x4e/0x120 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x192/0x1e0 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:247 [inline] slab_post_alloc_hook mm/slub.c:4085 [inline] slab_alloc_node mm/slub.c:4134 [inline] kmem_cache_alloc_noprof+0x121/0x2f0 mm/slub.c:4141 new_handle fs/jbd2/transaction.c:461 [inline] jbd2__journal_start+0x193/0x6a0 fs/jbd2/transaction.c:488 __ext4_journal_start_sb+0x358/0x660 fs/ext4/ext4_jbd2.c:112 __ext4_journal_start fs/ext4/ext4_jbd2.h:326 [inline] ext4_dirty_inode+0xa1/0x130 fs/ext4/inode.c:5981 __mark_inode_dirty+0x1f6/0xe60 fs/fs-writeback.c:2493 generic_update_time+0xcf/0xf0 fs/inode.c:2041 inode_update_time fs/inode.c:2054 [inline] __file_update_time fs/inode.c:2243 [inline] file_update_time+0x12e/0x160 fs/inode.c:2273 ext4_page_mkwrite+0x368/0x1760 fs/ext4/inode.c:6102 do_page_mkwrite+0x177/0x380 mm/memory.c:3162 do_shared_fault mm/memory.c:5358 [inline] do_fault mm/memory.c:5420 [inline] do_pte_missing+0x29e/0x3e50 mm/memory.c:3965 handle_pte_fault mm/memory.c:5751 [inline] __handle_mm_fault+0x100a/0x2a10 mm/memory.c:5894 handle_mm_fault+0x3fa/0xaa0 mm/memory.c:6062 do_user_addr_fault+0x60d/0x13f0 arch/x86/mm/fault.c:1338 handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x5c/0xc0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0033:0x7f47f565cbe6 Code: 00 48 89 df 48 89 54 24 10 83 c5 01 e8 33 b5 fe ff 48 8b 43 38 48 8b 54 24 10 41 83 c7 01 83 43 28 08 48 8d 48 f8 48 89 4b 38 <48> 89 50 f8 45 3b 7d 04 0f 82 68 fe ff ff e9 00 ff ff ff 0f 1f 80 RSP: 002b:00007ffeb7d16e60 EFLAGS: 00010202 RAX: 0000001b2c9e6000 RBX: 00007f47f6465720 RCX: 0000001b2c9e5ff8 RDX: ffffffff8b064092 RSI: 0000000000000008 RDI: 00007f47f6465720 RBP: 00000000000001f6 R08: 00007f47f5920000 R09: 00007f47f5922000 R10: 000000008b064096 R11: 000000000000000a R12: ffffffff8b064b8e R13: 00007f47f5936018 R14: 0000000000000008 R15: 00000000000002a2