INFO: task syz.1.3258:17144 blocked for more than 143 seconds. Not tainted 6.14.0-rc5-syzkaller-00268-g1110ce6a1e34 #0 Blocked by coredump. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.1.3258 state:D stack:25392 pid:17144 tgid:17141 ppid:15621 task_flags:0x400448 flags:0x00024002 Call Trace: context_switch kernel/sched/core.c:5378 [inline] __schedule+0xf43/0x5890 kernel/sched/core.c:6765 __schedule_loop kernel/sched/core.c:6842 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6857 schedule_timeout+0x244/0x280 kernel/time/sleep_timeout.c:75 do_wait_for_common kernel/sched/completion.c:95 [inline] __wait_for_common+0x3e1/0x600 kernel/sched/completion.c:116 io_wq_exit_workers io_uring/io-wq.c:1262 [inline] io_wq_put_and_exit+0x232/0x8a0 io_uring/io-wq.c:1290 io_uring_clean_tctx+0x10e/0x190 io_uring/tctx.c:205 io_uring_cancel_generic+0x67d/0x8f0 io_uring/io_uring.c:3183 io_uring_files_cancel include/linux/io_uring.h:19 [inline] do_exit+0x53c/0x2d70 kernel/exit.c:894 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 get_signal+0x24ed/0x26c0 kernel/signal.c:3036 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f0ce878d169 RSP: 002b:00007f0ce9536038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa RAX: 0000000000002000 RBX: 00007f0ce89a6080 RCX: 00007f0ce878d169 RDX: 0000000000000000 RSI: 00000000000047fa RDI: 0000000000000003 RBP: 00007f0ce880e2a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000001 R14: 00007f0ce89a6080 R15: 00007ffda34b3468 Showing all locks held in the system: 1 lock held by khungtaskd/31: #0: ffffffff8e1bd0c0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline] #0: ffffffff8e1bd0c0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline] #0: ffffffff8e1bd0c0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x7f/0x390 kernel/locking/lockdep.c:6746 3 locks held by kworker/u8:6/3561: #0: ffff888031d77148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213 #1: ffffc9000d637d18 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214 #2: ffffffff8fef7ea8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:129 [inline] #2: ffffffff8fef7ea8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_dad_work+0x121/0x14e0 net/ipv6/addrconf.c:4190 2 locks held by getty/5578: #0: ffff8880329960a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243 #1: ffffc90002fde2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0xfba/0x1480 drivers/tty/n_tty.c:2211 3 locks held by kworker/u8:37/7647: #0: ffff88801b081148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213 #1: ffffc900037e7d18 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214 #2: ffffffff8fef7ea8 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0x51/0xc0 net/core/link_watch.c:285 7 locks held by kworker/u8:52/7662: #0: ffff88801beeb948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213 #1: ffffc90003447d18 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214 #2: ffffffff8fee2190 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xca/0xb30 net/core/net_namespace.c:606 #3: ffff8880314580e8 (&dev->mutex){....}-{4:4}, at: device_lock include/linux/device.h:1030 [inline] #3: ffff8880314580e8 (&dev->mutex){....}-{4:4}, at: devl_dev_lock net/devlink/devl_internal.h:108 [inline] #3: ffff8880314580e8 (&dev->mutex){....}-{4:4}, at: devlink_pernet_pre_exit+0x12d/0x2b0 net/devlink/core.c:506 #4: ffff888031459250 (&devlink->lock_key#26){+.+.}-{4:4}, at: devl_lock net/devlink/core.c:276 [inline] #4: ffff888031459250 (&devlink->lock_key#26){+.+.}-{4:4}, at: devl_dev_lock net/devlink/devl_internal.h:109 [inline] #4: ffff888031459250 (&devlink->lock_key#26){+.+.}-{4:4}, at: devlink_pernet_pre_exit+0x137/0x2b0 net/devlink/core.c:506 #5: ffffffff8fef7ea8 (rtnl_mutex){+.+.}-{4:4}, at: nsim_destroy+0x9d/0x710 drivers/net/netdevsim/netdev.c:1016 #6: ffffffff8e1c8538 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x282/0x3b0 kernel/rcu/tree_exp.h:302 1 lock held by iou-wrk-17144/17158: 1 lock held by syz.6.3725/19002: #0: ffffffff8fef7ea8 (rtnl_mutex){+.+.}-{4:4}, at: xsk_bind+0x1e3/0x13c0 net/xdp/xsk.c:1168 ============================================= NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.14.0-rc5-syzkaller-00268-g1110ce6a1e34 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:236 [inline] watchdog+0xf62/0x12b0 kernel/hung_task.c:399 kthread+0x3af/0x750 kernel/kthread.c:464 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 19002 Comm: syz.6.3725 Not tainted 6.14.0-rc5-syzkaller-00268-g1110ce6a1e34 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 RIP: 0010:__lock_acquire+0xebe/0x3c40 kernel/locking/lockdep.c:5261 Code: 00 00 00 00 48 8b 84 24 e8 00 00 00 65 48 2b 04 25 28 00 00 00 0f 85 93 22 00 00 48 81 c4 f0 00 00 00 89 d0 5b 5d 41 5c 41 5d <41> 5e 41 5f c3 cc cc cc cc 41 83 fe 01 c7 04 24 00 00 00 00 0f 87 RSP: 0018:ffffc90003a07248 EFLAGS: 00000086 RAX: 0000000000000001 RBX: 1ffff92000740e52 RCX: 00000000a72c6400 RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffffffff96ec7ae8 RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff2dd8b98 R10: ffffffff96ec5cc7 R11: 0000000000000002 R12: 0000000000000000 R13: ffffffff8e1bd0c0 R14: 0000000000000003 R15: ffff8880268aaf80 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2de1cff8 CR3: 0000000036e9a000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire.part.0+0x11b/0x380 kernel/locking/lockdep.c:5851 rcu_lock_acquire include/linux/rcupdate.h:337 [inline] rcu_read_lock include/linux/rcupdate.h:849 [inline] __lruvec_stat_mod_folio+0xb8/0x370 mm/memcontrol.c:799 filemap_unaccount_folio mm/filemap.c:184 [inline] filemap_unaccount_folio+0x1d0/0x860 mm/filemap.c:149 __filemap_remove_folio mm/filemap.c:223 [inline] filemap_remove_folio+0xf1/0x250 mm/filemap.c:256 truncate_inode_folio+0x49/0x70 mm/truncate.c:162 shmem_undo_range+0x36e/0x1170 mm/shmem.c:1108 shmem_truncate_range mm/shmem.c:1224 [inline] shmem_evict_inode+0x3a3/0xba0 mm/shmem.c:1352 evict+0x409/0x960 fs/inode.c:796 iput_final fs/inode.c:1946 [inline] iput fs/inode.c:1972 [inline] iput+0x52a/0x890 fs/inode.c:1958 dentry_unlink_inode+0x29c/0x480 fs/dcache.c:440 __dentry_kill+0x1d0/0x600 fs/dcache.c:643 dput.part.0+0x4b1/0x9b0 fs/dcache.c:885 dput+0x1f/0x30 fs/dcache.c:875 __fput+0x51c/0xb70 fs/file_table.c:472 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 get_signal+0x24ed/0x26c0 kernel/signal.c:3036 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fca84d8d169 Code: Unable to access opcode bytes at 0x7fca84d8d13f. RSP: 002b:00007fca85b76038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 RAX: ffffffffffffffed RBX: 00007fca84fa6160 RCX: 00007fca84d8d169 RDX: 0000000000000010 RSI: 0000400000000100 RDI: 0000000000000008 RBP: 00007fca84e0e2a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fca84fa6160 R15: 00007ffe0343da68