INFO: task syz.1.3258:17144 blocked for more than 143 seconds.
Not tainted 6.14.0-rc5-syzkaller-00268-g1110ce6a1e34 #0
Blocked by coredump.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.1.3258 state:D stack:25392 pid:17144 tgid:17141 ppid:15621 task_flags:0x400448 flags:0x00024002
Call Trace:
context_switch kernel/sched/core.c:5378 [inline]
__schedule+0xf43/0x5890 kernel/sched/core.c:6765
__schedule_loop kernel/sched/core.c:6842 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6857
schedule_timeout+0x244/0x280 kernel/time/sleep_timeout.c:75
do_wait_for_common kernel/sched/completion.c:95 [inline]
__wait_for_common+0x3e1/0x600 kernel/sched/completion.c:116
io_wq_exit_workers io_uring/io-wq.c:1262 [inline]
io_wq_put_and_exit+0x232/0x8a0 io_uring/io-wq.c:1290
io_uring_clean_tctx+0x10e/0x190 io_uring/tctx.c:205
io_uring_cancel_generic+0x67d/0x8f0 io_uring/io_uring.c:3183
io_uring_files_cancel include/linux/io_uring.h:19 [inline]
do_exit+0x53c/0x2d70 kernel/exit.c:894
do_group_exit+0xd3/0x2a0 kernel/exit.c:1087
get_signal+0x24ed/0x26c0 kernel/signal.c:3036
arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218
do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f0ce878d169
RSP: 002b:00007f0ce9536038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa
RAX: 0000000000002000 RBX: 00007f0ce89a6080 RCX: 00007f0ce878d169
RDX: 0000000000000000 RSI: 00000000000047fa RDI: 0000000000000003
RBP: 00007f0ce880e2a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000001 R14: 00007f0ce89a6080 R15: 00007ffda34b3468
Showing all locks held in the system:
1 lock held by khungtaskd/31:
#0: ffffffff8e1bd0c0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
#0: ffffffff8e1bd0c0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline]
#0: ffffffff8e1bd0c0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x7f/0x390 kernel/locking/lockdep.c:6746
3 locks held by kworker/u8:6/3561:
#0: ffff888031d77148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213
#1: ffffc9000d637d18 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214
#2: ffffffff8fef7ea8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:129 [inline]
#2: ffffffff8fef7ea8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_dad_work+0x121/0x14e0 net/ipv6/addrconf.c:4190
2 locks held by getty/5578:
#0: ffff8880329960a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243
#1: ffffc90002fde2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0xfba/0x1480 drivers/tty/n_tty.c:2211
3 locks held by kworker/u8:37/7647:
#0: ffff88801b081148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213
#1: ffffc900037e7d18 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214
#2: ffffffff8fef7ea8 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0x51/0xc0 net/core/link_watch.c:285
7 locks held by kworker/u8:52/7662:
#0: ffff88801beeb948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213
#1: ffffc90003447d18 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214
#2: ffffffff8fee2190 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xca/0xb30 net/core/net_namespace.c:606
#3: ffff8880314580e8 (&dev->mutex){....}-{4:4}, at: device_lock include/linux/device.h:1030 [inline]
#3: ffff8880314580e8 (&dev->mutex){....}-{4:4}, at: devl_dev_lock net/devlink/devl_internal.h:108 [inline]
#3: ffff8880314580e8 (&dev->mutex){....}-{4:4}, at: devlink_pernet_pre_exit+0x12d/0x2b0 net/devlink/core.c:506
#4: ffff888031459250 (&devlink->lock_key#26){+.+.}-{4:4}, at: devl_lock net/devlink/core.c:276 [inline]
#4: ffff888031459250 (&devlink->lock_key#26){+.+.}-{4:4}, at: devl_dev_lock net/devlink/devl_internal.h:109 [inline]
#4: ffff888031459250 (&devlink->lock_key#26){+.+.}-{4:4}, at: devlink_pernet_pre_exit+0x137/0x2b0 net/devlink/core.c:506
#5: ffffffff8fef7ea8 (rtnl_mutex){+.+.}-{4:4}, at: nsim_destroy+0x9d/0x710 drivers/net/netdevsim/netdev.c:1016
#6: ffffffff8e1c8538 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x282/0x3b0 kernel/rcu/tree_exp.h:302
1 lock held by iou-wrk-17144/17158:
1 lock held by syz.6.3725/19002:
#0: ffffffff8fef7ea8 (rtnl_mutex){+.+.}-{4:4}, at: xsk_bind+0x1e3/0x13c0 net/xdp/xsk.c:1168
=============================================
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.14.0-rc5-syzkaller-00268-g1110ce6a1e34 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:236 [inline]
watchdog+0xf62/0x12b0 kernel/hung_task.c:399
kthread+0x3af/0x750 kernel/kthread.c:464
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 19002 Comm: syz.6.3725 Not tainted 6.14.0-rc5-syzkaller-00268-g1110ce6a1e34 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
RIP: 0010:__lock_acquire+0xebe/0x3c40 kernel/locking/lockdep.c:5261
Code: 00 00 00 00 48 8b 84 24 e8 00 00 00 65 48 2b 04 25 28 00 00 00 0f 85 93 22 00 00 48 81 c4 f0 00 00 00 89 d0 5b 5d 41 5c 41 5d <41> 5e 41 5f c3 cc cc cc cc 41 83 fe 01 c7 04 24 00 00 00 00 0f 87
RSP: 0018:ffffc90003a07248 EFLAGS: 00000086
RAX: 0000000000000001 RBX: 1ffff92000740e52 RCX: 00000000a72c6400
RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffffffff96ec7ae8
RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff2dd8b98
R10: ffffffff96ec5cc7 R11: 0000000000000002 R12: 0000000000000000
R13: ffffffff8e1bd0c0 R14: 0000000000000003 R15: ffff8880268aaf80
FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2de1cff8 CR3: 0000000036e9a000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
lock_acquire.part.0+0x11b/0x380 kernel/locking/lockdep.c:5851
rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
rcu_read_lock include/linux/rcupdate.h:849 [inline]
__lruvec_stat_mod_folio+0xb8/0x370 mm/memcontrol.c:799
filemap_unaccount_folio mm/filemap.c:184 [inline]
filemap_unaccount_folio+0x1d0/0x860 mm/filemap.c:149
__filemap_remove_folio mm/filemap.c:223 [inline]
filemap_remove_folio+0xf1/0x250 mm/filemap.c:256
truncate_inode_folio+0x49/0x70 mm/truncate.c:162
shmem_undo_range+0x36e/0x1170 mm/shmem.c:1108
shmem_truncate_range mm/shmem.c:1224 [inline]
shmem_evict_inode+0x3a3/0xba0 mm/shmem.c:1352
evict+0x409/0x960 fs/inode.c:796
iput_final fs/inode.c:1946 [inline]
iput fs/inode.c:1972 [inline]
iput+0x52a/0x890 fs/inode.c:1958
dentry_unlink_inode+0x29c/0x480 fs/dcache.c:440
__dentry_kill+0x1d0/0x600 fs/dcache.c:643
dput.part.0+0x4b1/0x9b0 fs/dcache.c:885
dput+0x1f/0x30 fs/dcache.c:875
__fput+0x51c/0xb70 fs/file_table.c:472
task_work_run+0x14e/0x250 kernel/task_work.c:227
exit_task_work include/linux/task_work.h:40 [inline]
do_exit+0xad8/0x2d70 kernel/exit.c:938
do_group_exit+0xd3/0x2a0 kernel/exit.c:1087
get_signal+0x24ed/0x26c0 kernel/signal.c:3036
arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218
do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fca84d8d169
Code: Unable to access opcode bytes at 0x7fca84d8d13f.
RSP: 002b:00007fca85b76038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031
RAX: ffffffffffffffed RBX: 00007fca84fa6160 RCX: 00007fca84d8d169
RDX: 0000000000000010 RSI: 0000400000000100 RDI: 0000000000000008
RBP: 00007fca84e0e2a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007fca84fa6160 R15: 00007ffe0343da68