INFO: task syz-executor.5:6447 blocked for more than 143 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.5 state:D stack:28472 pid:6447 tgid:6445 ppid:6387 task_flags:0x400040 flags:0x00080002
Call Trace:
context_switch kernel/sched/core.c:5260 [inline]
__schedule+0x14ea/0x5050 kernel/sched/core.c:6867
__schedule_loop kernel/sched/core.c:6949 [inline]
schedule+0x164/0x360 kernel/sched/core.c:6964
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7021
__mutex_lock_common kernel/locking/mutex.c:692 [inline]
__mutex_lock+0x7fe/0x1300 kernel/locking/mutex.c:776
blk_trace_remove kernel/trace/blktrace.c:562 [inline]
blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
blkdev_common_ioctl+0x13a7/0x3250 block/ioctl.c:712
blkdev_ioctl+0x528/0x740 block/ioctl.c:786
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:597 [inline]
__se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fe6c986d079
RSP: 002b:00007fe6ca5c10b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007fe6c99ac050 RCX: 00007fe6c986d079
RDX: 0000000000000000 RSI: 0000000000001276 RDI: 0000000000000004
RBP: 00007fe6c98ce498 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007fe6c99ac050 R15: 00007ffe70d85fa8
Showing all locks held in the system:
1 lock held by khungtaskd/31:
#0: ffffffff8e55a360 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#0: ffffffff8e55a360 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline]
#0: ffffffff8e55a360 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775
1 lock held by klogd/5184:
#0: ffff8880b873a918 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:639
2 locks held by getty/5585:
#0: ffff88814d5ef0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243
#1: ffffc9000362b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x45c/0x13c0 drivers/tty/n_tty.c:2211
3 locks held by syz-executor.5/6446:
1 lock held by syz-executor.5/6447:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.4/6483:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.4/6484:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.3/6507:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.3/6508:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.0/6531:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.0/6532:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.1/6592:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.1/6593:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.2/6603:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.2/6604:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.5/6610:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.5/6611:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.4/6646:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.4/6647:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.3/6670:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.3/6671:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.0/6693:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.0/6694:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.1/6749:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.1/6750:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.2/6761:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.2/6763:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.5/6769:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.5/6770:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.4/6799:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.4/6801:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
1 lock held by syz-executor.3/6829:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_setup+0x298/0x450 kernel/trace/blktrace.c:788
1 lock held by syz-executor.3/6830:
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline]
#0: ffff888026683888 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x39b/0x740 kernel/trace/blktrace.c:950
=============================================
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026
Call Trace:
dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120
nmi_cpu_backtrace+0x274/0x2d0 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline]
__sys_info lib/sys_info.c:157 [inline]
sys_info+0x135/0x170 lib/sys_info.c:165
check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline]
watchdog+0xf90/0xfe0 kernel/hung_task.c:515
kthread+0x726/0x8b0 kernel/kthread.c:463
ret_from_fork+0x51b/0xa40 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 6446 Comm: syz-executor.5 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026
RIP: 0010:mark_lock+0x9/0x190 kernel/locking/lockdep.c:4714
Code: 89 df 48 8b 2c 24 e9 b6 fd ff ff 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 41 57 41 56 41 55 41 54 <53> 8b 46 20 89 c1 81 e1 00 00 03 00 83 f9 01 bb 09 00 00 00 83 db
RSP: 0018:ffffc90002f56ac0 EFLAGS: 00000046
RAX: 0000000000000004 RBX: ffff88802ec8e720 RCX: 0000000000000002
RDX: 0000000000000008 RSI: ffff88802ec8e700 RDI: ffff88802ec8db80
RBP: ffff88802ec8e700 R08: ffffffff81759195 R09: ffffffff8e55a360
R10: ffffc90002f56df8 R11: ffffffff81afb170 R12: 0000000000000004
R13: ffff88802ec8e700 R14: ffff88802ec8db80 R15: 0000000000000002
FS: 00007fe6ca5e26c0(0000) GS:ffff8881257f5000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f204ee2b490 CR3: 0000000036b10000 CR4: 00000000003526f0
Call Trace:
mark_usage kernel/locking/lockdep.c:4674 [inline]
__lock_acquire+0x6b5/0x2cf0 kernel/locking/lockdep.c:5191
lock_acquire+0x106/0x330 kernel/locking/lockdep.c:5868
rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
rcu_read_lock include/linux/rcupdate.h:867 [inline]
class_rcu_constructor include/linux/rcupdate.h:1195 [inline]
unwind_next_frame+0xc2/0x23c0 arch/x86/kernel/unwind_orc.c:495
arch_stack_walk+0x11b/0x150 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0xa9/0x100 kernel/stacktrace.c:122
save_stack+0x122/0x230 mm/page_owner.c:165
__set_page_owner+0x8d/0x4c0 mm/page_owner.c:341
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x228/0x280 mm/page_alloc.c:1884
prep_new_page mm/page_alloc.c:1892 [inline]
get_page_from_freelist+0x24dc/0x2580 mm/page_alloc.c:3945
__alloc_frozen_pages_noprof+0x18d/0x380 mm/page_alloc.c:5240
__alloc_pages_noprof mm/page_alloc.c:5274 [inline]
alloc_pages_bulk_noprof+0x558/0x700 mm/page_alloc.c:5194
___alloc_pages_bulk mm/kasan/shadow.c:345 [inline]
__kasan_populate_vmalloc_do mm/kasan/shadow.c:370 [inline]
__kasan_populate_vmalloc+0xc1/0x1d0 mm/kasan/shadow.c:424
kasan_populate_vmalloc include/linux/kasan.h:580 [inline]
alloc_vmap_area+0xdbc/0x14a0 mm/vmalloc.c:2124
__get_vm_area_node+0x1f8/0x300 mm/vmalloc.c:3219
get_vm_area_caller mm/vmalloc.c:3270 [inline]
vmap+0x162/0x310 mm/vmalloc.c:3542
relay_alloc_buf kernel/relay.c:127 [inline]
relay_create_buf kernel/relay.c:162 [inline]
relay_open_buf+0x3d4/0xe70 kernel/relay.c:390
relay_open+0x427/0x920 kernel/relay.c:519
blk_trace_setup_prepare+0x425/0x5a0 kernel/trace/blktrace.c:716
blk_trace_setup+0x2c0/0x450 kernel/trace/blktrace.c:789
blk_trace_ioctl+0x380/0x740 kernel/trace/blktrace.c:935
blkdev_ioctl+0x4c1/0x740 block/ioctl.c:781
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:597 [inline]
__se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fe6c986d079
Code: Unable to access opcode bytes at 0x7fe6c986d04f.
RSP: 002b:00007fe6ca5e20b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007fe6c99abf80 RCX: 00007fe6c986d079
RDX: 0000000020000380 RSI: 00000000c0481273 RDI: 0000000000000004
RBP: 00007fe6c98ce498 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007fe6c99abf80 R15: 00007ffe70d85fa8