INFO: task kworker/u4:3:302 blocked for more than 143 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/u4:3 state:D stack:25920 pid: 302 ppid: 2 flags:0x00004000
Workqueue: btrfs-endio-write btrfs_work_helper
Call Trace:
context_switch kernel/sched/core.c:5049 [inline]
__schedule+0x11bb/0x4390 kernel/sched/core.c:6395
schedule+0x11b/0x1e0 kernel/sched/core.c:6478
wait_on_state fs/btrfs/extent_io.c:868 [inline]
wait_extent_bit+0x39b/0x4d0 fs/btrfs/extent_io.c:906
lock_extent_bits+0x82/0x110 fs/btrfs/extent_io.c:1469
btrfs_finish_ordered_io+0x5dc/0x1b10 fs/btrfs/inode.c:3108
btrfs_work_helper+0x360/0xb90 fs/btrfs/async-thread.c:325
process_one_work+0x863/0x1000 kernel/workqueue.c:2310
worker_thread+0xaa8/0x12a0 kernel/workqueue.c:2457
kthread+0x436/0x520 kernel/kthread.c:334
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
INFO: task syz.0.15:5062 blocked for more than 143 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.0.15 state:D stack:24016 pid: 5062 ppid: 4975 flags:0x00004004
Call Trace:
context_switch kernel/sched/core.c:5049 [inline]
__schedule+0x11bb/0x4390 kernel/sched/core.c:6395
schedule+0x11b/0x1e0 kernel/sched/core.c:6478
wait_on_state fs/btrfs/extent_io.c:868 [inline]
wait_extent_bit+0x39b/0x4d0 fs/btrfs/extent_io.c:906
lock_extent_bits+0x82/0x110 fs/btrfs/extent_io.c:1469
btrfs_page_mkwrite+0x5b1/0xc50 fs/btrfs/inode.c:8976
do_page_mkwrite+0x168/0x3c0 mm/memory.c:2922
wp_page_shared+0x16b/0x6d0 mm/memory.c:3259
handle_pte_fault mm/memory.c:4668 [inline]
__handle_mm_fault mm/memory.c:4785 [inline]
handle_mm_fault+0x1eca/0x43c0 mm/memory.c:4883
do_user_addr_fault+0x489/0xc80 arch/x86/mm/fault.c:1357
handle_page_fault arch/x86/mm/fault.c:1445 [inline]
exc_page_fault+0x60/0x100 arch/x86/mm/fault.c:1501
asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:606
RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 arch/x86/lib/copy_user_64.S:92
Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a
RSP: 0018:ffffc9000318f6a0 EFLAGS: 00050202
RAX: ffffffff83dadd01 RBX: 0000000000000038 RCX: 0000000000000007
RDX: 0000000000000000 RSI: ffffc9000318f740 RDI: 00000000200003a0
RBP: 0000000000000000 R08: 0000000000000000 R09: fffff52000631eef
R10: fffff52000631eef R11: 1ffff92000631ee8 R12: 00007ffffffff000
R13: 00000000200003d8 R14: ffffc9000318f740 R15: 00000000200003a0
copy_user_generic arch/x86/include/asm/uaccess_64.h:37 [inline]
raw_copy_to_user arch/x86/include/asm/uaccess_64.h:58 [inline]
_copy_to_user+0xf0/0x130 lib/usercopy.c:40
copy_to_user include/linux/uaccess.h:200 [inline]
fiemap_fill_next_extent+0x19d/0x360 fs/ioctl.c:144
emit_fiemap_extent fs/btrfs/extent_io.c:5460 [inline]
extent_fiemap+0x10ff/0x14f0 fs/btrfs/extent_io.c:5686
btrfs_fiemap+0xc0/0x110 fs/btrfs/inode.c:8599
ioctl_fiemap fs/ioctl.c:219 [inline]
do_vfs_ioctl+0x1464/0x1de0 fs/ioctl.c:814
__do_sys_ioctl fs/ioctl.c:872 [inline]
__se_sys_ioctl+0x83/0x170 fs/ioctl.c:860
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7fa7cc244ed9
RSP: 002b:00007fa7cb4c3058 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007fa7cc40afa0 RCX: 00007fa7cc244ed9
RDX: 0000000020000380 RSI: 00000000c020660b RDI: 0000000000000004
RBP: 00007fa7cc2b8cc8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007fa7cc40afa0 R15: 00007ffda38e68f8
Showing all locks held in the system:
1 lock held by khungtaskd/27:
#0: ffffffff8c11c660 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30
2 locks held by kworker/u4:3/302:
#0: ffff888075f73938 ((wq_completion)btrfs-endio-write){+.+.}-{0:0}, at: process_one_work+0x760/0x1000 kernel/workqueue.c:-1
#1: ffffc900031cfd00 ((work_completion)(&work->normal_work)){+.+.}-{0:0}, at: process_one_work+0x7a3/0x1000 kernel/workqueue.c:2285
2 locks held by kworker/0:2/1111:
#0: ffff8880b903a358 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 kernel/sched/core.c:475
#1: ffff8880b9027888 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x495/0x810 kernel/sched/psi.c:882
2 locks held by getty/3952:
#0: ffff88802be5f098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 drivers/tty/tty_ldisc.c:252
#1: ffffc900021ce2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x5ba/0x1a30 drivers/tty/n_tty.c:2158
3 locks held by syz.0.15/5062:
#0: ffff88802a73e328 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:136 [inline]
#0: ffff88802a73e328 (&mm->mmap_lock){++++}-{3:3}, at: do_user_addr_fault+0x2b9/0xc80 arch/x86/mm/fault.c:1298
#1: ffff88807e6ec558 (sb_pagefaults#2){.+.+}-{0:0}, at: do_page_mkwrite+0x168/0x3c0 mm/memory.c:2922
#2: ffff8880606d0498 (&ei->i_mmap_lock){.+.+}-{3:3}, at: btrfs_page_mkwrite+0x461/0xc50 fs/btrfs/inode.c:8965
2 locks held by udevd/5097:
#0: ffff88801ff5bd18 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_put+0xf9/0x7d0 block/bdev.c:915
#1: ffff888147646468 (&lo->lo_mutex){+.+.}-{3:3}, at: __loop_clr_fd+0xaa/0xb90 drivers/block/loop.c:1366
1 lock held by syz.1.499/6093:
#0: ffff88801ff5bd18 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x157/0xa60 block/bdev.c:820
=============================================
NMI backtrace for cpu 0
CPU: 0 PID: 27 Comm: khungtaskd Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
Call Trace:
dump_stack_lvl+0x168/0x230 lib/dump_stack.c:106
nmi_cpu_backtrace+0x397/0x3d0 lib/nmi_backtrace.c:111
nmi_trigger_cpumask_backtrace+0x163/0x280 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:148 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:212 [inline]
watchdog+0xe0f/0xe50 kernel/hung_task.c:369
kthread+0x436/0x520 kernel/kthread.c:334
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 423 Comm: kworker/u4:4 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
Workqueue: phy10 ieee80211_iface_work
RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:202
Code: 66 2e 0f 1f 84 00 00 00 00 00 53 48 89 fb e8 17 00 00 00 48 8b 3d 90 cd f1 0b 48 89 de 5b e9 47 9e 43 00 00 00 cc cc 00 00 cc <48> 8b 04 24 65 48 8b 0d 64 a5 8a 7e 65 8b 15 65 a5 8a 7e 81 e2 00
RSP: 0018:ffffc9000361f8f0 EFLAGS: 00000206
RAX: ffffffff893f9c8a RBX: 0000000000000005 RCX: ffff88801e8ed940
RDX: 0000000000000000 RSI: 000000000000000a RDI: 000000000000005a
RBP: 000000000000005a R08: dffffc0000000000 R09: fffffbfff1ad32b6
R10: fffffbfff1ad32b6 R11: 1ffffffff1ad32b5 R12: 000000000000000b
R13: 000000000000000a R14: dffffc0000000000 R15: ffff88807bfd3350
FS: 0000000000000000(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f44a18be000 CR3: 0000000072aec000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ieee80211_sta_get_rates+0x422/0x6b0 net/mac80211/util.c:2137
ieee80211_update_sta_info net/mac80211/ibss.c:1007 [inline]
ieee80211_rx_bss_info net/mac80211/ibss.c:1121 [inline]
ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1614 [inline]
ieee80211_ibss_rx_queued_mgmt+0xf47/0x29c0 net/mac80211/ibss.c:1643
ieee80211_iface_process_skb net/mac80211/iface.c:1459 [inline]
ieee80211_iface_work+0x70e/0xc60 net/mac80211/iface.c:1513
process_one_work+0x863/0x1000 kernel/workqueue.c:2310
worker_thread+0xaa8/0x12a0 kernel/workqueue.c:2457
kthread+0x436/0x520 kernel/kthread.c:334
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287