INFO: task kworker/u4:3:302 blocked for more than 143 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/u4:3 state:D stack:25920 pid: 302 ppid: 2 flags:0x00004000 Workqueue: btrfs-endio-write btrfs_work_helper Call Trace: context_switch kernel/sched/core.c:5049 [inline] __schedule+0x11bb/0x4390 kernel/sched/core.c:6395 schedule+0x11b/0x1e0 kernel/sched/core.c:6478 wait_on_state fs/btrfs/extent_io.c:868 [inline] wait_extent_bit+0x39b/0x4d0 fs/btrfs/extent_io.c:906 lock_extent_bits+0x82/0x110 fs/btrfs/extent_io.c:1469 btrfs_finish_ordered_io+0x5dc/0x1b10 fs/btrfs/inode.c:3108 btrfs_work_helper+0x360/0xb90 fs/btrfs/async-thread.c:325 process_one_work+0x863/0x1000 kernel/workqueue.c:2310 worker_thread+0xaa8/0x12a0 kernel/workqueue.c:2457 kthread+0x436/0x520 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 INFO: task syz.0.15:5062 blocked for more than 143 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.0.15 state:D stack:24016 pid: 5062 ppid: 4975 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:5049 [inline] __schedule+0x11bb/0x4390 kernel/sched/core.c:6395 schedule+0x11b/0x1e0 kernel/sched/core.c:6478 wait_on_state fs/btrfs/extent_io.c:868 [inline] wait_extent_bit+0x39b/0x4d0 fs/btrfs/extent_io.c:906 lock_extent_bits+0x82/0x110 fs/btrfs/extent_io.c:1469 btrfs_page_mkwrite+0x5b1/0xc50 fs/btrfs/inode.c:8976 do_page_mkwrite+0x168/0x3c0 mm/memory.c:2922 wp_page_shared+0x16b/0x6d0 mm/memory.c:3259 handle_pte_fault mm/memory.c:4668 [inline] __handle_mm_fault mm/memory.c:4785 [inline] handle_mm_fault+0x1eca/0x43c0 mm/memory.c:4883 do_user_addr_fault+0x489/0xc80 arch/x86/mm/fault.c:1357 handle_page_fault arch/x86/mm/fault.c:1445 [inline] exc_page_fault+0x60/0x100 arch/x86/mm/fault.c:1501 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:606 RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 arch/x86/lib/copy_user_64.S:92 Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a RSP: 0018:ffffc9000318f6a0 EFLAGS: 00050202 RAX: ffffffff83dadd01 RBX: 0000000000000038 RCX: 0000000000000007 RDX: 0000000000000000 RSI: ffffc9000318f740 RDI: 00000000200003a0 RBP: 0000000000000000 R08: 0000000000000000 R09: fffff52000631eef R10: fffff52000631eef R11: 1ffff92000631ee8 R12: 00007ffffffff000 R13: 00000000200003d8 R14: ffffc9000318f740 R15: 00000000200003a0 copy_user_generic arch/x86/include/asm/uaccess_64.h:37 [inline] raw_copy_to_user arch/x86/include/asm/uaccess_64.h:58 [inline] _copy_to_user+0xf0/0x130 lib/usercopy.c:40 copy_to_user include/linux/uaccess.h:200 [inline] fiemap_fill_next_extent+0x19d/0x360 fs/ioctl.c:144 emit_fiemap_extent fs/btrfs/extent_io.c:5460 [inline] extent_fiemap+0x10ff/0x14f0 fs/btrfs/extent_io.c:5686 btrfs_fiemap+0xc0/0x110 fs/btrfs/inode.c:8599 ioctl_fiemap fs/ioctl.c:219 [inline] do_vfs_ioctl+0x1464/0x1de0 fs/ioctl.c:814 __do_sys_ioctl fs/ioctl.c:872 [inline] __se_sys_ioctl+0x83/0x170 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7fa7cc244ed9 RSP: 002b:00007fa7cb4c3058 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fa7cc40afa0 RCX: 00007fa7cc244ed9 RDX: 0000000020000380 RSI: 00000000c020660b RDI: 0000000000000004 RBP: 00007fa7cc2b8cc8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fa7cc40afa0 R15: 00007ffda38e68f8 Showing all locks held in the system: 1 lock held by khungtaskd/27: #0: ffffffff8c11c660 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 2 locks held by kworker/u4:3/302: #0: ffff888075f73938 ((wq_completion)btrfs-endio-write){+.+.}-{0:0}, at: process_one_work+0x760/0x1000 kernel/workqueue.c:-1 #1: ffffc900031cfd00 ((work_completion)(&work->normal_work)){+.+.}-{0:0}, at: process_one_work+0x7a3/0x1000 kernel/workqueue.c:2285 2 locks held by kworker/0:2/1111: #0: ffff8880b903a358 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 kernel/sched/core.c:475 #1: ffff8880b9027888 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x495/0x810 kernel/sched/psi.c:882 2 locks held by getty/3952: #0: ffff88802be5f098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 drivers/tty/tty_ldisc.c:252 #1: ffffc900021ce2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x5ba/0x1a30 drivers/tty/n_tty.c:2158 3 locks held by syz.0.15/5062: #0: ffff88802a73e328 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:136 [inline] #0: ffff88802a73e328 (&mm->mmap_lock){++++}-{3:3}, at: do_user_addr_fault+0x2b9/0xc80 arch/x86/mm/fault.c:1298 #1: ffff88807e6ec558 (sb_pagefaults#2){.+.+}-{0:0}, at: do_page_mkwrite+0x168/0x3c0 mm/memory.c:2922 #2: ffff8880606d0498 (&ei->i_mmap_lock){.+.+}-{3:3}, at: btrfs_page_mkwrite+0x461/0xc50 fs/btrfs/inode.c:8965 2 locks held by udevd/5097: #0: ffff88801ff5bd18 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_put+0xf9/0x7d0 block/bdev.c:915 #1: ffff888147646468 (&lo->lo_mutex){+.+.}-{3:3}, at: __loop_clr_fd+0xaa/0xb90 drivers/block/loop.c:1366 1 lock held by syz.1.499/6093: #0: ffff88801ff5bd18 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x157/0xa60 block/bdev.c:820 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 27 Comm: khungtaskd Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Call Trace: dump_stack_lvl+0x168/0x230 lib/dump_stack.c:106 nmi_cpu_backtrace+0x397/0x3d0 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x163/0x280 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:148 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:212 [inline] watchdog+0xe0f/0xe50 kernel/hung_task.c:369 kthread+0x436/0x520 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 423 Comm: kworker/u4:4 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Workqueue: phy10 ieee80211_iface_work RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:202 Code: 66 2e 0f 1f 84 00 00 00 00 00 53 48 89 fb e8 17 00 00 00 48 8b 3d 90 cd f1 0b 48 89 de 5b e9 47 9e 43 00 00 00 cc cc 00 00 cc <48> 8b 04 24 65 48 8b 0d 64 a5 8a 7e 65 8b 15 65 a5 8a 7e 81 e2 00 RSP: 0018:ffffc9000361f8f0 EFLAGS: 00000206 RAX: ffffffff893f9c8a RBX: 0000000000000005 RCX: ffff88801e8ed940 RDX: 0000000000000000 RSI: 000000000000000a RDI: 000000000000005a RBP: 000000000000005a R08: dffffc0000000000 R09: fffffbfff1ad32b6 R10: fffffbfff1ad32b6 R11: 1ffffffff1ad32b5 R12: 000000000000000b R13: 000000000000000a R14: dffffc0000000000 R15: ffff88807bfd3350 FS: 0000000000000000(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f44a18be000 CR3: 0000000072aec000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ieee80211_sta_get_rates+0x422/0x6b0 net/mac80211/util.c:2137 ieee80211_update_sta_info net/mac80211/ibss.c:1007 [inline] ieee80211_rx_bss_info net/mac80211/ibss.c:1121 [inline] ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1614 [inline] ieee80211_ibss_rx_queued_mgmt+0xf47/0x29c0 net/mac80211/ibss.c:1643 ieee80211_iface_process_skb net/mac80211/iface.c:1459 [inline] ieee80211_iface_work+0x70e/0xc60 net/mac80211/iface.c:1513 process_one_work+0x863/0x1000 kernel/workqueue.c:2310 worker_thread+0xaa8/0x12a0 kernel/workqueue.c:2457 kthread+0x436/0x520 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287