INFO: task syz.0.683:7605 blocked for more than 430 seconds. Not tainted 6.12.0-rc1-syzkaller-00010-gc05ad457ce8c #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.0.683 state:D stack:0 pid:7605 tgid:7604 ppid:5405 flags:0x00000004 Call Trace: [] context_switch kernel/sched/core.c:5315 [inline] [] __schedule+0xd5a/0x3886 kernel/sched/core.c:6675 [] __schedule_loop kernel/sched/core.c:6752 [inline] [] schedule+0xc4/0x324 kernel/sched/core.c:6767 [] schedule_preempt_disabled+0x16/0x28 kernel/sched/core.c:6824 [] rwsem_down_read_slowpath+0x56a/0x91e kernel/locking/rwsem.c:1084 [] __down_read_common kernel/locking/rwsem.c:1248 [inline] [] __down_read kernel/locking/rwsem.c:1261 [inline] [] down_read+0xe4/0x460 kernel/locking/rwsem.c:1526 [] filemap_invalidate_lock_shared include/linux/fs.h:870 [inline] [] page_cache_ra_unbounded+0xe8/0x528 mm/readahead.c:226 [] do_page_cache_ra mm/readahead.c:320 [inline] [] force_page_cache_ra+0x1f8/0x2f4 mm/readahead.c:349 [] force_page_cache_readahead mm/internal.h:357 [inline] [] generic_fadvise+0x480/0x5d8 mm/fadvise.c:106 [] vfs_fadvise+0xa2/0xba mm/fadvise.c:185 [] ksys_readahead+0x17a/0x1e6 mm/readahead.c:695 [] __do_sys_readahead mm/readahead.c:703 [inline] [] __se_sys_readahead mm/readahead.c:701 [inline] [] __riscv_sys_readahead+0x6e/0xa0 mm/readahead.c:701 [] syscall_handler+0x94/0x118 arch/riscv/include/asm/syscall.h:90 [] do_trap_ecall_u+0x1aa/0x216 arch/riscv/kernel/traps.c:331 [] _new_vmalloc_restore_context_a0+0xc2/0xce Showing all locks held in the system: 1 lock held by khungtaskd/37: #0: ffffffff87fcc100 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x68/0x2d6 kernel/locking/lockdep.c:6716 2 locks held by getty/3149: #0: ff6000001c63f0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3a/0x46 drivers/tty/tty_ldsem.c:340 #1: ff2000000008b2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xd7c/0x129a drivers/tty/n_tty.c:2211 1 lock held by sshd/3174: 2 locks held by kworker/u10:4/5402: #0: ff60000011071148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x848/0x1dae kernel/workqueue.c:3204 #1: ff200000042d7c90 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x870/0x1dae kernel/workqueue.c:3204 1 lock held by syz.1.608/7054: 2 locks held by kworker/u10:7/7154: 1 lock held by syz.0.683/7605: #0: ff600000155214c8 (mapping.invalidate_lock#2){++++}-{3:3}, at: filemap_invalidate_lock_shared include/linux/fs.h:870 [inline] #0: ff600000155214c8 (mapping.invalidate_lock#2){++++}-{3:3}, at: page_cache_ra_unbounded+0xe8/0x528 mm/readahead.c:226 1 lock held by syz.0.736/8081: #0: ff600000155214c8 (mapping.invalidate_lock#2){++++}-{3:3}, at: filemap_invalidate_lock include/linux/fs.h:860 [inline] #0: ff600000155214c8 (mapping.invalidate_lock#2){++++}-{3:3}, at: blkdev_fallocate+0x1ac/0x30a block/fops.c:808 4 locks held by modprobe/8477: ============================================= NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 37 Comm: khungtaskd Not tainted 6.12.0-rc1-syzkaller-00010-gc05ad457ce8c #0 Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:130 [] show_stack+0x34/0x40 arch/riscv/kernel/stacktrace.c:136 [] __dump_stack lib/dump_stack.c:94 [inline] [] dump_stack_lvl+0x122/0x196 lib/dump_stack.c:120 [] dump_stack+0x1c/0x24 lib/dump_stack.c:129 [] nmi_cpu_backtrace+0x39c/0x39e lib/nmi_backtrace.c:113 [] nmi_trigger_cpumask_backtrace+0x2b6/0x456 lib/nmi_backtrace.c:62 [] arch_trigger_cpumask_backtrace+0x2c/0x3c arch/riscv/kernel/smp.c:347 [] trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline] [] check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline] [] watchdog+0xcfa/0x1178 kernel/hung_task.c:379 [] kthread+0x28c/0x3a6 kernel/kthread.c:389 [] ret_from_fork+0xe/0x18 arch/riscv/kernel/entry.S:326 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2995 Comm: syslogd Not tainted 6.12.0-rc1-syzkaller-00010-gc05ad457ce8c #0 Hardware name: riscv-virtio,qemu (DT) epc : __sanitizer_cov_trace_const_cmp8+0x0/0x1c kernel/kcov.c:320 ra : fp_is_valid arch/riscv/kernel/stacktrace.c:28 [inline] ra : walk_stackframe+0x144/0x452 arch/riscv/kernel/stacktrace.c:60 epc : ffffffff80430aea ra : ffffffff800104d8 sp : ff20000007107330 gp : ffffffff897bea80 tp : ff60000014f10000 t0 : ff20000007107680 t1 : fffffffef214ca02 t2 : 0000000000000001 s0 : ff200000071073b0 s1 : ff20000007107a00 a0 : 0000000000000000 a1 : 0000000000000000 a2 : 0000000000000002 a3 : ffffffff800104c8 a4 : 0000000000000000 a5 : ff60000014f11000 a6 : 0000000000000003 a7 : 1fec0000029e2168 s2 : 0000000000000000 s3 : 000000000000000a s4 : ff20000007107820 s5 : 0000000000000000 s6 : ffffffff85709b52 s7 : dfffffff00000000 s8 : dfffffff00000000 s9 : ffffffff85ffc980 s10: 0000000000007fff s11: ff20000007107a00 t3 : 1fec0000029e2163 t4 : fffffffef214ca02 t5 : fffffffef214ca03 t6 : 1fec0000029e216d status: 0000000200000120 badaddr: 0000000000000000 cause: 8000000000000001 [] __sanitizer_cov_trace_const_cmp8+0x0/0x1c kernel/kcov.c:316 [] arch_stack_walk+0x1c/0x24 arch/riscv/kernel/stacktrace.c:163 [] stack_trace_save+0xa0/0xd2 kernel/stacktrace.c:122 [] kasan_save_stack+0x3e/0x6a mm/kasan/common.c:47 [] kasan_save_track+0x16/0x28 mm/kasan/common.c:68 [] kasan_save_free_info+0x40/0x5a mm/kasan/generic.c:579 [] poison_slab_object mm/kasan/common.c:247 [inline] [] __kasan_slab_free+0x4e/0x68 mm/kasan/common.c:264 [] kasan_slab_free include/linux/kasan.h:230 [inline] [] slab_free_hook mm/slub.c:2343 [inline] [] slab_free mm/slub.c:4580 [inline] [] kmem_cache_free+0x244/0x5f4 mm/slub.c:4682 [] kfree_skbmem+0x1b4/0x1ee net/core/skbuff.c:1148 [] __kfree_skb net/core/skbuff.c:1205 [inline] [] consume_skb net/core/skbuff.c:1436 [inline] [] consume_skb+0xd8/0xfa net/core/skbuff.c:1430 [] skb_free_datagram+0x1a/0x24 net/core/datagram.c:323 [] __unix_dgram_recvmsg+0x7fc/0xe60 net/unix/af_unix.c:2520 [] unix_dgram_recvmsg+0xc8/0xea net/unix/af_unix.c:2537 [] sock_recvmsg_nosec net/socket.c:1051 [inline] [] sock_recvmsg+0xd6/0x142 net/socket.c:1073 [] sock_read_iter+0x2be/0x38e net/socket.c:1143 [] new_sync_read fs/read_write.c:488 [inline] [] vfs_read+0x7b6/0x86c fs/read_write.c:569 [] ksys_read+0x1f0/0x266 fs/read_write.c:712 [] __do_sys_read fs/read_write.c:722 [inline] [] __se_sys_read fs/read_write.c:720 [inline] [] __riscv_sys_read+0x6e/0x94 fs/read_write.c:720 [] syscall_handler+0x94/0x118 arch/riscv/include/asm/syscall.h:90 [] do_trap_ecall_u+0x1aa/0x216 arch/riscv/kernel/traps.c:331 [] _new_vmalloc_restore_context_a0+0xc2/0xce