INFO: task syz-executor.0:13679 blocked for more than 143 seconds. Not tainted 6.2.0-rc3-next-20230109-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.0 state:D stack:27872 pid:13679 ppid:5116 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:5252 [inline] __schedule+0x25d0/0x5a70 kernel/sched/core.c:6570 schedule+0xde/0x1b0 kernel/sched/core.c:6646 rwsem_down_read_slowpath+0x5a7/0xb20 kernel/locking/rwsem.c:1095 __down_read_common kernel/locking/rwsem.c:1260 [inline] __down_read kernel/locking/rwsem.c:1269 [inline] down_read+0xe6/0x450 kernel/locking/rwsem.c:1511 mmap_read_lock include/linux/mmap_lock.h:117 [inline] do_user_addr_fault+0xa51/0x1210 arch/x86/mm/fault.c:1379 handle_page_fault arch/x86/mm/fault.c:1519 [inline] exc_page_fault+0x98/0x170 arch/x86/mm/fault.c:1575 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x7f9f9fc276c6 RSP: 002b:00007fff5f64dcf8 EFLAGS: 00010287 RAX: 0000001b33022000 RBX: 00007f9f9fdac018 RCX: 0000001b33020000 RDX: 0000001b33022004 RSI: 0000001b3302157c RDI: 00000000a23d7945 RBP: 00000000a23d7945 R08: 0000001b33420000 R09: 00000000a23d7949 R10: 00007fff5f792090 R11: 00000000000205ce R12: 00007f9f9fda0000 R13: 0000000000000001 R14: 0000000000008d9c R15: ffffffff8166960a Showing all threads with locks held in the system: task:rcu_tasks_kthre state:I stack:29056 pid:12 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5252 [inline] __schedule+0x25d0/0x5a70 kernel/sched/core.c:6570 schedule+0xde/0x1b0 kernel/sched/core.c:6646 rcu_tasks_one_gp+0x484/0xcd0 kernel/rcu/tasks.h:517 rcu_tasks_kthread+0x77/0xa0 kernel/rcu/tasks.h:555 kthread+0x2e8/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 1 lock held by rcu_tasks_kthre/12: #0: ffffffff8c7929f0 ( rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x31/0xcd0 kernel/rcu/tasks.h:510 task:rcu_tasks_trace state:I stack:29224 pid:13 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5252 [inline] __schedule+0x25d0/0x5a70 kernel/sched/core.c:6570 schedule+0xde/0x1b0 kernel/sched/core.c:6646 rcu_tasks_one_gp+0x484/0xcd0 kernel/rcu/tasks.h:517 rcu_tasks_kthread+0x77/0xa0 kernel/rcu/tasks.h:555 kthread+0x2e8/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 1 lock held by rcu_tasks_trace/13: #0: ffffffff8c7926f0 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x31/0xcd0 kernel/rcu/tasks.h:510 task:getty state:S stack:23336 pid:4751 ppid:1 flags:0x00000000 Call Trace: context_switch kernel/sched/core.c:5252 [inline] __schedule+0x25d0/0x5a70 kernel/sched/core.c:6570 schedule+0xde/0x1b0 kernel/sched/core.c:6646 schedule_timeout+0x1e1/0x2a0 kernel/time/timer.c:2143 wait_woken+0x197/0x200 kernel/sched/wait.c:463 n_tty_read+0x1055/0x13e0 drivers/tty/n_tty.c:2243 iterate_tty_read drivers/tty/tty_io.c:852 [inline] tty_read+0x30e/0x5a0 drivers/tty/tty_io.c:927 call_read_iter include/linux/fs.h:2185 [inline] new_sync_read fs/read_write.c:389 [inline] vfs_read+0x681/0x930 fs/read_write.c:470 ksys_read+0x12b/0x250 fs/read_write.c:613 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f3b8cbaf8fe RSP: 002b:00007ffecffe22a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000556eb3a5c910 RCX: 00007f3b8cbaf8fe RDX: 0000000000000001 RSI: 00007ffecffe22c0 RDI: 0000000000000000 RBP: 0000556eb3a5c970 R08: 0000000000000007 R09: 0000556eb3a5dcd0 R10: 0000000000000063 R11: 0000000000000246 R12: 0000556eb3a5c9ac R13: 00007ffecffe22c0 R14: 0000000000000000 R15: 0000556eb3a5c9ac 2 locks held by getty/4751: #0: ffff888027b6c098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x26/0x80 drivers/tty/tty_ldisc.c:244 #1: ffffc900015902f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xef4/0x13e0 drivers/tty/n_tty.c:2177 task:kworker/u4:0 state:R running task stack:26320 pid:5101 ppid:2 flags:0x00004000 Workqueue: 0x0 (bat_events) Call Trace: no locks held by kworker/u4:0/5101. task:syz-executor.0 state:D stack:27872 pid:13679 ppid:5116 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:5252 [inline] __schedule+0x25d0/0x5a70 kernel/sched/core.c:6570 schedule+0xde/0x1b0 kernel/sched/core.c:6646 rwsem_down_read_slowpath+0x5a7/0xb20 kernel/locking/rwsem.c:1095 __down_read_common kernel/locking/rwsem.c:1260 [inline] __down_read kernel/locking/rwsem.c:1269 [inline] down_read+0xe6/0x450 kernel/locking/rwsem.c:1511 mmap_read_lock include/linux/mmap_lock.h:117 [inline] do_user_addr_fault+0xa51/0x1210 arch/x86/mm/fault.c:1379 handle_page_fault arch/x86/mm/fault.c:1519 [inline] exc_page_fault+0x98/0x170 arch/x86/mm/fault.c:1575 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x7f9f9fc276c6 RSP: 002b:00007fff5f64dcf8 EFLAGS: 00010287 RAX: 0000001b33022000 RBX: 00007f9f9fdac018 RCX: 0000001b33020000 RDX: 0000001b33022004 RSI: 0000001b3302157c RDI: 00000000a23d7945 RBP: 00000000a23d7945 R08: 0000001b33420000 R09: 00000000a23d7949 R10: 00007fff5f792090 R11: 00000000000205ce R12: 00007f9f9fda0000 R13: 0000000000000001 R14: 0000000000008d9c R15: ffffffff8166960a 1 lock held by syz-executor.0/13679: #0: ffff888026331c98 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_lock include/linux/mmap_lock.h:117 [inline] ffff888026331c98 (&mm->mmap_lock){++++}-{3:3}, at: do_user_addr_fault+0xa51/0x1210 arch/x86/mm/fault.c:1379 task:syz-executor.0 state:R running task stack:26944 pid:13681 ppid:5116 flags:0x00004006 Call Trace: 1 lock held by syz-executor.0/13681: task:syz-executor.4 state:D stack:28112 pid:16302 ppid:5134 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:5252 [inline] __schedule+0x25d0/0x5a70 kernel/sched/core.c:6570 schedule+0xde/0x1b0 kernel/sched/core.c:6646 rwsem_down_read_slowpath+0x5a7/0xb20 kernel/locking/rwsem.c:1095 __down_read_common kernel/locking/rwsem.c:1260 [inline] __down_read kernel/locking/rwsem.c:1269 [inline] down_read+0xe6/0x450 kernel/locking/rwsem.c:1511 mmap_read_lock include/linux/mmap_lock.h:117 [inline] do_user_addr_fault+0xa51/0x1210 arch/x86/mm/fault.c:1379 handle_page_fault arch/x86/mm/fault.c:1519 [inline] exc_page_fault+0x98/0x170 arch/x86/mm/fault.c:1575 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x7fc7b54276c6 RSP: 002b:00007ffcdd0941f8 EFLAGS: 00010287 RAX: 0000001b33722000 RBX: 00007fc7b55ac018 RCX: 0000001b33720000 RDX: 0000001b33722004 RSI: 0000001b33721690 RDI: 00000000c8117f22 RBP: 00000000c8117f22 R08: 0000001b33b20000 R09: 00000000c8117f26 R10: 00007ffcdd1db090 R11: 0000000000025294 R12: 00007fc7b55a0000 R13: 0000000000000001 R14: 0000000000002882 R15: ffffffff84793640 1 lock held by syz-executor.4/16302: #0: ffff888028c5f698 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_lock include/linux/mmap_lock.h:117 [inline] #0: ffff888028c5f698 (&mm->mmap_lock){++++}-{3:3}, at: do_user_addr_fault+0xa51/0x1210 arch/x86/mm/fault.c:1379 task:syz-executor.4 state:R running task stack:26944 pid:16306 ppid:5134 flags:0x00004006 Call Trace: context_switch kernel/sched/core.c:5252 [inline] __schedule+0x25d0/0x5a70 kernel/sched/core.c:6570 preempt_schedule_irq+0x52/0xa0 kernel/sched/core.c:6882 irqentry_exit+0x35/0x80 kernel/entry/common.c:433 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:654 RIP: 0010:dump_stack_lvl+0x130/0x138 lib/dump_stack.c:108 Code: Unable to access opcode bytes at 0x20ffafd6. RSP: 20ffb000:ffffffff8a03323a EFLAGS: 20ffb000 ORIG_RAX: ffff888028c5f548 RAX: 00000000ffffffff RBX: 0000000000000000 RCX: ffff888000000000 RDX: 0000000000000309 RSI: 0000000000000003 RDI: ffff888028c5f500 RBP: ffffffff8a032d52 R08: d9986d9f9f47a200 R09: ffff888079380000 R10: ffff888000000002 R11: ffff888028c5f500 R12: ffff88807dda8800 R13: ffff88807dda88b0 R14: 0000000000000002 R15: 000000000000000a 3 locks held by syz-executor.4/16306: ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 28 Comm: khungtaskd Not tainted 6.2.0-rc3-next-20230109-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106 nmi_cpu_backtrace.cold+0x24/0x18a lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x32f/0x3c0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:148 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:220 [inline] watchdog+0xcae/0x1050 kernel/hung_task.c:377 kthread+0x2e8/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 16306 Comm: syz-executor.4 Not tainted 6.2.0-rc3-next-20230109-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:io_serial_in+0x87/0xa0 drivers/tty/serial/8250/8250_port.c:461 Code: 95 09 fd 48 8d 7d 40 44 89 e1 48 b8 00 00 00 00 00 fc ff df 48 89 fa d3 e3 48 c1 ea 03 80 3c 02 00 75 16 66 03 5d 40 89 da ec <5b> 0f b6 c0 5d 41 5c c3 e8 4c 7c 57 fd eb a6 e8 a5 7c 57 fd eb e3 RSP: 0018:ffffc900058f7360 EFLAGS: 00000002 RAX: dffffc0000000060 RBX: 00000000000003fd RCX: 0000000000000000 RDX: 00000000000003fd RSI: ffffffff84781770 RDI: ffffffff91eee7c0 RBP: ffffffff91eee780 R08: 0000000000000001 R09: 000000000000001f R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000020 R14: fffffbfff23ddd48 R15: dffffc0000000000 FS: 00007fc7b6189700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c003c55000 CR3: 00000000a0339000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: serial_in drivers/tty/serial/8250/8250.h:118 [inline] serial_lsr_in drivers/tty/serial/8250/8250.h:140 [inline] wait_for_lsr+0xd7/0x180 drivers/tty/serial/8250/8250_port.c:2086 serial8250_console_fifo_write drivers/tty/serial/8250/8250_port.c:3357 [inline] serial8250_console_write+0xccf/0x1010 drivers/tty/serial/8250/8250_port.c:3435 call_console_driver kernel/printk/printk.c:2031 [inline] console_emit_next_record.constprop.0+0x3d8/0x890 kernel/printk/printk.c:2823 console_flush_all+0x547/0x6e0 kernel/printk/printk.c:2887 console_unlock+0xb8/0x1f0 kernel/printk/printk.c:2964 vprintk_emit+0x1bd/0x600 kernel/printk/printk.c:2357 vprintk+0x84/0xa0 kernel/printk/printk_safe.c:50 _printk+0xbe/0xf1 kernel/printk/printk.c:2378 mt_dump_range+0x62/0x6b lib/maple_tree.c:6706 mt_dump_entry+0x2d/0xf4 lib/maple_tree.c:6712 mt_dump_range64 lib/maple_tree.c:6747 [inline] mt_dump_node+0x3ec/0x927 lib/maple_tree.c:6829 mt_dump_arange64 lib/maple_tree.c:6792 [inline] mt_dump_node+0x851/0x927 lib/maple_tree.c:6832 mt_dump.cold+0xf2/0x115 lib/maple_tree.c:6849 mt_find.cold+0x48/0x90 lib/maple_tree.c:6473 find_vma+0x10c/0x1b0 mm/mmap.c:1850 walk_page_range+0x2b1/0x4a0 mm/pagewalk.c:463 mlock_vma_pages_range mm/mlock.c:386 [inline] mlock_fixup+0x650/0x810 mm/mlock.c:462 apply_vma_lock_flags+0x23d/0x350 mm/mlock.c:506 do_mlock+0x25a/0x6d0 mm/mlock.c:601 __do_sys_mlock mm/mlock.c:615 [inline] __se_sys_mlock mm/mlock.c:613 [inline] __x64_sys_mlock+0x59/0x80 mm/mlock.c:613 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fc7b548c0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fc7b6189168 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 RAX: ffffffffffffffda RBX: 00007fc7b55abf80 RCX: 00007fc7b548c0c9 RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020ffb000 RBP: 00007fc7b54e7ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcdd09422f R14: 00007fc7b6189300 R15: 0000000000022000