INFO: task syz-executor.0:13679 blocked for more than 143 seconds.
Not tainted 6.2.0-rc3-next-20230109-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.0 state:D
stack:27872 pid:13679 ppid:5116 flags:0x00000004
Call Trace:
context_switch kernel/sched/core.c:5252 [inline]
__schedule+0x25d0/0x5a70 kernel/sched/core.c:6570
schedule+0xde/0x1b0 kernel/sched/core.c:6646
rwsem_down_read_slowpath+0x5a7/0xb20 kernel/locking/rwsem.c:1095
__down_read_common kernel/locking/rwsem.c:1260 [inline]
__down_read kernel/locking/rwsem.c:1269 [inline]
down_read+0xe6/0x450 kernel/locking/rwsem.c:1511
mmap_read_lock include/linux/mmap_lock.h:117 [inline]
do_user_addr_fault+0xa51/0x1210 arch/x86/mm/fault.c:1379
handle_page_fault arch/x86/mm/fault.c:1519 [inline]
exc_page_fault+0x98/0x170 arch/x86/mm/fault.c:1575
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570
RIP: 0033:0x7f9f9fc276c6
RSP: 002b:00007fff5f64dcf8 EFLAGS: 00010287
RAX: 0000001b33022000 RBX: 00007f9f9fdac018 RCX: 0000001b33020000
RDX: 0000001b33022004 RSI: 0000001b3302157c RDI: 00000000a23d7945
RBP: 00000000a23d7945 R08: 0000001b33420000 R09: 00000000a23d7949
R10: 00007fff5f792090 R11: 00000000000205ce R12: 00007f9f9fda0000
R13: 0000000000000001 R14: 0000000000008d9c R15: ffffffff8166960a
Showing all threads with locks held in the system:
task:rcu_tasks_kthre state:I stack:29056 pid:12 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5252 [inline]
__schedule+0x25d0/0x5a70 kernel/sched/core.c:6570
schedule+0xde/0x1b0 kernel/sched/core.c:6646
rcu_tasks_one_gp+0x484/0xcd0 kernel/rcu/tasks.h:517
rcu_tasks_kthread+0x77/0xa0 kernel/rcu/tasks.h:555
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
1 lock held by rcu_tasks_kthre/12:
#0: ffffffff8c7929f0
(
rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x31/0xcd0 kernel/rcu/tasks.h:510
task:rcu_tasks_trace state:I stack:29224 pid:13 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5252 [inline]
__schedule+0x25d0/0x5a70 kernel/sched/core.c:6570
schedule+0xde/0x1b0 kernel/sched/core.c:6646
rcu_tasks_one_gp+0x484/0xcd0 kernel/rcu/tasks.h:517
rcu_tasks_kthread+0x77/0xa0 kernel/rcu/tasks.h:555
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
1 lock held by rcu_tasks_trace/13:
#0: ffffffff8c7926f0 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x31/0xcd0 kernel/rcu/tasks.h:510
task:getty state:S stack:23336 pid:4751 ppid:1 flags:0x00000000
Call Trace:
context_switch kernel/sched/core.c:5252 [inline]
__schedule+0x25d0/0x5a70 kernel/sched/core.c:6570
schedule+0xde/0x1b0 kernel/sched/core.c:6646
schedule_timeout+0x1e1/0x2a0 kernel/time/timer.c:2143
wait_woken+0x197/0x200 kernel/sched/wait.c:463
n_tty_read+0x1055/0x13e0 drivers/tty/n_tty.c:2243
iterate_tty_read drivers/tty/tty_io.c:852 [inline]
tty_read+0x30e/0x5a0 drivers/tty/tty_io.c:927
call_read_iter include/linux/fs.h:2185 [inline]
new_sync_read fs/read_write.c:389 [inline]
vfs_read+0x681/0x930 fs/read_write.c:470
ksys_read+0x12b/0x250 fs/read_write.c:613
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f3b8cbaf8fe
RSP: 002b:00007ffecffe22a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 0000556eb3a5c910 RCX: 00007f3b8cbaf8fe
RDX: 0000000000000001 RSI: 00007ffecffe22c0 RDI: 0000000000000000
RBP: 0000556eb3a5c970 R08: 0000000000000007 R09: 0000556eb3a5dcd0
R10: 0000000000000063 R11: 0000000000000246 R12: 0000556eb3a5c9ac
R13: 00007ffecffe22c0 R14: 0000000000000000 R15: 0000556eb3a5c9ac
2 locks held by getty/4751:
#0:
ffff888027b6c098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x26/0x80 drivers/tty/tty_ldisc.c:244
#1: ffffc900015902f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xef4/0x13e0 drivers/tty/n_tty.c:2177
task:kworker/u4:0 state:R running task stack:26320 pid:5101 ppid:2 flags:0x00004000
Workqueue: 0x0 (bat_events)
Call Trace:
no locks held by kworker/u4:0/5101.
task:syz-executor.0 state:D stack:27872 pid:13679 ppid:5116 flags:0x00000004
Call Trace:
context_switch kernel/sched/core.c:5252 [inline]
__schedule+0x25d0/0x5a70 kernel/sched/core.c:6570
schedule+0xde/0x1b0 kernel/sched/core.c:6646
rwsem_down_read_slowpath+0x5a7/0xb20 kernel/locking/rwsem.c:1095
__down_read_common kernel/locking/rwsem.c:1260 [inline]
__down_read kernel/locking/rwsem.c:1269 [inline]
down_read+0xe6/0x450 kernel/locking/rwsem.c:1511
mmap_read_lock include/linux/mmap_lock.h:117 [inline]
do_user_addr_fault+0xa51/0x1210 arch/x86/mm/fault.c:1379
handle_page_fault arch/x86/mm/fault.c:1519 [inline]
exc_page_fault+0x98/0x170 arch/x86/mm/fault.c:1575
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570
RIP: 0033:0x7f9f9fc276c6
RSP: 002b:00007fff5f64dcf8 EFLAGS: 00010287
RAX: 0000001b33022000 RBX: 00007f9f9fdac018 RCX: 0000001b33020000
RDX: 0000001b33022004 RSI: 0000001b3302157c RDI: 00000000a23d7945
RBP: 00000000a23d7945 R08: 0000001b33420000 R09: 00000000a23d7949
R10: 00007fff5f792090 R11: 00000000000205ce R12: 00007f9f9fda0000
R13: 0000000000000001 R14: 0000000000008d9c R15: ffffffff8166960a
1 lock held by syz-executor.0/13679:
#0:
ffff888026331c98 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_lock include/linux/mmap_lock.h:117 [inline]
ffff888026331c98 (&mm->mmap_lock){++++}-{3:3}, at: do_user_addr_fault+0xa51/0x1210 arch/x86/mm/fault.c:1379
task:syz-executor.0 state:R running task stack:26944 pid:13681 ppid:5116 flags:0x00004006
Call Trace:
1 lock held by syz-executor.0/13681:
task:syz-executor.4 state:D stack:28112 pid:16302 ppid:5134 flags:0x00000004
Call Trace:
context_switch kernel/sched/core.c:5252 [inline]
__schedule+0x25d0/0x5a70 kernel/sched/core.c:6570
schedule+0xde/0x1b0 kernel/sched/core.c:6646
rwsem_down_read_slowpath+0x5a7/0xb20 kernel/locking/rwsem.c:1095
__down_read_common kernel/locking/rwsem.c:1260 [inline]
__down_read kernel/locking/rwsem.c:1269 [inline]
down_read+0xe6/0x450 kernel/locking/rwsem.c:1511
mmap_read_lock include/linux/mmap_lock.h:117 [inline]
do_user_addr_fault+0xa51/0x1210 arch/x86/mm/fault.c:1379
handle_page_fault arch/x86/mm/fault.c:1519 [inline]
exc_page_fault+0x98/0x170 arch/x86/mm/fault.c:1575
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570
RIP: 0033:0x7fc7b54276c6
RSP: 002b:00007ffcdd0941f8 EFLAGS: 00010287
RAX: 0000001b33722000 RBX: 00007fc7b55ac018 RCX: 0000001b33720000
RDX: 0000001b33722004 RSI: 0000001b33721690 RDI: 00000000c8117f22
RBP: 00000000c8117f22 R08: 0000001b33b20000 R09: 00000000c8117f26
R10: 00007ffcdd1db090 R11: 0000000000025294 R12: 00007fc7b55a0000
R13: 0000000000000001 R14: 0000000000002882 R15: ffffffff84793640
1 lock held by syz-executor.4/16302:
#0: ffff888028c5f698 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_lock include/linux/mmap_lock.h:117 [inline]
#0: ffff888028c5f698 (&mm->mmap_lock){++++}-{3:3}, at: do_user_addr_fault+0xa51/0x1210 arch/x86/mm/fault.c:1379
task:syz-executor.4 state:R running task stack:26944 pid:16306 ppid:5134 flags:0x00004006
Call Trace:
context_switch kernel/sched/core.c:5252 [inline]
__schedule+0x25d0/0x5a70 kernel/sched/core.c:6570
preempt_schedule_irq+0x52/0xa0 kernel/sched/core.c:6882
irqentry_exit+0x35/0x80 kernel/entry/common.c:433
asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:654
RIP: 0010:dump_stack_lvl+0x130/0x138 lib/dump_stack.c:108
Code: Unable to access opcode bytes at 0x20ffafd6.
RSP: 20ffb000:ffffffff8a03323a EFLAGS: 20ffb000
ORIG_RAX: ffff888028c5f548
RAX: 00000000ffffffff RBX: 0000000000000000 RCX: ffff888000000000
RDX: 0000000000000309 RSI: 0000000000000003 RDI: ffff888028c5f500
RBP: ffffffff8a032d52 R08: d9986d9f9f47a200 R09: ffff888079380000
R10: ffff888000000002 R11: ffff888028c5f500 R12: ffff88807dda8800
R13: ffff88807dda88b0 R14: 0000000000000002 R15: 000000000000000a
3 locks held by syz-executor.4/16306:
=============================================
NMI backtrace for cpu 0
CPU: 0 PID: 28 Comm: khungtaskd Not tainted 6.2.0-rc3-next-20230109-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
nmi_cpu_backtrace.cold+0x24/0x18a lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x32f/0x3c0 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:148 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:220 [inline]
watchdog+0xcae/0x1050 kernel/hung_task.c:377
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 16306 Comm: syz-executor.4 Not tainted 6.2.0-rc3-next-20230109-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:io_serial_in+0x87/0xa0 drivers/tty/serial/8250/8250_port.c:461
Code: 95 09 fd 48 8d 7d 40 44 89 e1 48 b8 00 00 00 00 00 fc ff df 48 89 fa d3 e3 48 c1 ea 03 80 3c 02 00 75 16 66 03 5d 40 89 da ec <5b> 0f b6 c0 5d 41 5c c3 e8 4c 7c 57 fd eb a6 e8 a5 7c 57 fd eb e3
RSP: 0018:ffffc900058f7360 EFLAGS: 00000002
RAX: dffffc0000000060 RBX: 00000000000003fd RCX: 0000000000000000
RDX: 00000000000003fd RSI: ffffffff84781770 RDI: ffffffff91eee7c0
RBP: ffffffff91eee780 R08: 0000000000000001 R09: 000000000000001f
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000020 R14: fffffbfff23ddd48 R15: dffffc0000000000
FS: 00007fc7b6189700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c003c55000 CR3: 00000000a0339000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
serial_in drivers/tty/serial/8250/8250.h:118 [inline]
serial_lsr_in drivers/tty/serial/8250/8250.h:140 [inline]
wait_for_lsr+0xd7/0x180 drivers/tty/serial/8250/8250_port.c:2086
serial8250_console_fifo_write drivers/tty/serial/8250/8250_port.c:3357 [inline]
serial8250_console_write+0xccf/0x1010 drivers/tty/serial/8250/8250_port.c:3435
call_console_driver kernel/printk/printk.c:2031 [inline]
console_emit_next_record.constprop.0+0x3d8/0x890 kernel/printk/printk.c:2823
console_flush_all+0x547/0x6e0 kernel/printk/printk.c:2887
console_unlock+0xb8/0x1f0 kernel/printk/printk.c:2964
vprintk_emit+0x1bd/0x600 kernel/printk/printk.c:2357
vprintk+0x84/0xa0 kernel/printk/printk_safe.c:50
_printk+0xbe/0xf1 kernel/printk/printk.c:2378
mt_dump_range+0x62/0x6b lib/maple_tree.c:6706
mt_dump_entry+0x2d/0xf4 lib/maple_tree.c:6712
mt_dump_range64 lib/maple_tree.c:6747 [inline]
mt_dump_node+0x3ec/0x927 lib/maple_tree.c:6829
mt_dump_arange64 lib/maple_tree.c:6792 [inline]
mt_dump_node+0x851/0x927 lib/maple_tree.c:6832
mt_dump.cold+0xf2/0x115 lib/maple_tree.c:6849
mt_find.cold+0x48/0x90 lib/maple_tree.c:6473
find_vma+0x10c/0x1b0 mm/mmap.c:1850
walk_page_range+0x2b1/0x4a0 mm/pagewalk.c:463
mlock_vma_pages_range mm/mlock.c:386 [inline]
mlock_fixup+0x650/0x810 mm/mlock.c:462
apply_vma_lock_flags+0x23d/0x350 mm/mlock.c:506
do_mlock+0x25a/0x6d0 mm/mlock.c:601
__do_sys_mlock mm/mlock.c:615 [inline]
__se_sys_mlock mm/mlock.c:613 [inline]
__x64_sys_mlock+0x59/0x80 mm/mlock.c:613
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fc7b548c0c9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fc7b6189168 EFLAGS: 00000246 ORIG_RAX: 0000000000000095
RAX: ffffffffffffffda RBX: 00007fc7b55abf80 RCX: 00007fc7b548c0c9
RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020ffb000
RBP: 00007fc7b54e7ae9 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffcdd09422f R14: 00007fc7b6189300 R15: 0000000000022000