INFO: task syz.1.50:4087 blocked for more than 432 seconds. Not tainted 6.12.0-rc1-syzkaller-00012-g5f153a692bac #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.1.50 state:D stack:0 pid:4087 tgid:4086 ppid:3154 flags:0x00000004 Call Trace: [] context_switch kernel/sched/core.c:5315 [inline] [] __schedule+0xd5a/0x3886 kernel/sched/core.c:6675 [] __schedule_loop kernel/sched/core.c:6752 [inline] [] schedule+0xc4/0x324 kernel/sched/core.c:6767 [] schedule_preempt_disabled+0x16/0x28 kernel/sched/core.c:6824 [] __mutex_lock_common kernel/locking/mutex.c:684 [inline] [] __mutex_lock+0x86a/0x1022 kernel/locking/mutex.c:752 [] mutex_lock_nested+0x14/0x1c kernel/locking/mutex.c:804 [] bdev_release+0x12c/0x600 block/bdev.c:1087 [] blkdev_release+0x1a/0x26 block/fops.c:639 [] __fput+0x378/0x9e6 fs/file_table.c:431 [] ____fput+0x1c/0x26 fs/file_table.c:459 [] task_work_run+0x16a/0x25e kernel/task_work.c:228 [] resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] [] exit_to_user_mode_loop kernel/entry/common.c:114 [inline] [] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] [] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] [] syscall_exit_to_user_mode+0x30a/0x31e kernel/entry/common.c:218 [] do_trap_ecall_u+0x86/0x216 arch/riscv/kernel/traps.c:345 [] _new_vmalloc_restore_context_a0+0xc2/0xce INFO: task syz.1.50:4091 blocked for more than 432 seconds. Not tainted 6.12.0-rc1-syzkaller-00012-g5f153a692bac #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.1.50 state:D stack:0 pid:4091 tgid:4086 ppid:3154 flags:0x00000006 Call Trace: [] context_switch kernel/sched/core.c:5315 [inline] [] __schedule+0xd5a/0x3886 kernel/sched/core.c:6675 [] __schedule_loop kernel/sched/core.c:6752 [inline] [] schedule+0xc4/0x324 kernel/sched/core.c:6767 [] io_schedule+0x78/0xd4 kernel/sched/core.c:7552 [] folio_wait_bit_common+0x398/0x944 mm/filemap.c:1309 [] folio_put_wait_locked mm/filemap.c:1473 [inline] [] do_read_cache_folio+0x2c0/0x4d2 mm/filemap.c:3807 [] read_cache_folio+0x4e/0x68 mm/filemap.c:3857 [] read_mapping_folio include/linux/pagemap.h:1011 [inline] [] read_part_sector+0xc0/0x516 block/partitions/core.c:714 [] msdos_partition+0x140/0x25ac block/partitions/msdos.c:592 [] check_partition block/partitions/core.c:138 [inline] [] blk_add_partitions block/partitions/core.c:581 [inline] [] bdev_disk_changed+0x5de/0x139c block/partitions/core.c:685 [] blkdev_get_whole+0x17c/0x514 block/bdev.c:707 [] bdev_open+0x86a/0xfa8 block/bdev.c:916 [] blkdev_open+0x334/0x3f0 block/fops.c:631 [] do_dentry_open+0x5d0/0x10a2 fs/open.c:958 [] vfs_open+0xbe/0x37a fs/open.c:1088 [] do_open fs/namei.c:3774 [inline] [] path_openat+0x1b70/0x28c2 fs/namei.c:3933 [] do_filp_open+0x172/0x328 fs/namei.c:3960 [] do_sys_openat2+0x174/0x1ca fs/open.c:1415 [] do_sys_open fs/open.c:1430 [inline] [] __do_sys_openat fs/open.c:1446 [inline] [] __se_sys_openat fs/open.c:1441 [inline] [] __riscv_sys_openat+0x178/0x1fe fs/open.c:1441 [] syscall_handler+0x94/0x118 arch/riscv/include/asm/syscall.h:90 [] do_trap_ecall_u+0x1aa/0x216 arch/riscv/kernel/traps.c:331 [] _new_vmalloc_restore_context_a0+0xc2/0xce Showing all locks held in the system: 1 lock held by khungtaskd/36: #0: ffffffff87fcc100 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x68/0x2d6 kernel/locking/lockdep.c:6716 3 locks held by kworker/0:2/901: 1 lock held by klogd/2970: 2 locks held by getty/3123: #0: ff600000186470a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3a/0x46 drivers/tty/tty_ldsem.c:340 #1: ff2000000008b2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xd7c/0x129a drivers/tty/n_tty.c:2211 2 locks held by syz-executor/3147: 2 locks held by kworker/u10:0/3341: #0: ff60000011071148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x848/0x1dae kernel/workqueue.c:3204 #1: ff2000000bf67c90 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x870/0x1dae kernel/workqueue.c:3204 1 lock held by syz.1.50/4087: #0: ff60000019ac24c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x12c/0x600 block/bdev.c:1087 1 lock held by syz.1.50/4091: #0: ff60000019ac24c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x672/0xfa8 block/bdev.c:904 1 lock held by syz.0.128/4738: 1 lock held by modprobe/5182: 2 locks held by syz.2.166/5183: ============================================= NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 36 Comm: khungtaskd Not tainted 6.12.0-rc1-syzkaller-00012-g5f153a692bac #0 Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:130 [] show_stack+0x34/0x40 arch/riscv/kernel/stacktrace.c:136 [] __dump_stack lib/dump_stack.c:94 [inline] [] dump_stack_lvl+0x122/0x196 lib/dump_stack.c:120 [] dump_stack+0x1c/0x24 lib/dump_stack.c:129 [] nmi_cpu_backtrace+0x39c/0x39e lib/nmi_backtrace.c:113 [] nmi_trigger_cpumask_backtrace+0x2b6/0x456 lib/nmi_backtrace.c:62 [] arch_trigger_cpumask_backtrace+0x2c/0x3c arch/riscv/kernel/smp.c:347 [] trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline] [] check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline] [] watchdog+0xcfa/0x1178 kernel/hung_task.c:379 [] kthread+0x28c/0x3a6 kernel/kthread.c:389 [] ret_from_fork+0xe/0x18 arch/riscv/kernel/entry.S:326 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 4738 Comm: syz.0.128 Not tainted 6.12.0-rc1-syzkaller-00012-g5f153a692bac #0 Hardware name: riscv-virtio,qemu (DT) epc : fp_is_valid arch/riscv/kernel/stacktrace.c:28 [inline] epc : walk_stackframe+0x128/0x452 arch/riscv/kernel/stacktrace.c:60 ra : fp_is_valid arch/riscv/kernel/stacktrace.c:28 [inline] ra : walk_stackframe+0x128/0x452 arch/riscv/kernel/stacktrace.c:60 epc : ffffffff800104bc ra : ffffffff800104bc sp : ff2000000ba675d0 gp : ffffffff897bea80 tp : ff6000002ca34ec0 t0 : ff6000002ca359e0 t1 : ffebffff05c142ab t2 : 00000000000005d7 s0 : ff2000000ba67650 s1 : ff2000000ba67770 a0 : 0000000000000006 a1 : ff2000000ba67770 a2 : ff2000000ba68000 a3 : ffffffff800104bc a4 : 0000000000000002 a5 : ff6000002ca35ec0 a6 : 0000000000000003 a7 : ff6000002e0a155f s2 : ff2000000ba68000 s3 : 0000000000000003 s4 : ff2000000ba67760 s5 : 0000000000000000 s6 : ffffffff85ffb330 s7 : dfffffff00000000 s8 : dfffffff00000000 s9 : ffffffff85ffc980 s10: 0000000000007fff s11: ff2000000ba67770 t3 : 1fec000005946b3b t4 : ffebffff05c142ab t5 : ffebffff05c142ac t6 : 1fec000005946b45 status: 0000000200000120 badaddr: 0000000000000000 cause: 8000000000000001 [] fp_is_valid arch/riscv/kernel/stacktrace.c:28 [inline] [] walk_stackframe+0x128/0x452 arch/riscv/kernel/stacktrace.c:60 [] arch_stack_walk+0x1c/0x24 arch/riscv/kernel/stacktrace.c:163 [] return_address+0x98/0xfc arch/riscv/kernel/return_address.c:39 [] get_lock_parent_ip include/linux/ftrace.h:978 [inline] [] __local_bh_disable_ip+0x160/0x1a4 kernel/softirq.c:327 [] __raw_spin_lock_bh include/linux/spinlock_api_smp.h:125 [inline] [] _raw_spin_lock_bh+0x1e/0x4c kernel/locking/spinlock.c:178 [] spin_lock_bh include/linux/spinlock.h:356 [inline] [] release_sock+0x2e/0x1c8 net/core/sock.c:3624 [] aead_check_key.isra.0+0x90/0x200 crypto/algif_aead.c:407 [] aead_recvmsg_nokey+0x42/0x90 crypto/algif_aead.c:429 [] sock_recvmsg_nosec net/socket.c:1051 [inline] [] ____sys_recvmsg+0x46a/0x55a net/socket.c:2819 [] ___sys_recvmsg+0x112/0x19e net/socket.c:2863 [] do_recvmmsg+0x2a8/0x730 net/socket.c:2957 [] __sys_recvmmsg net/socket.c:3036 [inline] [] __do_sys_recvmmsg net/socket.c:3059 [inline] [] __se_sys_recvmmsg net/socket.c:3052 [inline] [] __riscv_sys_recvmmsg+0x228/0x26e net/socket.c:3052 [] syscall_handler+0x94/0x118 arch/riscv/include/asm/syscall.h:90 [] do_trap_ecall_u+0x1aa/0x216 arch/riscv/kernel/traps.c:331 [] _new_vmalloc_restore_context_a0+0xc2/0xce