INFO: task syz-executor309:6323 blocked for more than 140 seconds. Not tainted 4.14.175-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor309 D28304 6323 6316 0x00000004 Call Trace: schedule+0x8d/0x1b0 kernel/sched/core.c:3428 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x1f6/0x390 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:66 [inline] down_read+0x45/0xa0 kernel/locking/rwsem.c:26 __get_super.part.0+0x1c6/0x280 fs/super.c:678 __get_super include/linux/spinlock.h:317 [inline] get_super+0x2b/0x50 fs/super.c:707 fsync_bdev+0x14/0xd0 fs/block_dev.c:495 invalidate_partition+0x31/0x60 block/genhd.c:1506 drop_partitions block/partition-generic.c:442 [inline] rescan_partitions+0xde/0x850 block/partition-generic.c:515 __blkdev_reread_part+0x157/0x1e0 block/ioctl.c:173 blkdev_reread_part+0x23/0x40 block/ioctl.c:193 loop_reread_partitions+0x72/0x80 drivers/block/loop.c:624 loop_set_status+0xbfc/0x11f0 drivers/block/loop.c:1193 loop_set_status64+0x92/0xe0 drivers/block/loop.c:1311 lo_ioctl+0x590/0x1c40 drivers/block/loop.c:1441 __blkdev_driver_ioctl block/ioctl.c:297 [inline] blkdev_ioctl+0x91d/0x17d0 block/ioctl.c:594 block_ioctl+0xd9/0x120 fs/block_dev.c:1881 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x75a/0xfe0 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x445ad7 RSP: 002b:00007f00f7f0cb68 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000445ad7 RDX: 00007f00f7f0cc00 RSI: 0000000000004c04 RDI: 0000000000000005 RBP: 00007f00f7f0d6d0 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000202 R12: 00000000006dbc2c R13: 00007ffeca2b48df R14: 0000000000000005 R15: 0000000000000000 INFO: task syz-executor309:6327 blocked for more than 140 seconds. Not tainted 4.14.175-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor309 D29360 6327 6316 0x80000004 Call Trace: schedule+0x8d/0x1b0 kernel/sched/core.c:3428 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3486 __mutex_lock_common kernel/locking/mutex.c:833 [inline] __mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893 lo_ioctl+0x87/0x1c40 drivers/block/loop.c:1414 __blkdev_driver_ioctl block/ioctl.c:297 [inline] blkdev_ioctl+0x91d/0x17d0 block/ioctl.c:594 ioctl_by_bdev+0xa0/0x110 fs/block_dev.c:2066 udf_get_last_session+0x7c/0xd0 fs/udf/lowlevel.c:37 udf_fill_super+0x10f9/0x14f6 fs/udf/super.c:2146 mount_bdev+0x2bc/0x370 fs/super.c:1134 mount_fs+0x92/0x2a0 fs/super.c:1237 vfs_kern_mount.part.0+0x5b/0x3c0 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0x3c9/0x24f0 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x445be9 RSP: 002b:00007f00f7eebdb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00000000006dbc38 RCX: 0000000000445be9 RDX: 00000000200003c0 RSI: 0000000020000380 RDI: 0000000020000340 RBP: 00000000006dbc30 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dbc3c R13: 00007ffeca2b48df R14: 00007f00f7eec9c0 R15: 0000000000000002 Showing all locks held in the system: 1 lock held by khungtaskd/1057: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4544 3 locks held by syz-executor309/6323: #0: (&lo->lo_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x87/0x1c40 drivers/block/loop.c:1414 #1: (&bdev->bd_mutex){+.+.}, at: [] blkdev_reread_part+0x1b/0x40 block/ioctl.c:192 #2: (&type->s_umount_key#57){.+.+}, at: [] __get_super.part.0+0x1c6/0x280 fs/super.c:678 2 locks held by syz-executor309/6327: #0: (&type->s_umount_key#56/1){+.+.}, at: [] alloc_super fs/super.c:251 [inline] #0: (&type->s_umount_key#56/1){+.+.}, at: [] sget_userns+0x556/0xc30 fs/super.c:516 #1: (&lo->lo_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x87/0x1c40 drivers/block/loop.c:1414 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1057 Comm: khungtaskd Not tainted 4.14.175-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x13e/0x194 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x139/0x17e lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5e2/0xb80 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 3626 Comm: systemd-journal Not tainted 4.14.175-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880944783c0 task.stack: ffff888094480000 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x50 kernel/kcov.c:60 RSP: 0018:ffff8880944876e8 EFLAGS: 00000286 RAX: ffff8880944783c0 RBX: 00007fa5a2bc7840 RCX: 1ffffffff0f419ad RDX: 0000000000000000 RSI: ffffffff86e45540 RDI: 00007fa5a2bc7840 RBP: 00007fa5a2bc7840 R08: 0000000000000000 R09: 0000000000020012 R10: ffff888094478c40 R11: ffff8880944783c0 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fa5a2bc7840 R15: ffff88809ea722af FS: 00007fa5a36378c0(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fa5a09e5000 CR3: 0000000094c85000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_jit_kallsyms_enabled include/linux/filter.h:802 [inline] bpf_prog_kallsyms_find+0x16/0x260 kernel/bpf/core.c:419 is_bpf_text_address+0x5e/0x120 kernel/bpf/core.c:457 kernel_text_address+0x6e/0xe0 kernel/extable.c:150 __kernel_text_address+0x9/0x30 kernel/extable.c:105 unwind_get_return_address arch/x86/kernel/unwind_orc.c:255 [inline] unwind_get_return_address+0x5a/0xa0 arch/x86/kernel/unwind_orc.c:250 __save_stack_trace+0x7b/0xd0 arch/x86/kernel/stacktrace.c:45 save_stack+0x32/0xa0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc mm/kasan/kasan.c:551 [inline] kasan_kmalloc+0xbf/0xe0 mm/kasan/kasan.c:529 kmem_cache_alloc+0x127/0x770 mm/slab.c:3552 kmem_cache_zalloc include/linux/slab.h:651 [inline] file_alloc_security security/selinux/hooks.c:368 [inline] selinux_file_alloc_security+0xaf/0x190 security/selinux/hooks.c:3475 security_file_alloc+0x66/0xa0 security/security.c:874 get_empty_filp+0x15c/0x3e0 fs/file_table.c:129 path_openat+0x8d/0x3c50 fs/namei.c:3545 do_filp_open+0x18e/0x250 fs/namei.c:3603 do_sys_open+0x29d/0x3f0 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x7fa5a2bc7840 RSP: 002b:00007ffc9865b3d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007ffc9865b6e0 RCX: 00007fa5a2bc7840 RDX: 00000000000001a0 RSI: 0000000000080042 RDI: 0000562ca9857860 RBP: 000000000000000d R08: 000000000000c0c1 R09: 00000000ffffffff R10: 0000000000000069 R11: 0000000000000246 R12: 00000000ffffffff R13: 0000562ca984a060 R14: 00007ffc9865b6a0 R15: 0000562ca9857680 Code: 00 48 c7 c7 c0 90 ad 86 4c 89 3d fc af fe 08 41 bd f4 ff ff ff e8 6c bd ee ff 48 c7 05 e6 af fe 08 00 00 00 00 e9 be ed ff ff 90 <65> 48 8b 04 25 40 ee 01 00 48 85 c0 74 1a 65 8b 15 1b a7 a7 7e