INFO: task udevd:26916 blocked for more than 430 seconds. Not tainted 5.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:udevd state:D stack: 0 pid:26916 ppid: 2031 flags:0x00000001 Backtrace: [<81712400>] (__schedule) from [<81712e58>] (schedule+0x54/0xdc kernel/sched/core.c:6326) r10:850f5f2c r9:5ac3c35a r8:83fce0d0 r7:84da3d14 r6:00000001 r5:83b9f778 r4:82acae00 [<81712e04>] (schedule) from [<8071abf4>] (blk_mq_freeze_queue_wait+0x6c/0xa4 block/blk-mq.c:178) r5:83b9f778 r4:83b9fbe0 [<8071ab88>] (blk_mq_freeze_queue_wait) from [<8071db68>] (blk_freeze_queue block/blk-mq.c:205 [inline]) [<8071ab88>] (blk_mq_freeze_queue_wait) from [<8071db68>] (blk_mq_freeze_queue+0x1c/0x20 block/blk-mq.c:214) r5:850f5e00 r4:83b9f770 [<8071db4c>] (blk_mq_freeze_queue) from [<809fcd3c>] (__loop_clr_fd+0x6c/0x428 drivers/block/loop.c:1122) r5:850f5e00 r4:850f5e00 [<809fccd0>] (__loop_clr_fd) from [<809fd19c>] (lo_release+0xa4/0xa8 drivers/block/loop.c:1761) r10:8220c44c r9:5ac3c35a r8:83fce0d0 r7:84da3d14 r6:00000001 r5:850f5f2c r4:850f5e00 [<809fd0f8>] (lo_release) from [<80706a4c>] (blkdev_put_whole block/bdev.c:694 [inline]) [<809fd0f8>] (lo_release) from [<80706a4c>] (blkdev_put+0xd4/0x27c block/bdev.c:956) r7:84da3d14 r6:84da3cc0 r5:480a005d r4:8310a640 [<80706978>] (blkdev_put) from [<807078e0>] (blkdev_close+0x18/0x20 block/fops.c:515) r8:83fce0d0 r7:85c89c38 r6:8432e408 r5:480a005d r4:83f7b900 [<807078c8>] (blkdev_close) from [<8048414c>] (__fput+0x84/0x258 fs/file_table.c:280) [<804840c8>] (__fput) from [<8048439c>] (____fput+0x10/0x14 fs/file_table.c:313) r9:5ac3c35a r8:82acb654 r7:8243d600 r6:82acae00 r5:82acb624 r4:00000000 [<8048438c>] (____fput) from [<80266e24>] (task_work_run+0x8c/0xb8 kernel/task_work.c:164) [<80266d98>] (task_work_run) from [<8020bff0>] (tracehook_notify_resume include/linux/tracehook.h:189 [inline]) [<80266d98>] (task_work_run) from [<8020bff0>] (do_work_pending+0x438/0x53c arch/arm/kernel/signal.c:630) r9:5ac3c35a r8:80200244 r7:fffffe30 r6:80200244 r5:852f3fb0 r4:82acae00 [<8020bbb8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x20) Exception stack(0x852f3fb0 to 0x852f3ff8) 3fa0: 00000000 7efd6c48 00000003 00000000 3fc0: 76f8287c 76f82840 00000002 00000006 000563e8 00589190 00000008 000563f8 3fe0: 000561f4 7efd7448 0002d6d0 76c4d380 600f0010 00000008 r10:00000006 r9:82acae00 r8:80200244 r7:00000006 r6:00000002 r5:76f82840 r4:76f8287c INFO: task syz-executor.0:27007 blocked for more than 430 seconds. Not tainted 5.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.0 state:D stack: 0 pid:27007 ppid: 2235 flags:0x00000001 Backtrace: [<81712400>] (__schedule) from [<81712e58>] (schedule+0x54/0xdc kernel/sched/core.c:6326) r10:84da3d14 r9:4800001f r8:84da3d18 r7:8551bcbc r6:00000002 r5:834e2e00 r4:834e2e00 [<81712e04>] (schedule) from [<81713474>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6385) r5:834e2e00 r4:84da3d14 [<8171345c>] (schedule_preempt_disabled) from [<817147ac>] (__mutex_lock_common kernel/locking/mutex.c:680 [inline]) [<8171345c>] (schedule_preempt_disabled) from [<817147ac>] (__mutex_lock.constprop.0+0x170/0x54c kernel/locking/mutex.c:740) [<8171463c>] (__mutex_lock.constprop.0) from [<81714c5c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1028) r9:4800001f r8:00000000 r7:84da3cc0 r6:837f86c0 r5:4800001f r4:8310a640 [<81714c48>] (__mutex_lock_slowpath) from [<81714c9c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:283) [<81714c60>] (mutex_lock) from [<80706fd4>] (blkdev_get_by_dev.part.0+0x44/0x2dc block/bdev.c:819) [<80706f90>] (blkdev_get_by_dev.part.0) from [<807072b4>] (blkdev_get_by_dev+0x48/0x4c block/bdev.c:803) r10:8551be50 r9:837f86c8 r8:807078e8 r7:837f86c0 r6:837f86c0 r5:4800001f r4:00700000 [<8070726c>] (blkdev_get_by_dev) from [<80707940>] (blkdev_open+0x58/0x88 block/fops.c:501) r7:837f86c0 r6:00000000 r5:8432e408 r4:837f86c0 [<807078e8>] (blkdev_open) from [<8047d928>] (do_dentry_open+0x148/0x3f8 fs/open.c:822) r5:8432e408 r4:837f86c0 [<8047d7e0>] (do_dentry_open) from [<8047f618>] (vfs_open+0x34/0x38 fs/open.c:957) r9:8551bf20 r8:00000000 r7:837f86c0 r6:82225d20 r5:00000000 r4:00000002 [<8047f5e4>] (vfs_open) from [<804936b8>] (do_open fs/namei.c:3426 [inline]) [<8047f5e4>] (vfs_open) from [<804936b8>] (path_openat+0x544/0x102c fs/namei.c:3559) [<80493174>] (path_openat) from [<80495a20>] (do_filp_open+0x84/0x124 fs/namei.c:3586) r10:00000142 r9:834e2e00 r8:8551be50 r7:00000001 r6:834e2e00 r5:8551bf20 r4:8551bf58 [<8049599c>] (do_filp_open) from [<8047f908>] (do_sys_openat2+0xa8/0x16c fs/open.c:1212) r8:80200244 r7:ffffff9c r6:00000004 r5:843cd000 r4:8551bf58 [<8047f860>] (do_sys_openat2) from [<8047fda4>] (do_sys_open fs/open.c:1228 [inline]) [<8047f860>] (do_sys_openat2) from [<8047fda4>] (__do_sys_openat fs/open.c:1244 [inline]) [<8047f860>] (do_sys_openat2) from [<8047fda4>] (sys_openat+0xa4/0xcc fs/open.c:1239) r7:00000142 r6:76fe2ee0 r5:76fe2ee0 r4:ffffff9c [<8047fd00>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:64) Exception stack(0x8551bfa8 to 0x8551bff0) bfa0: 20000230 76fe3b90 ffffff9c 76fe2ee0 00000002 00000000 bfc0: 20000230 76fe3b90 76fe2ee0 00000142 00000003 00000000 00085104 00000000 bfe0: 00000000 76fe2e50 00028e6c 00029680 r5:76fe3b90 r4:20000230 NMI backtrace for cpu 1 CPU: 1 PID: 26 Comm: khungtaskd Not tainted 5.16.0-rc1-syzkaller #0 Hardware name: ARM-Versatile Express Backtrace: [<816f56d0>] (dump_backtrace) from [<816f58bc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:237) r7:00000001 r6:00000000 r5:60000093 r4:81d6017c [<816f58a4>] (show_stack) from [<816fe314>] (__dump_stack lib/dump_stack.c:88 [inline]) [<816f58a4>] (show_stack) from [<816fe314>] (dump_stack_lvl+0x48/0x54 lib/dump_stack.c:106) [<816fe2cc>] (dump_stack_lvl) from [<816fe338>] (dump_stack+0x18/0x1c lib/dump_stack.c:113) r5:00000013 r4:00000001 [<816fe320>] (dump_stack) from [<8083cd6c>] (nmi_cpu_backtrace+0x114/0x180 lib/nmi_backtrace.c:105) [<8083cc58>] (nmi_cpu_backtrace) from [<8083ceec>] (nmi_trigger_cpumask_backtrace+0x114/0x1d0 lib/nmi_backtrace.c:62) r7:00000001 r6:8220c494 r5:8220cc70 r4:00000000 [<8083cdd8>] (nmi_trigger_cpumask_backtrace) from [<80210c54>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:865) r9:000aadc0 r8:82204d00 r7:00007f65 r6:824839b0 r5:8220c5d4 r4:83a8e040 [<80210c3c>] (arch_trigger_cpumask_backtrace) from [<80329f7c>] (trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]) [<80210c3c>] (arch_trigger_cpumask_backtrace) from [<80329f7c>] (check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline]) [<80210c3c>] (arch_trigger_cpumask_backtrace) from [<80329f7c>] (watchdog+0x4a0/0x58c kernel/hung_task.c:295) [<80329adc>] (watchdog) from [<8026a518>] (kthread+0x164/0x198 kernel/kthread.c:327) r10:8294de4c r9:00000000 r8:00000000 r7:80329adc r6:828cf180 r5:82a89240 r4:828f2e00 [<8026a3b4>] (kthread) from [<80200100>] (ret_from_fork+0x14/0x34 arch/arm/kernel/entry-common.S:146) Exception stack(0x82a25fb0 to 0x82a25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026a3b4 r4:82a89240 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 2016 Comm: syslogd Not tainted 5.16.0-rc1-syzkaller #0 Hardware name: ARM-Versatile Express PC is at selinux_file_permission+0xc4/0xfc security/selinux/hooks.c:3696 LR is at rcu_read_unlock include/linux/rcupdate.h:720 [inline] LR is at avc_has_perm_noaudit security/selinux/avc.c:1163 [inline] LR is at avc_has_perm+0xd4/0x200 security/selinux/avc.c:1190 pc : [<8067cca8>] lr : [<80673624>] psr: 600d0013 sp : 84337e70 ip : 84337d68 fp : 84337e9c r10: 00000001 r9 : 83539810 r8 : 82acdc00 r7 : 83539810 r6 : 00000000 r5 : 8365ca80 r4 : 00000004 r3 : 00000000 r2 : 00000000 r1 : 00000000 r0 : 00000000 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84303080 DAC: fffffffd CPU: 0 PID: 2016 Comm: syslogd Not tainted 5.16.0-rc1-syzkaller #0 Hardware name: ARM-Versatile Express Backtrace: [<816f56d0>] (dump_backtrace) from [<816f58bc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:237) r7:00000017 r6:84337e20 r5:600d0193 r4:81d6017c [<816f58a4>] (show_stack) from [<816fe314>] (__dump_stack lib/dump_stack.c:88 [inline]) [<816f58a4>] (show_stack) from [<816fe314>] (dump_stack_lvl+0x48/0x54 lib/dump_stack.c:106) [<816fe2cc>] (dump_stack_lvl) from [<816fe338>] (dump_stack+0x18/0x1c lib/dump_stack.c:113) r5:000d0193 r4:00000000 [<816fe320>] (dump_stack) from [<80209080>] (show_regs+0x14/0x18 arch/arm/kernel/process.c:199) [<8020906c>] (show_regs) from [<8083cd54>] (nmi_cpu_backtrace+0xfc/0x180 lib/nmi_backtrace.c:103) [<8083cc58>] (nmi_cpu_backtrace) from [<8020fd58>] (do_handle_IPI+0x4c/0x3b4 arch/arm/kernel/smp.c:680) r7:00000017 r6:00000000 r5:8280cb80 r4:00000007 [<8020fd0c>] (do_handle_IPI) from [<802100e0>] (ipi_handler+0x20/0x28 arch/arm/kernel/smp.c:708) r9:82acdc00 r8:84337d88 r7:00000017 r6:8220cc8c r5:8280cb80 r4:82885d00 [<802100c0>] (ipi_handler) from [<802b9530>] (handle_percpu_devid_irq+0x9c/0x2d4 kernel/irq/chip.c:933) [<802b9494>] (handle_percpu_devid_irq) from [<802b2ba0>] (generic_handle_irq_desc include/linux/irqdesc.h:158 [inline]) [<802b9494>] (handle_percpu_devid_irq) from [<802b2ba0>] (handle_irq_desc kernel/irq/irqdesc.c:646 [inline]) [<802b9494>] (handle_percpu_devid_irq) from [<802b2ba0>] (generic_handle_domain_irq+0x48/0x8c kernel/irq/irqdesc.c:680) r10:00000001 r9:82acdc00 r8:00000000 r7:df80200c r6:82acdc00 r5:00000007 r4:82888000 r3:802b9494 [<802b2b58>] (generic_handle_domain_irq) from [<8084fa80>] (gic_handle_irq+0x68/0x7c drivers/irqchip/irq-gic.c:372) r7:df80200c r6:820a5fc4 r5:df802000 r4:8220cc8c [<8084fa18>] (gic_handle_irq) from [<81710264>] (generic_handle_arch_irq+0x60/0x80 kernel/irq/handle.c:243) r7:84337e20 r6:81f092c0 r5:81f092d8 r4:820a5fb8 [<81710204>] (generic_handle_arch_irq) from [<80200abc>] (__irq_svc+0x3c/0x64 arch/arm/kernel/entry-armv.S:202) Exception stack(0x84337e20 to 0x84337e68) 7e20: 00000000 00000000 00000000 00000000 00000004 8365ca80 00000000 83539810 7e40: 82acdc00 83539810 00000001 84337e9c 84337d68 84337e70 80673624 8067cca8 7e60: 600d0013 ffffffff r9:82acdc00 r8:82acdc00 r7:84337e54 r6:ffffffff r5:600d0013 r4:8067cca8 [<8067cbe4>] (selinux_file_permission) from [<8066eab4>] (security_file_permission+0x38/0x64 security/security.c:1507) r10:00000003 r9:82acdc00 r8:00000000 r7:0089b1b8 r6:8365ca80 r5:00000004 r4:81f1e0cc r3:8067cbe4 [<8066ea7c>] (security_file_permission) from [<80480c48>] (rw_verify_area+0x54/0x98 fs/read_write.c:385) r7:0089b1b8 r6:8365ca80 r5:8365ca80 r4:000000ff [<80480bf4>] (rw_verify_area) from [<804824d4>] (vfs_read+0x70/0x314 fs/read_write.c:472) [<80482464>] (vfs_read) from [<80482c70>] (ksys_read+0xb4/0xec fs/read_write.c:619) r10:00000003 r9:82acdc00 r8:80200244 r7:000000ff r6:0089b1b8 r5:8365ca80 r4:8365ca80 [<80482bbc>] (ksys_read) from [<80482cb8>] (__do_sys_read fs/read_write.c:629 [inline]) [<80482bbc>] (ksys_read) from [<80482cb8>] (sys_read+0x10/0x14 fs/read_write.c:627) r7:00000003 r6:76f66080 r5:0089b190 r4:fffffc00 [<80482ca8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:64) Exception stack(0x84337fa8 to 0x84337ff0) 7fa0: fffffc00 0089b190 00000000 0089b1b8 000000ff 00000000 7fc0: fffffc00 0089b190 76f66080 00000003 00000000 000d6c90 000d6c90 00000000 7fe0: 000d609c 7efb2c88 000579b8 76e8a6f8