INFO: task syz-executor.5:14150 blocked for more than 143 seconds.
Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.5 state:D stack:29128 pid:14150 tgid:14140 ppid:13954 flags:0x00000006
Call Trace:
context_switch kernel/sched/core.c:5400 [inline]
__schedule+0xf12/0x5c00 kernel/sched/core.c:6727
__schedule_loop kernel/sched/core.c:6802 [inline]
schedule+0xe9/0x270 kernel/sched/core.c:6817
schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:6874
__mutex_lock_common kernel/locking/mutex.c:684 [inline]
__mutex_lock+0x5b9/0x9d0 kernel/locking/mutex.c:752
bdev_open_by_dev+0x276/0xec0 block/bdev.c:859
blkdev_open+0xe6/0x380 block/fops.c:615
do_dentry_open+0x8d6/0x18c0 fs/open.c:953
do_open fs/namei.c:3641 [inline]
path_openat+0x1df6/0x2990 fs/namei.c:3798
do_filp_open+0x1de/0x430 fs/namei.c:3825
do_sys_openat2+0x176/0x1e0 fs/open.c:1404
do_sys_open fs/open.c:1419 [inline]
__do_sys_openat fs/open.c:1435 [inline]
__se_sys_openat fs/open.c:1430 [inline]
__x64_sys_openat+0x175/0x210 fs/open.c:1430
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
RIP: 0033:0x7febf167cda9
RSP: 002b:00007febf24bc0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00007febf17abf80 RCX: 00007febf167cda9
RDX: 0000000000060000 RSI: 0000000020000080 RDI: ffffffffffffff9c
RBP: 00007febf16c947a R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007febf17abf80 R15: 00007fff5fd076c8
INFO: lockdep is turned off.
NMI backtrace for cpu 0
CPU: 0 PID: 29 Comm: khungtaskd Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106
nmi_cpu_backtrace+0x277/0x390 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x299/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:222 [inline]
watchdog+0xf87/0x1210 kernel/hung_task.c:379
kthread+0x2c6/0x3a0 kernel/kthread.c:388
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 13079 Comm: syz-executor.5 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:26 [inline]
RIP: 0010:check_kcov_mode kernel/kcov.c:173 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0xd/0x60 kernel/kcov.c:207
Code: fa 48 8b be b0 01 00 00 e8 b0 ff ff ff 31 c0 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 f3 0f 1e fa 65 48 8b 14 25 80 c2 03 00 <65> 8b 05 d4 b1 7b 7e a9 00 01 ff 00 48 8b 34 24 74 0f f6 c4 01 74
RSP: 0018:ffffc90004a07068 EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffffc90004a070f0 RCX: ffffffff813a456c
RDX: ffff88807065d940 RSI: 0000000000000004 RDI: 0000000000000001
RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000004
R10: 0000000000000000 R11: dffffc0000000000 R12: ffffffff9070db1e
R13: ffffc90004a07da8 R14: 0000000000000000 R15: ffffc90004a07126
FS: 00007f80df8526c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1f1515d095 CR3: 000000007d274000 CR4: 0000000000350ef0
Call Trace:
get_reg arch/x86/kernel/unwind_orc.c:452 [inline]
unwind_next_frame+0x109e/0x2390 arch/x86/kernel/unwind_orc.c:643
arch_stack_walk+0xfa/0x170 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x96/0xd0 kernel/stacktrace.c:122
save_stack+0x160/0x1f0 mm/page_owner.c:129
__set_page_owner+0x1f/0x60 mm/page_owner.c:195
set_page_owner include/linux/page_owner.h:31 [inline]
post_alloc_hook+0x2d0/0x350 mm/page_alloc.c:1533
prep_new_page mm/page_alloc.c:1540 [inline]
get_page_from_freelist+0xa28/0x3780 mm/page_alloc.c:3311
__alloc_pages+0x22f/0x2440 mm/page_alloc.c:4567
alloc_pages_mpol+0x258/0x5f0 mm/mempolicy.c:2133
folio_alloc+0x1e/0xe0 mm/mempolicy.c:2211
filemap_alloc_folio+0x3bb/0x490 mm/filemap.c:975
page_cache_ra_unbounded+0x1ac/0x5f0 mm/readahead.c:247
do_page_cache_ra mm/readahead.c:299 [inline]
page_cache_ra_order+0x7d7/0xaa0 mm/readahead.c:544
do_sync_mmap_readahead mm/filemap.c:3151 [inline]
filemap_fault+0x16a8/0x3570 mm/filemap.c:3243
__do_fault+0x107/0x490 mm/memory.c:4376
do_read_fault mm/memory.c:4738 [inline]
do_fault mm/memory.c:4868 [inline]
do_pte_missing mm/memory.c:3745 [inline]
handle_pte_fault mm/memory.c:5144 [inline]
__handle_mm_fault+0x32a9/0x4900 mm/memory.c:5285
handle_mm_fault+0x47a/0xa10 mm/memory.c:5450
do_user_addr_fault+0x3f8/0x1030 arch/x86/mm/fault.c:1415
handle_page_fault arch/x86/mm/fault.c:1507 [inline]
exc_page_fault+0x5d/0xc0 arch/x86/mm/fault.c:1563
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570
RIP: 0010:rep_movs_alternative+0x30/0x70 arch/x86/lib/copy_user_64.S:57
Code: f9 40 73 40 83 f9 08 73 21 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 <48> 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08
RSP: 0018:ffffc90004a07e50 EFLAGS: 00050246
RAX: 0000000000000001 RBX: 0000000020000040 RCX: 0000000000000008
RDX: fffff52000940fd7 RSI: 0000000020000040 RDI: ffffc90004a07eb0
RBP: 0000000000000008 R08: 0000000000000001 R09: fffff52000940fd6
R10: ffffc90004a07eb7 R11: 0000000000000000 R12: 0000000020000048
R13: ffffc90004a07eb0 R14: 0000000000000000 R15: 0000000000000004
copy_user_generic arch/x86/include/asm/uaccess_64.h:112 [inline]
raw_copy_from_user arch/x86/include/asm/uaccess_64.h:127 [inline]
_copy_from_user+0xc2/0xf0 lib/usercopy.c:23
copy_from_user include/linux/uaccess.h:183 [inline]
__do_sys_sendfile64 fs/read_write.c:1354 [inline]
__se_sys_sendfile64 fs/read_write.c:1348 [inline]
__x64_sys_sendfile64+0x121/0x220 fs/read_write.c:1348
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
RIP: 0033:0x7f80dea7cda9
Code: Unable to access opcode bytes at 0x7f80dea7cd7f.
RSP: 002b:00007f80df8520c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
RAX: ffffffffffffffda RBX: 00007f80debac050 RCX: 00007f80dea7cda9
RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000004
RBP: 00007f80deac947a R08: 0000000000000000 R09: 0000000000000000
R10: 000000000000432b R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f80debac050 R15: 00007ffccec76b58