INFO: task systemd-udevd:19753 blocked for more than 143 seconds. Not tainted 5.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:systemd-udevd state:D stack:26216 pid:19753 ppid: 2971 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:4940 [inline] __schedule+0xb44/0x5960 kernel/sched/core.c:6287 schedule+0xd3/0x270 kernel/sched/core.c:6366 io_schedule+0xba/0x130 kernel/sched/core.c:8389 wait_on_page_bit_common+0x537/0xe60 mm/filemap.c:1356 wait_on_page_bit mm/filemap.c:1417 [inline] wait_on_page_locked include/linux/pagemap.h:688 [inline] wait_on_page_read mm/filemap.c:3422 [inline] do_read_cache_page+0x96b/0x13c0 mm/filemap.c:3465 read_mapping_page include/linux/pagemap.h:515 [inline] read_part_sector+0xfa/0x5c0 block/partitions/core.c:725 adfspart_check_ICS+0x9d/0xc90 block/partitions/acorn.c:360 check_partition block/partitions/core.c:147 [inline] blk_add_partitions block/partitions/core.c:610 [inline] bdev_disk_changed+0x7bc/0x1140 block/partitions/core.c:696 blkdev_get_whole+0x206/0x2a0 block/bdev.c:681 blkdev_get_by_dev.part.0+0x354/0xb60 block/bdev.c:823 blkdev_get_by_dev+0x6b/0x80 block/bdev.c:856 blkdev_open+0x154/0x2b0 block/fops.c:448 do_dentry_open+0x4c8/0x11d0 fs/open.c:822 do_open fs/namei.c:3428 [inline] path_openat+0x1c9a/0x2740 fs/namei.c:3561 do_filp_open+0x1aa/0x400 fs/namei.c:3588 do_sys_openat2+0x16d/0x4d0 fs/open.c:1200 do_sys_open fs/open.c:1216 [inline] __do_sys_open fs/open.c:1224 [inline] __se_sys_open fs/open.c:1220 [inline] __x64_sys_open+0x119/0x1c0 fs/open.c:1220 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f96c8520840 RSP: 002b:00007ffd968c5cd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00005584a667bee0 RCX: 00007f96c8520840 RDX: 00005584a4de1fe3 RSI: 0000000000080000 RDI: 00005584a6692a30 RBP: 0000000000000001 R08: 00005584a4de1670 R09: 0000000000000110 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00005584a6680e40 R15: 00000000ffffffff INFO: task syz-executor.1:20796 blocked for more than 143 seconds. Not tainted 5.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.1 state:D stack:27936 pid:20796 ppid: 15041 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:4940 [inline] __schedule+0xb44/0x5960 kernel/sched/core.c:6287 schedule+0xd3/0x270 kernel/sched/core.c:6366 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6425 __mutex_lock_common kernel/locking/mutex.c:669 [inline] __mutex_lock+0xa34/0x12f0 kernel/locking/mutex.c:729 blkdev_put+0x97/0x9e0 block/bdev.c:911 blkdev_close+0x8d/0xb0 block/fops.c:460 __fput+0x288/0x9f0 fs/file_table.c:280 task_work_run+0xdd/0x1a0 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop kernel/entry/common.c:175 [inline] exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f2bf5a2367b RSP: 002b:00007ffd75bd17d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f2bf5a2367b RDX: 00007f2bf5b78380 RSI: ffffffff89364b58 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b2fb24238 R10: 00000000000008d3 R11: 0000000000000293 R12: 000000000007c0f4 R13: 00000000000003e8 R14: 00007f2bf5b73f60 R15: 000000000007c052 Showing all locks held in the system: 1 lock held by khungtaskd/27: #0: ffffffff8b981b60 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446 5 locks held by kworker/u4:6/1222: 1 lock held by in:imklog/6227: #0: ffff8880225739f0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990 1 lock held by systemd-udevd/19753: #0: ffff88801b8b7118 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev.part.0+0x9b/0xb60 block/bdev.c:816 1 lock held by syz-executor.1/20796: #0: ffff88801b8b7118 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_put+0x97/0x9e0 block/bdev.c:911 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1ae/0x220 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xc1d/0xf50 kernel/hung_task.c:295 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 1222 Comm: kworker/u4:6 Not tainted 5.15.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:check_kcov_mode kernel/kcov.c:163 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x7/0x60 kernel/kcov.c:197 Code: fd ff ff b9 ff ff ff ff ba 08 00 00 00 4d 8b 03 48 0f bd ca 49 8b 45 00 48 63 c9 e9 64 ff ff ff 0f 1f 00 65 8b 05 d9 17 8b 7e <89> c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b 14 25 40 f0 01 00 a9 RSP: 0018:ffffc9000537f978 EFLAGS: 00000086 RAX: 0000000080000002 RBX: ffff888010e68000 RCX: 0000000000000001 RDX: dffffc0000000000 RSI: ffff88801cc49c80 RDI: 0000000000000003 RBP: 00000000ffffffff R08: 0000000000000007 R09: 00000000000487a7 R10: ffffffff83f47fd6 R11: 000000000000003f R12: 0000000000000001 R13: ffff888010e68670 R14: 0000000000000007 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f1a1365b000 CR3: 000000000b68e000 CR4: 0000000000350ee0 Call Trace: cpumask_any_but+0xba/0x1a0 lib/cpumask.c:58 flush_tlb_mm_range+0xb5/0x230 arch/x86/mm/tlb.c:1012 __text_poke+0x590/0x8c0 arch/x86/kernel/alternative.c:865 text_poke_bp_batch+0x2eb/0x560 arch/x86/kernel/alternative.c:1127 text_poke_flush arch/x86/kernel/alternative.c:1268 [inline] text_poke_flush arch/x86/kernel/alternative.c:1265 [inline] text_poke_finish+0x16/0x30 arch/x86/kernel/alternative.c:1275 arch_jump_label_transform_apply+0x13/0x20 arch/x86/kernel/jump_label.c:146 jump_label_update+0x1d5/0x430 kernel/jump_label.c:830 static_key_enable_cpuslocked+0x1b1/0x260 kernel/jump_label.c:177 static_key_enable+0x16/0x20 kernel/jump_label.c:190 toggle_allocation_gate mm/kfence/core.c:626 [inline] toggle_allocation_gate+0x100/0x390 mm/kfence/core.c:618 process_one_work+0x9bf/0x16b0 kernel/workqueue.c:2297 worker_thread+0x658/0x11f0 kernel/workqueue.c:2444 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 ---------------- Code disassembly (best guess), 3 bytes skipped: 0: b9 ff ff ff ff mov $0xffffffff,%ecx 5: ba 08 00 00 00 mov $0x8,%edx a: 4d 8b 03 mov (%r11),%r8 d: 48 0f bd ca bsr %rdx,%rcx 11: 49 8b 45 00 mov 0x0(%r13),%rax 15: 48 63 c9 movslq %ecx,%rcx 18: e9 64 ff ff ff jmpq 0xffffff81 1d: 0f 1f 00 nopl (%rax) 20: 65 8b 05 d9 17 8b 7e mov %gs:0x7e8b17d9(%rip),%eax # 0x7e8b1800 * 27: 89 c1 mov %eax,%ecx <-- trapping instruction 29: 48 8b 34 24 mov (%rsp),%rsi 2d: 81 e1 00 01 00 00 and $0x100,%ecx 33: 65 48 8b 14 25 40 f0 mov %gs:0x1f040,%rdx 3a: 01 00 3c: a9 .byte 0xa9