INFO: task udevd:6073 blocked in I/O wait for more than 143 seconds.
      Tainted: G             L      syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:udevd           state:D stack:20520 pid:6073  tgid:6073  ppid:5058   task_flags:0x400140 flags:0x00080002
Call Trace:
 <TASK>
 __schedule+0x17b4/0x5680
 schedule+0x164/0x360
 io_schedule+0x7f/0xd0
 folio_wait_bit_common+0x6d8/0xbc0
 do_read_cache_folio+0x1ad/0x590
 read_part_sector+0xb6/0x2b0
 adfspart_check_POWERTEC+0x9a/0x7a0
 bdev_disk_changed+0x817/0x1770
 blkdev_get_whole+0x380/0x510
 bdev_open+0x31e/0xd30
 blkdev_open+0x470/0x610
 do_dentry_open+0x785/0x14e0
 vfs_open+0x3b/0x340
 path_openat+0x2e08/0x3860
 do_file_open+0x23e/0x4a0
 do_sys_openat2+0x113/0x200
 __x64_sys_openat+0x138/0x170
 do_syscall_64+0x15f/0xf80
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fe353b169a4
RSP: 002b:00007ffea436c740 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 0000556463a14780 RCX: 00007fe353b169a4
RDX: 00000000000a0800 RSI: 00005564639f5360 RDI: 00000000ffffff9c
RBP: 00005564639f5360 R08: 0000000000000001 R09: 3fffffffffffffff
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a0800
R13: 0000556463a0b950 R14: 0000000000000001 R15: 00005564639f4910
 </TASK>

Showing all locks held in the system:
3 locks held by kworker/1:2/32:
 #0: ffff88810006b140 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860
 #1: ffffc90000a87c40 (rx_mode_work){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860
 #2: ffffffff8fdd02c0 (rtnl_mutex){+.+.}-{4:4}, at: netdev_rx_mode_work+0x19/0x3c0
1 lock held by khungtaskd/35:
 #0: ffffffff8e95cda0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180
2 locks held by getty/5433:
 #0: ffff888171b080a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70
 #1: ffffc9000346b2e8 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x45c/0x13a0
1 lock held by udevd/6073:
 #0: ffff8881077dd350 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0xe0/0xd30
2 locks held by syz.0.1671/12475:
 #0: ffff8881a198c0d8 (&type->s_umount_key#104/1){+.+.}-{4:4}, at: alloc_super+0x28c/0xab0
 #1: ffff8881077dd350 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0xe0/0xd30
3 locks held by kworker/u8:4/13610:
 #0: ffff8881748ac940 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860
 #1: ffffc90006e1fc40 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860
 #2: ffffffff8fdd02c0 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_dad_work+0x11e/0x14c0
3 locks held by syz-executor/16092:
 #0: ffffffff8fdd02c0 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x883/0x1bb0
 #1: ffff888175820dc8 (&dev_instance_lock_key#23){+.+.}-{4:4}, at: do_setlink+0x3d2/0x45a0
 #2: ffffffff8e9630a8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x2d0/0x770

=============================================

NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 35 Comm: khungtaskd Tainted: G             L      syzkaller #0 PREEMPT(full) 
Tainted: [L]=SOFTLOCKUP
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0xe8/0x150
 nmi_cpu_backtrace+0x274/0x2d0
 nmi_trigger_cpumask_backtrace+0x17a/0x300
 sys_info+0x135/0x170
 watchdog+0xfd3/0x1030
 kthread+0x388/0x470
 ret_from_fork+0x514/0xb70
 ret_from_fork_asm+0x1a/0x30
 </TASK>
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 16197 Comm: dhcpcd-run-hook Tainted: G             L      syzkaller #0 PREEMPT(full) 
Tainted: [L]=SOFTLOCKUP
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
RIP: 0010:lock_release+0x266/0x3c0
Code: 89 f6 48 8b 54 24 18 e8 28 2f 00 00 48 8b 5c 24 08 48 c7 c7 6f c0 21 8e e8 e7 6f 06 0a b8 ff ff ff ff 65 0f c1 05 2a 74 97 11 <83> f8 01 75 2e 9c 58 a9 00 02 00 00 75 42 f7 c3 00 02 00 00 75 47
RSP: 0018:ffffc90006dcf158 EFLAGS: 00000057
RAX: 0000000000000001 RBX: 0000000000000202 RCX: 0000000000000046
RDX: 0000000000000003 RSI: ffffffff8e21c06f RDI: ffffffff8c28b5e0
RBP: ffff8881a4260c08 R08: ffffffff81af4add R09: ffffffff8e95cda0
R10: ffffc90006dcf298 R11: ffffffff81b0d910 R12: 0000000000000003
R13: 0000000000000003 R14: ffffffff8e95cda0 R15: ffff8881a4260000
FS:  00007f3baf3e9380(0000) GS:ffff8882a9290000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055d3dee17000 CR3: 000000016d4f6000 CR4: 00000000000006f0
Call Trace:
 <TASK>
 is_module_text_address+0x18b/0x1e0
 kernel_text_address+0x94/0xe0
 __kernel_text_address+0xd/0x30
 unwind_get_return_address+0x4d/0x90
 arch_stack_walk+0xfb/0x150
 stack_trace_save+0xa9/0x100
 kasan_save_stack+0x3e/0x60
 kasan_record_aux_stack+0xbd/0xd0
 kmem_cache_free+0x44f/0x650
 tear_down_vmas+0x312/0x520
 exit_mmap+0x4b6/0x9e0
 __mmput+0x118/0x430
 exec_mmap+0x3b4/0x440
 begin_new_exec+0x134a/0x2480
 load_elf_binary+0xa47/0x2980
 bprm_execve+0x94a/0x1440
 do_execveat_common+0x50d/0x690
 __x64_sys_execve+0x97/0xc0
 do_syscall_64+0x15f/0xf80
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f3baf523ef7
Code: Unable to access opcode bytes at 0x7f3baf523ecd.
RSP: 002b:00007fffd9b72638 EFLAGS: 00000246 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 000055d3dee16f58 RCX: 00007f3baf523ef7
RDX: 000055d3dee16f78 RSI: 000055d3dee16f58 RDI: 000055d3dee17000
RBP: 000055d3dee17000 R08: fefefefefefefeff R09: ffffffffff000000
R10: 00000000af4feb01 R11: 0000000000000246 R12: 000055d3dee16f78
R13: 00007f3baf6d1904 R14: 000055d3dee16f78 R15: 0000000000000000
 </TASK>
