INFO: task syz-executor.1:10708 blocked for more than 430 seconds.
Not tainted 6.9.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.1 state:D stack:0 pid:10708 tgid:10706 ppid:4666 flags:0x00000005
Call trace:
[<8189abc0>] (__schedule) from [<80281ddc>] (__schedule_loop kernel/sched/core.c:6823 [inline])
[<8189abc0>] (__schedule) from [<80281ddc>] (rt_mutex_schedule+0x20/0x38 kernel/sched/core.c:7115)
r10:83e6d400 r9:00000000 r8:00000002 r7:00000000 r6:e8bd9db0 r5:83ea0000
r4:83ea0000
[<80281dbc>] (rt_mutex_schedule) from [<818a123c>] (rt_mutex_slowlock_block.constprop.0+0x38/0x160 kernel/locking/rtmutex.c:1636)
r5:83ea0000 r4:82f9ec54
[<818a1204>] (rt_mutex_slowlock_block.constprop.0) from [<818a24c4>] (__rt_mutex_slowlock kernel/locking/rtmutex.c:1704 [inline])
[<818a1204>] (rt_mutex_slowlock_block.constprop.0) from [<818a24c4>] (__rt_mutex_slowlock_locked kernel/locking/rtmutex.c:1740 [inline])
[<818a1204>] (rt_mutex_slowlock_block.constprop.0) from [<818a24c4>] (rt_mutex_slowlock.constprop.0+0xec/0x2cc kernel/locking/rtmutex.c:1778)
r10:85b5e840 r9:60000013 r8:00000002 r7:e8bd9db0 r6:83ea0000 r5:82f9ec54
r4:00000000 r3:e8bd9db0
[<818a23d8>] (rt_mutex_slowlock.constprop.0) from [<818a2788>] (__rt_mutex_lock kernel/locking/rtmutex.c:1793 [inline])
[<818a23d8>] (rt_mutex_slowlock.constprop.0) from [<818a2788>] (__rt_mutex_lock_common kernel/locking/rtmutex_api.c:31 [inline])
[<818a23d8>] (rt_mutex_slowlock.constprop.0) from [<818a2788>] (rt_mutex_lock+0x44/0x48 kernel/locking/rtmutex_api.c:71)
r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:00000000 r4:82f9ec40
[<818a2744>] (rt_mutex_lock) from [<80f72fdc>] (i2c_adapter_lock_bus+0x14/0x18 drivers/i2c/i2c-core-base.c:845)
[<80f72fc8>] (i2c_adapter_lock_bus) from [<80f78598>] (i2c_lock_bus include/linux/i2c.h:792 [inline])
[<80f72fc8>] (i2c_adapter_lock_bus) from [<80f78598>] (__i2c_lock_bus_helper drivers/i2c/i2c-core.h:46 [inline])
[<80f72fc8>] (i2c_adapter_lock_bus) from [<80f78598>] (i2c_smbus_xfer+0xa4/0x12c drivers/i2c/i2c-core-smbus.c:541)
[<80f784f4>] (i2c_smbus_xfer) from [<80f7a3dc>] (i2cdev_ioctl_smbus+0x198/0x334 drivers/i2c/i2c-dev.c:348)
r8:00000003 r7:00000000 r6:00000000 r5:857ff800 r4:00000000
[<80f7a244>] (i2cdev_ioctl_smbus) from [<80f7a824>] (i2cdev_ioctl+0x2ac/0x390 drivers/i2c/i2c-dev.c:467)
r10:85b5e840 r9:83ea0000 r8:00000003 r7:20000340 r6:00000720 r5:857ff800
r4:20000340
[<80f7a578>] (i2cdev_ioctl) from [<8050fbdc>] (vfs_ioctl fs/ioctl.c:51 [inline])
[<80f7a578>] (i2cdev_ioctl) from [<8050fbdc>] (do_vfs_ioctl fs/ioctl.c:858 [inline])
[<80f7a578>] (i2cdev_ioctl) from [<8050fbdc>] (__do_sys_ioctl fs/ioctl.c:902 [inline])
[<80f7a578>] (i2cdev_ioctl) from [<8050fbdc>] (sys_ioctl+0x118/0xc24 fs/ioctl.c:890)
r6:85b5e841 r5:00000000 r4:00000720
[<8050fac4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:66)
Exception stack(0xe8bd9fa8 to 0xe8bd9ff0)
9fa0: 00000000 00000000 00000003 00000720 20000340 00000000
9fc0: 00000000 00000000 0014c2c8 00000036 7eac532e 7eac532f 003d0f00 76b930fc
9fe0: 76b92f08 76b92ef8 000167f8 00050bc0
r10:00000036 r9:83ea0000 r8:80200288 r7:00000036 r6:0014c2c8 r5:00000000
r4:00000000
NMI backtrace for cpu 1
CPU: 1 PID: 31 Comm: khungtaskd Not tainted 6.9.0-rc1-syzkaller #0
Hardware name: ARM-Versatile Express
Call trace:
[<8187943c>] (dump_backtrace) from [<81879538>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:256)
r7:00000000 r6:00000013 r5:60000093 r4:81fc474c
[<81879520>] (show_stack) from [<81896cf0>] (__dump_stack lib/dump_stack.c:88 [inline])
[<81879520>] (show_stack) from [<81896cf0>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:114)
[<81896c80>] (dump_stack_lvl) from [<81896d14>] (dump_stack+0x18/0x1c lib/dump_stack.c:123)
r5:00000001 r4:00000001
[<81896cfc>] (dump_stack) from [<81866814>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113)
[<818666b4>] (nmi_cpu_backtrace) from [<81866960>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62)
r7:00000001 r6:8260c590 r5:8261a88c r4:ffffffff
[<81866830>] (nmi_trigger_cpumask_backtrace) from [<802105b4>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851)
r9:8260c6f4 r8:000166c1 r7:8289dfe0 r6:00007f0f r5:847d6204 r4:82e0e924
[<8021059c>] (arch_trigger_cpumask_backtrace) from [<8034eac8>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline])
[<8021059c>] (arch_trigger_cpumask_backtrace) from [<8034eac8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline])
[<8021059c>] (arch_trigger_cpumask_backtrace) from [<8034eac8>] (watchdog+0x480/0x594 kernel/hung_task.c:380)
[<8034e648>] (watchdog) from [<80270044>] (kthread+0x104/0x134 kernel/kthread.c:388)
r10:00000000 r9:df819e58 r8:82f18840 r7:00000000 r6:8034e648 r5:82e50c00
r4:82ebedc0
[<8026ff40>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30 arch/arm/kernel/entry-common.S:134)
Exception stack(0xdf8ddfb0 to 0xdf8ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026ff40 r4:82ebedc0
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 2812 Comm: syslogd Not tainted 6.9.0-rc1-syzkaller #0
Hardware name: ARM-Versatile Express
PC is at file_has_perm+0x28/0xfc security/selinux/hooks.c:1733
LR is at selinux_revalidate_file_permission security/selinux/hooks.c:3621 [inline]
LR is at selinux_file_permission+0xc8/0x110 security/selinux/hooks.c:3642
pc : [<806d2800>] lr : [<806db2f8>] psr: 60000013
sp : ebdf9e20 ip : ebdf9e68 fp : ebdf9e64
r10: 00000001 r9 : 00000047 r8 : 00000004
r7 : 00000002 r6 : 82199dc0 r5 : 00000004 r4 : 843b50c0
r3 : 83f28c00 r2 : 00000002 r1 : 194bedd7 r0 : 83804580
Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
Control: 30c5387d Table: 8404bf00 DAC: fffffffd
Call trace:
[<806d27d8>] (file_has_perm) from [<806db2f8>] (selinux_revalidate_file_permission security/selinux/hooks.c:3621 [inline])
[<806d27d8>] (file_has_perm) from [<806db2f8>] (selinux_file_permission+0xc8/0x110 security/selinux/hooks.c:3642)
r8:00000004 r7:83f28c00 r6:82f1f394 r5:00000004 r4:843b50c0
[<806db230>] (selinux_file_permission) from [<806cc804>] (security_file_permission+0x38/0x54 security/security.c:2695)
r9:83f28c00 r8:010ac1d0 r7:00000000 r6:843b50c0 r5:00000004 r4:8219a2bc
[<806cc7cc>] (security_file_permission) from [<804f4b5c>] (rw_verify_area+0x5c/0x144 fs/read_write.c:377)
r7:00000000 r6:83f28c00 r5:00000004 r4:843b50c0
[<804f4b00>] (rw_verify_area) from [<804f67e8>] (vfs_read+0x6c/0x314 fs/read_write.c:467)
r5:000000ff r4:843b50c0
[<804f677c>] (vfs_read) from [<804f74e0>] (ksys_read+0xc4/0xf8 fs/read_write.c:619)
r10:00000003 r9:83f28c00 r8:80200288 r7:000000ff r6:010ac1d0 r5:843b50c0
r4:843b50c0
[<804f741c>] (ksys_read) from [<804f7524>] (__do_sys_read fs/read_write.c:629 [inline])
[<804f741c>] (ksys_read) from [<804f7524>] (sys_read+0x10/0x14 fs/read_write.c:627)
r7:00000003 r6:010ac2d0 r5:76fcd5a0 r4:fffffc00
[<804f7514>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:66)
Exception stack(0xebdf9fa8 to 0xebdf9ff0)
9fa0: fffffc00 76fcd5a0 00000000 010ac1d0 000000ff 00000000
9fc0: fffffc00 76fcd5a0 010ac2d0 00000003 00000000 010ac1c8 76f9854c 76f98548
9fe0: 76f979f8 7ee02c70 76f0d2ec 76e1b2fc