INFO: task syz-executor.0:18330 blocked for more than 430 seconds. Not tainted 6.10.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.0 state:D stack:0 pid:18330 tgid:18329 ppid:13024 flags:0x00000005 Call trace: [<818f5efc>] (__schedule) from [<818f6b00>] (__schedule_loop kernel/sched/core.c:6822 [inline]) [<818f5efc>] (__schedule) from [<818f6b00>] (schedule+0x2c/0xfc kernel/sched/core.c:6837) r10:00000000 r9:00000000 r8:827c6a08 r7:00000002 r6:dfc19b8c r5:84222400 r4:84222400 [<818f6ad4>] (schedule) from [<818f7110>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6894) r5:84222400 r4:827c6a04 [<818f70f8>] (schedule_preempt_disabled) from [<818f99f8>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<818f70f8>] (schedule_preempt_disabled) from [<818f99f8>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<818f9710>] (__mutex_lock.constprop.0) from [<818fa2c4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:00000000 r9:00000000 r8:82907e98 r7:860aa0c0 r6:00000002 r5:00000008 r4:84da26c0 [<818fa2b0>] (__mutex_lock_slowpath) from [<818fa304>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<818fa2c8>] (mutex_lock) from [<81418b60>] (rtnl_lock net/core/rtnetlink.c:79 [inline]) [<818fa2c8>] (mutex_lock) from [<81418b60>] (rtnetlink_rcv_msg+0xf8/0x330 net/core/rtnetlink.c:6632) [<81418a68>] (rtnetlink_rcv_msg) from [<814edf0c>] (netlink_rcv_skb+0xc0/0x120 net/netlink/af_netlink.c:2564) r10:00000000 r9:00000000 r8:83fe3fc0 r7:0000001c r6:84da26c0 r5:81418a68 r4:860aa0c0 [<814ede4c>] (netlink_rcv_skb) from [<81417038>] (rtnetlink_rcv+0x18/0x1c net/core/rtnetlink.c:6653) r7:860aa0c0 r6:862f2c00 r5:0000001c r4:85107000 [<81417020>] (rtnetlink_rcv) from [<814ed704>] (netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]) [<81417020>] (rtnetlink_rcv) from [<814ed704>] (netlink_unicast+0x198/0x294 net/netlink/af_netlink.c:1361) [<814ed56c>] (netlink_unicast) from [<814ed9dc>] (netlink_sendmsg+0x1dc/0x434 net/netlink/af_netlink.c:1905) r9:00000000 r8:00000000 r7:84cc1c00 r6:0000001c r5:860aa0c0 r4:dfc19f38 [<814ed800>] (netlink_sendmsg) from [<813d11e8>] (sock_sendmsg_nosec net/socket.c:730 [inline]) [<814ed800>] (netlink_sendmsg) from [<813d11e8>] (__sock_sendmsg+0x44/0x78 net/socket.c:745) r10:00000000 r9:dfc19dd4 r8:dfc19dd4 r7:00000000 r6:849c3180 r5:dfc19f38 r4:00000000 [<813d11a4>] (__sock_sendmsg) from [<813d20fc>] (____sys_sendmsg+0x250/0x2cc net/socket.c:2585) r7:00000000 r6:00000000 r5:849c3180 r4:dfc19f38 [<813d1eac>] (____sys_sendmsg) from [<813d3f90>] (___sys_sendmsg+0x9c/0xd0 net/socket.c:2639) r10:dfc19e34 r9:20000340 r8:00000000 r7:00000000 r6:849c3180 r5:dfc19f38 r4:00000000 [<813d3ef4>] (___sys_sendmsg) from [<813d44a8>] (__sys_sendmsg net/socket.c:2668 [inline]) [<813d3ef4>] (___sys_sendmsg) from [<813d44a8>] (__do_sys_sendmsg net/socket.c:2677 [inline]) [<813d3ef4>] (___sys_sendmsg) from [<813d44a8>] (sys_sendmsg+0x78/0xbc net/socket.c:2675) r10:00000128 r9:84222400 r8:8020029c r7:00000000 r6:20000340 r5:849c3180 r4:00000000 [<813d4430>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xdfc19fa8 to 0xdfc19ff0) 9fa0: 00000000 00000000 00000004 20000340 00000000 00000000 9fc0: 00000000 00000000 001542c8 00000128 7ef54336 7ef54337 003d0f00 76b7d0fc 9fe0: 76b7cf08 76b7cef8 00016f30 00051660 r7:00000128 r6:001542c8 r5:00000000 r4:00000000 NMI backtrace for cpu 1 CPU: 1 PID: 32 Comm: khungtaskd Not tainted 6.10.0-rc3-syzkaller #0 Hardware name: ARM-Versatile Express Call trace: [<818d47b8>] (dump_backtrace) from [<818d48b4>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000013 r5:60000093 r4:81fe14e0 [<818d489c>] (show_stack) from [<818f1f00>] (__dump_stack lib/dump_stack.c:88 [inline]) [<818d489c>] (show_stack) from [<818f1f00>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:114) [<818f1e90>] (dump_stack_lvl) from [<818f1f24>] (dump_stack+0x18/0x1c lib/dump_stack.c:123) r5:00000001 r4:00000001 [<818f1f0c>] (dump_stack) from [<818c1ab4>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<818c1954>] (nmi_cpu_backtrace) from [<818c1c00>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8260c5d0 r5:8261a7cc r4:ffffffff [<818c1ad0>] (nmi_trigger_cpumask_backtrace) from [<802103c8>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:827e5827 r8:828a51a0 r7:8260c734 r6:00007f47 r5:8261ad88 r4:840c821c [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80352648>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80352648>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]) [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80352648>] (watchdog+0x48c/0x59c kernel/hung_task.c:379) [<803521bc>] (watchdog) from [<80271228>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df819e58 r8:82ec1a80 r7:00000000 r6:803521bc r5:82ee1800 r4:82ec1980 [<80271124>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:134) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80271124 r4:82ec1980 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 2817 Comm: syslogd Not tainted 6.10.0-rc3-syzkaller #0 Hardware name: ARM-Versatile Express PC is at vector_swi+0x58/0x80 arch/arm/kernel/entry-common.S:190 LR is at 0x76e0b39c pc : [<802001d8>] lr : [<76e0b39c>] psr: 60000013 sp : ec6c9fb0 ip : 30c5387d fp : 00000000 r10: 30c5387d r9 : 76e0b39c r8 : 60000010 r7 : 00000004 r6 : 76f88548 r5 : 76fc05a0 r4 : 00000003 r3 : 00000000 r2 : 00000091 r1 : 01aa64d0 r0 : 00000003 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 844150c0 DAC: fffffffd Call trace: no frame pointer