INFO: task syz-executor.1:10708 blocked for more than 430 seconds. Not tainted 6.9.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.1 state:D stack:0 pid:10708 tgid:10706 ppid:4666 flags:0x00000005 Call trace: [<8189abc0>] (__schedule) from [<80281ddc>] (__schedule_loop kernel/sched/core.c:6823 [inline]) [<8189abc0>] (__schedule) from [<80281ddc>] (rt_mutex_schedule+0x20/0x38 kernel/sched/core.c:7115) r10:83e6d400 r9:00000000 r8:00000002 r7:00000000 r6:e8bd9db0 r5:83ea0000 r4:83ea0000 [<80281dbc>] (rt_mutex_schedule) from [<818a123c>] (rt_mutex_slowlock_block.constprop.0+0x38/0x160 kernel/locking/rtmutex.c:1636) r5:83ea0000 r4:82f9ec54 [<818a1204>] (rt_mutex_slowlock_block.constprop.0) from [<818a24c4>] (__rt_mutex_slowlock kernel/locking/rtmutex.c:1704 [inline]) [<818a1204>] (rt_mutex_slowlock_block.constprop.0) from [<818a24c4>] (__rt_mutex_slowlock_locked kernel/locking/rtmutex.c:1740 [inline]) [<818a1204>] (rt_mutex_slowlock_block.constprop.0) from [<818a24c4>] (rt_mutex_slowlock.constprop.0+0xec/0x2cc kernel/locking/rtmutex.c:1778) r10:85b5e840 r9:60000013 r8:00000002 r7:e8bd9db0 r6:83ea0000 r5:82f9ec54 r4:00000000 r3:e8bd9db0 [<818a23d8>] (rt_mutex_slowlock.constprop.0) from [<818a2788>] (__rt_mutex_lock kernel/locking/rtmutex.c:1793 [inline]) [<818a23d8>] (rt_mutex_slowlock.constprop.0) from [<818a2788>] (__rt_mutex_lock_common kernel/locking/rtmutex_api.c:31 [inline]) [<818a23d8>] (rt_mutex_slowlock.constprop.0) from [<818a2788>] (rt_mutex_lock+0x44/0x48 kernel/locking/rtmutex_api.c:71) r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:00000000 r4:82f9ec40 [<818a2744>] (rt_mutex_lock) from [<80f72fdc>] (i2c_adapter_lock_bus+0x14/0x18 drivers/i2c/i2c-core-base.c:845) [<80f72fc8>] (i2c_adapter_lock_bus) from [<80f78598>] (i2c_lock_bus include/linux/i2c.h:792 [inline]) [<80f72fc8>] (i2c_adapter_lock_bus) from [<80f78598>] (__i2c_lock_bus_helper drivers/i2c/i2c-core.h:46 [inline]) [<80f72fc8>] (i2c_adapter_lock_bus) from [<80f78598>] (i2c_smbus_xfer+0xa4/0x12c drivers/i2c/i2c-core-smbus.c:541) [<80f784f4>] (i2c_smbus_xfer) from [<80f7a3dc>] (i2cdev_ioctl_smbus+0x198/0x334 drivers/i2c/i2c-dev.c:348) r8:00000003 r7:00000000 r6:00000000 r5:857ff800 r4:00000000 [<80f7a244>] (i2cdev_ioctl_smbus) from [<80f7a824>] (i2cdev_ioctl+0x2ac/0x390 drivers/i2c/i2c-dev.c:467) r10:85b5e840 r9:83ea0000 r8:00000003 r7:20000340 r6:00000720 r5:857ff800 r4:20000340 [<80f7a578>] (i2cdev_ioctl) from [<8050fbdc>] (vfs_ioctl fs/ioctl.c:51 [inline]) [<80f7a578>] (i2cdev_ioctl) from [<8050fbdc>] (do_vfs_ioctl fs/ioctl.c:858 [inline]) [<80f7a578>] (i2cdev_ioctl) from [<8050fbdc>] (__do_sys_ioctl fs/ioctl.c:902 [inline]) [<80f7a578>] (i2cdev_ioctl) from [<8050fbdc>] (sys_ioctl+0x118/0xc24 fs/ioctl.c:890) r6:85b5e841 r5:00000000 r4:00000720 [<8050fac4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:66) Exception stack(0xe8bd9fa8 to 0xe8bd9ff0) 9fa0: 00000000 00000000 00000003 00000720 20000340 00000000 9fc0: 00000000 00000000 0014c2c8 00000036 7eac532e 7eac532f 003d0f00 76b930fc 9fe0: 76b92f08 76b92ef8 000167f8 00050bc0 r10:00000036 r9:83ea0000 r8:80200288 r7:00000036 r6:0014c2c8 r5:00000000 r4:00000000 NMI backtrace for cpu 1 CPU: 1 PID: 31 Comm: khungtaskd Not tainted 6.9.0-rc1-syzkaller #0 Hardware name: ARM-Versatile Express Call trace: [<8187943c>] (dump_backtrace) from [<81879538>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:256) r7:00000000 r6:00000013 r5:60000093 r4:81fc474c [<81879520>] (show_stack) from [<81896cf0>] (__dump_stack lib/dump_stack.c:88 [inline]) [<81879520>] (show_stack) from [<81896cf0>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:114) [<81896c80>] (dump_stack_lvl) from [<81896d14>] (dump_stack+0x18/0x1c lib/dump_stack.c:123) r5:00000001 r4:00000001 [<81896cfc>] (dump_stack) from [<81866814>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<818666b4>] (nmi_cpu_backtrace) from [<81866960>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8260c590 r5:8261a88c r4:ffffffff [<81866830>] (nmi_trigger_cpumask_backtrace) from [<802105b4>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:8260c6f4 r8:000166c1 r7:8289dfe0 r6:00007f0f r5:847d6204 r4:82e0e924 [<8021059c>] (arch_trigger_cpumask_backtrace) from [<8034eac8>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<8021059c>] (arch_trigger_cpumask_backtrace) from [<8034eac8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]) [<8021059c>] (arch_trigger_cpumask_backtrace) from [<8034eac8>] (watchdog+0x480/0x594 kernel/hung_task.c:380) [<8034e648>] (watchdog) from [<80270044>] (kthread+0x104/0x134 kernel/kthread.c:388) r10:00000000 r9:df819e58 r8:82f18840 r7:00000000 r6:8034e648 r5:82e50c00 r4:82ebedc0 [<8026ff40>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30 arch/arm/kernel/entry-common.S:134) Exception stack(0xdf8ddfb0 to 0xdf8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026ff40 r4:82ebedc0 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 2812 Comm: syslogd Not tainted 6.9.0-rc1-syzkaller #0 Hardware name: ARM-Versatile Express PC is at file_has_perm+0x28/0xfc security/selinux/hooks.c:1733 LR is at selinux_revalidate_file_permission security/selinux/hooks.c:3621 [inline] LR is at selinux_file_permission+0xc8/0x110 security/selinux/hooks.c:3642 pc : [<806d2800>] lr : [<806db2f8>] psr: 60000013 sp : ebdf9e20 ip : ebdf9e68 fp : ebdf9e64 r10: 00000001 r9 : 00000047 r8 : 00000004 r7 : 00000002 r6 : 82199dc0 r5 : 00000004 r4 : 843b50c0 r3 : 83f28c00 r2 : 00000002 r1 : 194bedd7 r0 : 83804580 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 8404bf00 DAC: fffffffd Call trace: [<806d27d8>] (file_has_perm) from [<806db2f8>] (selinux_revalidate_file_permission security/selinux/hooks.c:3621 [inline]) [<806d27d8>] (file_has_perm) from [<806db2f8>] (selinux_file_permission+0xc8/0x110 security/selinux/hooks.c:3642) r8:00000004 r7:83f28c00 r6:82f1f394 r5:00000004 r4:843b50c0 [<806db230>] (selinux_file_permission) from [<806cc804>] (security_file_permission+0x38/0x54 security/security.c:2695) r9:83f28c00 r8:010ac1d0 r7:00000000 r6:843b50c0 r5:00000004 r4:8219a2bc [<806cc7cc>] (security_file_permission) from [<804f4b5c>] (rw_verify_area+0x5c/0x144 fs/read_write.c:377) r7:00000000 r6:83f28c00 r5:00000004 r4:843b50c0 [<804f4b00>] (rw_verify_area) from [<804f67e8>] (vfs_read+0x6c/0x314 fs/read_write.c:467) r5:000000ff r4:843b50c0 [<804f677c>] (vfs_read) from [<804f74e0>] (ksys_read+0xc4/0xf8 fs/read_write.c:619) r10:00000003 r9:83f28c00 r8:80200288 r7:000000ff r6:010ac1d0 r5:843b50c0 r4:843b50c0 [<804f741c>] (ksys_read) from [<804f7524>] (__do_sys_read fs/read_write.c:629 [inline]) [<804f741c>] (ksys_read) from [<804f7524>] (sys_read+0x10/0x14 fs/read_write.c:627) r7:00000003 r6:010ac2d0 r5:76fcd5a0 r4:fffffc00 [<804f7514>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:66) Exception stack(0xebdf9fa8 to 0xebdf9ff0) 9fa0: fffffc00 76fcd5a0 00000000 010ac1d0 000000ff 00000000 9fc0: fffffc00 76fcd5a0 010ac2d0 00000003 00000000 010ac1c8 76f9854c 76f98548 9fe0: 76f979f8 7ee02c70 76f0d2ec 76e1b2fc