INFO: task syz-executor:10475 blocked for more than 430 seconds. Not tainted 6.11.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor state:D stack:0 pid:10475 tgid:10475 ppid:10474 flags:0x00000000 Call trace: [<8197ecc8>] (__schedule) from [<8197f860>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ecc8>] (__schedule) from [<8197f860>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:84fa9e10 r9:00000000 r8:8277ab8c r7:00000002 r6:eb3f9dec r5:856aa400 r4:856aa400 [<8197f834>] (schedule) from [<8197fc14>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:856aa400 r4:8277ab88 [<8197fbfc>] (schedule_preempt_disabled) from [<819826ec>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fbfc>] (schedule_preempt_disabled) from [<819826ec>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<81982404>] (__mutex_lock.constprop.0) from [<81982fb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:84fa9e10 r9:00000000 r8:00000000 r7:eb3f9f08 r6:84fa9e00 r5:00000001 r4:8277ab88 [<81982fa4>] (__mutex_lock_slowpath) from [<81982ff8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<81982fbc>] (mutex_lock) from [<80d714fc>] (del_device_store+0x60/0x188 drivers/net/netdevsim/bus.c:216) [<80d7149c>] (del_device_store) from [<80a7aaa0>] (bus_attr_store+0x2c/0x38 drivers/base/bus.c:170) r5:00000001 r4:80d7149c [<80a7aa74>] (bus_attr_store) from [<805c8cb8>] (sysfs_kf_write+0x40/0x4c fs/sysfs/file.c:136) r5:00000001 r4:80a7aa74 [<805c8c78>] (sysfs_kf_write) from [<805c7fb8>] (kernfs_fop_write_iter+0x114/0x200 fs/kernfs/file.c:334) r5:00000001 r4:85327880 [<805c7ea4>] (kernfs_fop_write_iter) from [<80507f54>] (new_sync_write fs/read_write.c:497 [inline]) [<805c7ea4>] (kernfs_fop_write_iter) from [<80507f54>] (vfs_write+0x274/0x44c fs/read_write.c:590) r10:81a22608 r9:7e81d168 r8:eb3f9f68 r7:856aa400 r6:00000001 r5:852263c0 r4:805c7ea4 [<80507ce0>] (vfs_write) from [<805082b0>] (ksys_write+0x78/0xf8 fs/read_write.c:643) r10:00000004 r9:856aa400 r8:8020029c r7:00000000 r6:00000000 r5:852263c0 r4:852263c0 [<80508238>] (ksys_write) from [<80508340>] (__do_sys_write fs/read_write.c:655 [inline]) [<80508238>] (ksys_write) from [<80508340>] (sys_write+0x10/0x14 fs/read_write.c:652) r7:00000004 r6:00000001 r5:00189350 r4:00000005 [<80508330>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xeb3f9fa8 to 0xeb3f9ff0) 9fa0: 00000005 00189350 00000005 7e81d168 00000001 00000001 9fc0: 00000005 00189350 00000001 00000004 00000002 0018909c 7e81d834 00000003 9fe0: 00000158 7e81d148 00013ab8 00130d30 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller #0 Hardware name: ARM-Versatile Express Call trace: [<8195d0e0>] (dump_backtrace) from [<8195d1dc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000013 r5:60000093 r4:8200ca8c [<8195d1c4>] (show_stack) from [<8197af1c>] (__dump_stack lib/dump_stack.c:93 [inline]) [<8195d1c4>] (show_stack) from [<8197af1c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:119) [<8197aeac>] (dump_stack_lvl) from [<8197af40>] (dump_stack+0x18/0x1c lib/dump_stack.c:128) r5:00000001 r4:00000001 [<8197af28>] (dump_stack) from [<8194a3d0>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<8194a270>] (nmi_cpu_backtrace) from [<8194a51c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8260c5d0 r5:8261a88c r4:ffffffff [<8194a3ec>] (nmi_trigger_cpumask_backtrace) from [<802103c8>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:00013c0f r8:828b3130 r7:8260c734 r6:00007e3f r5:8261ae48 r4:85e71a1c [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]) [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (watchdog+0x498/0x5b8 kernel/hung_task.c:379) [<80350998>] (watchdog) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df819e58 r8:82e9e240 r7:00000000 r6:80350998 r5:82ee0c00 r4:82f3a040 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:82f3a040 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 3100 Comm: sshd Not tainted 6.11.0-rc6-syzkaller #0 Hardware name: ARM-Versatile Express PC is at receive_mergeable drivers/net/virtio_net.c:2259 [inline] PC is at receive_buf+0x2ac/0x118c drivers/net/virtio_net.c:2394 LR is at 0x10000 pc : [<80c73590>] lr : [<00010000>] psr: 20000113 sp : df801cd0 ip : 00000014 fp : df801d74 r10: 828bdf40 r9 : 00000001 r8 : 84656c10 r7 : 0009e418 r6 : dde97340 r5 : 83e49680 r4 : df801dc8 r3 : dde9735c r2 : 00000003 r1 : 00000000 r0 : 846e8900 Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84646140 DAC: fffffffd Call trace: frame pointer underflow [<80c732e4>] (receive_buf) from [<80c75924>] (virtnet_receive_packets drivers/net/virtio_net.c:2699 [inline]) [<80c732e4>] (receive_buf) from [<80c75924>] (virtnet_receive drivers/net/virtio_net.c:2723 [inline]) [<80c732e4>] (receive_buf) from [<80c75924>] (virtnet_poll+0x9c8/0xef8 drivers/net/virtio_net.c:2818) r10:83e49680 r9:82f03808 r8:df801dc0 r7:84656c10 r6:82f03800 r5:00000001 r4:df801dbc [<80c74f5c>] (virtnet_poll) from [<81486550>] (__napi_poll+0x34/0x240 net/core/dev.c:6772) r10:dddd0f80 r9:dddd11c0 r8:df801ea0 r7:df801e9b r6:00000040 r5:82f03808 r4:00000001 [<8148651c>] (__napi_poll) from [<81486d88>] (napi_poll net/core/dev.c:6841 [inline]) [<8148651c>] (__napi_poll) from [<81486d88>] (net_rx_action+0x338/0x420 net/core/dev.c:6963) r9:dddd11c0 r8:df801ea0 r7:0000012c r6:00013c11 r5:82f03808 r4:00000000 [<81486a50>] (net_rx_action) from [<8024b5e8>] (handle_softirqs+0x15c/0x468 kernel/softirq.c:554) r10:00000008 r9:83db1800 r8:00000100 r7:00400100 r6:00000003 r5:00000004 r4:8260408c [<8024b48c>] (handle_softirqs) from [<8024b9e4>] (__do_softirq kernel/softirq.c:588 [inline]) [<8024b48c>] (handle_softirqs) from [<8024b9e4>] (invoke_softirq kernel/softirq.c:428 [inline]) [<8024b48c>] (handle_softirqs) from [<8024b9e4>] (__irq_exit_rcu+0xa4/0x164 kernel/softirq.c:637) r10:7ec5027c r9:7ec501fc r8:00000000 r7:df971fb0 r6:821ad868 r5:821ed8f0 r4:83db1800 [<8024b940>] (__irq_exit_rcu) from [<8024bce4>] (irq_exit+0x10/0x18 kernel/softirq.c:661) r5:821ed8f0 r4:824b8c1c [<8024bcd4>] (irq_exit) from [<8197b7fc>] (generic_handle_arch_irq+0x7c/0x80 kernel/irq/handle.c:240) [<8197b780>] (generic_handle_arch_irq) from [<8192cb7c>] (call_with_stack+0x1c/0x20 arch/arm/lib/call_with_stack.S:40) r9:7ec501fc r8:824ae044 r7:83db1800 r6:ffffffff r5:60000010 r4:76bbb39c [<8192cb60>] (call_with_stack) from [<80200f48>] (__irq_usr+0x88/0xa0 arch/arm/kernel/entry-armv.S:436) Exception stack(0xdf971fb0 to 0xdf971ff8) 1fa0: 000000c4 01bc4780 000000c4 00000000 1fc0: 01b9ed88 76fc7c80 00000455 00000004 00000001 7ec501fc 7ec5027c 00000000 1fe0: 00560db0 7ec50180 004e3adc 76bbb39c 60000010 ffffffff