INFO: task syz.1.1334:10982 blocked for more than 430 seconds.
      Not tainted 6.12.0-rc1-syzkaller-00010-gc05ad457ce8c #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.1.1334      state:D stack:0     pid:10982 tgid:10982 ppid:3181   flags:0x00000004
Call Trace:
[<ffffffff85fe3a74>] context_switch kernel/sched/core.c:5315 [inline]
[<ffffffff85fe3a74>] __schedule+0xd5a/0x3886 kernel/sched/core.c:6675
[<ffffffff85fe6664>] __schedule_loop kernel/sched/core.c:6752 [inline]
[<ffffffff85fe6664>] schedule+0xc4/0x324 kernel/sched/core.c:6767
[<ffffffff85ff9412>] schedule_timeout+0x1e2/0x296 kernel/time/timer.c:2591
[<ffffffff85fe8042>] do_wait_for_common kernel/sched/completion.c:95 [inline]
[<ffffffff85fe8042>] __wait_for_common+0x1ca/0x4b6 kernel/sched/completion.c:116
[<ffffffff85fe8348>] wait_for_common kernel/sched/completion.c:127 [inline]
[<ffffffff85fe8348>] wait_for_completion+0x1a/0x22 kernel/sched/completion.c:148
[<ffffffff846d7512>] __vhost_worker_flush+0x204/0x274 drivers/vhost/vhost.c:288
[<ffffffff846d7636>] vhost_worker_flush drivers/vhost/vhost.c:295 [inline]
[<ffffffff846d7636>] vhost_dev_flush+0xb4/0x114 drivers/vhost/vhost.c:305
[<ffffffff846c811a>] vhost_vsock_flush drivers/vhost/vsock.c:697 [inline]
[<ffffffff846c811a>] vhost_vsock_dev_release+0x234/0x434 drivers/vhost/vsock.c:749
[<ffffffff80a2c758>] __fput+0x378/0x9e6 fs/file_table.c:431
[<ffffffff80a2ce6c>] ____fput+0x1c/0x26 fs/file_table.c:459
[<ffffffff8014fb7c>] task_work_run+0x16a/0x25e kernel/task_work.c:228
[<ffffffff85fdac68>] resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
[<ffffffff85fdac68>] exit_to_user_mode_loop kernel/entry/common.c:114 [inline]
[<ffffffff85fdac68>] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
[<ffffffff85fdac68>] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
[<ffffffff85fdac68>] syscall_exit_to_user_mode+0x30a/0x31e kernel/entry/common.c:218
[<ffffffff85fd9b26>] do_trap_ecall_u+0x86/0x216 arch/riscv/kernel/traps.c:345
[<ffffffff85ffcac6>] _new_vmalloc_restore_context_a0+0xc2/0xce

Showing all locks held in the system:
1 lock held by khungtaskd/37:
 #0: ffffffff87fcc100 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x68/0x2d6 kernel/locking/lockdep.c:6716
1 lock held by klogd/2998:
2 locks held by getty/3142:
 #0: ff6000001cad90a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3a/0x46 drivers/tty/tty_ldsem.c:340
 #1: ff2000000008b2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xd7c/0x129a drivers/tty/n_tty.c:2211
1 lock held by syz-executor/3175:
3 locks held by kworker/1:0/8420:
2 locks held by kworker/0:1/10299:
3 locks held by syz-executor/11026:
1 lock held by syz.0.1355/11197:
 #0: ff60000019be24c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x12c/0x600 block/bdev.c:1087
1 lock held by syz.0.1355/11213:
 #0: ff60000019be24c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x672/0xfa8 block/bdev.c:904
5 locks held by kworker/0:5/11841:
2 locks held by syz.0.1391/11881:
1 lock held by syz-executor/11899:
2 locks held by dhcpcd-run-hook/12279:

=============================================

NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 37 Comm: khungtaskd Not tainted 6.12.0-rc1-syzkaller-00010-gc05ad457ce8c #0
Hardware name: riscv-virtio,qemu (DT)
Call Trace:
[<ffffffff80010a14>] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:130
[<ffffffff85f7c3cc>] show_stack+0x34/0x40 arch/riscv/kernel/stacktrace.c:136
[<ffffffff85fd797a>] __dump_stack lib/dump_stack.c:94 [inline]
[<ffffffff85fd797a>] dump_stack_lvl+0x122/0x196 lib/dump_stack.c:120
[<ffffffff85fd7a0a>] dump_stack+0x1c/0x24 lib/dump_stack.c:129
[<ffffffff85f3faae>] nmi_cpu_backtrace+0x39c/0x39e lib/nmi_backtrace.c:113
[<ffffffff85f3fd66>] nmi_trigger_cpumask_backtrace+0x2b6/0x456 lib/nmi_backtrace.c:62
[<ffffffff80019974>] arch_trigger_cpumask_backtrace+0x2c/0x3c arch/riscv/kernel/smp.c:347
[<ffffffff80432c3c>] trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]
[<ffffffff80432c3c>] check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]
[<ffffffff80432c3c>] watchdog+0xcfa/0x1178 kernel/hung_task.c:379
[<ffffffff80154e14>] kthread+0x28c/0x3a6 kernel/kthread.c:389
[<ffffffff85ffcbde>] ret_from_fork+0xe/0x18 arch/riscv/kernel/entry.S:326
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 11899 Comm: syz-executor Not tainted 6.12.0-rc1-syzkaller-00010-gc05ad457ce8c #0
Hardware name: riscv-virtio,qemu (DT)
epc : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
epc : _raw_spin_unlock_irqrestore+0x36/0xd6 kernel/locking/spinlock.c:194
 ra : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
 ra : _raw_spin_unlock_irqrestore+0x86/0xd6 kernel/locking/spinlock.c:194
epc : ffffffff85ffb7aa ra : ffffffff85ffb7fa sp : ff200000076e6400
 gp : ffffffff897bea80 tp : ff6000001b458000 t0 : ff6000001b458b20
 t1 : fffffffef1023e28 t2 : 0000000000000011 s0 : ff200000076e6420
 s1 : 0000000000000002 a0 : 0000000000000001 a1 : ffffffff8643e620
 a2 : 0000000000000006 a3 : 0000000000000001 a4 : 0000000000000001
 a5 : 0000000000000000 a6 : ff6000001b458b68 a7 : 1fec00000368b16d
 s2 : ffffffff8811f140 s3 : 000000000000c108 s4 : 0000000000001dac
 s5 : ffffffff879228d8 s6 : 0000000000000002 s7 : 00000000000000b0
 s8 : 0000000000000002 s9 : ff200000076e6b60 s10: 0000000000000000
 s11: 0000000200000022 t3 : 1fec00000368b163 t4 : fffffffef1023e28
 t5 : fffffffef1023e29 t6 : 1fec00000368b172
status: 0000000200000120 badaddr: 0000000000000000 cause: 8000000000000001
[<ffffffff85ffb7aa>] arch_local_irq_restore arch/riscv/include/asm/irqflags.h:51 [inline]
[<ffffffff85ffb7aa>] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
[<ffffffff85ffb7aa>] _raw_spin_unlock_irqrestore+0x36/0xd6 kernel/locking/spinlock.c:194
[<ffffffff807c22bc>] spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]
[<ffffffff807c22bc>] pcpu_alloc_noprof+0x8c4/0x1c84 mm/percpu.c:1867
[<ffffffff854dff3a>] fib_nh_common_init+0xae/0x2b4 net/ipv4/fib_semantics.c:590
[<ffffffff854e5ca6>] fib_nh_init+0xaa/0x466 net/ipv4/fib_semantics.c:629
[<ffffffff854ebb0c>] fib_create_info+0x2944/0x4d6c net/ipv4/fib_semantics.c:1495
[<ffffffff855020ae>] fib_table_insert+0x1d0/0x1cc8 net/ipv4/fib_trie.c:1237
[<ffffffff854d5dae>] fib_magic+0x4d2/0x59e net/ipv4/fib_frontend.c:1104
[<ffffffff854dd72a>] fib_add_ifaddr+0x14c/0x4e4 net/ipv4/fib_frontend.c:1126
[<ffffffff854ddf2c>] fib_netdev_event+0x46a/0x6de net/ipv4/fib_frontend.c:1486
[<ffffffff80160b10>] notifier_call_chain+0x19c/0x58e kernel/notifier.c:93
[<ffffffff80161088>] raw_notifier_call_chain+0x2a/0x38 kernel/notifier.c:461
[<ffffffff84d0d852>] call_netdevice_notifiers_info+0xbe/0x144 net/core/dev.c:1996
[<ffffffff84d2a386>] call_netdevice_notifiers_extack net/core/dev.c:2034 [inline]
[<ffffffff84d2a386>] call_netdevice_notifiers net/core/dev.c:2048 [inline]
[<ffffffff84d2a386>] __dev_notify_flags+0x11a/0x28c net/core/dev.c:8876
[<ffffffff84d2bf30>] dev_change_flags+0xdc/0x136 net/core/dev.c:8914
[<ffffffff84d6e2f6>] do_setlink+0x1968/0x3fe0 net/core/rtnetlink.c:2900
[<ffffffff84d82dc0>] __rtnl_newlink+0xb7a/0x1738 net/core/rtnetlink.c:3696
[<ffffffff84d839ea>] rtnl_newlink+0x6c/0xa2 net/core/rtnetlink.c:3743
[<ffffffff84d7259a>] rtnetlink_rcv_msg+0x428/0xdbe net/core/rtnetlink.c:6646
[<ffffffff850b3e8e>] netlink_rcv_skb+0x216/0x3dc net/netlink/af_netlink.c:2550
[<ffffffff84d6454c>] rtnetlink_rcv+0x26/0x30 net/core/rtnetlink.c:6664
[<ffffffff850b2140>] netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline]
[<ffffffff850b2140>] netlink_unicast+0x4f0/0x82c net/netlink/af_netlink.c:1357
[<ffffffff850b2ce0>] netlink_sendmsg+0x864/0xdc6 net/netlink/af_netlink.c:1901
[<ffffffff84c5e82a>] sock_sendmsg_nosec net/socket.c:729 [inline]
[<ffffffff84c5e82a>] __sock_sendmsg+0xcc/0x160 net/socket.c:744
[<ffffffff84c653a6>] __sys_sendto+0x230/0x320 net/socket.c:2209
[<ffffffff84c65556>] __do_sys_sendto net/socket.c:2221 [inline]
[<ffffffff84c65556>] __se_sys_sendto net/socket.c:2217 [inline]
[<ffffffff84c65556>] __riscv_sys_sendto+0xc0/0x158 net/socket.c:2217
[<ffffffff8000f2d4>] syscall_handler+0x94/0x118 arch/riscv/include/asm/syscall.h:90
[<ffffffff85fd9c4a>] do_trap_ecall_u+0x1aa/0x216 arch/riscv/kernel/traps.c:331
[<ffffffff85ffcac6>] _new_vmalloc_restore_context_a0+0xc2/0xce