INFO: task syz-executor.1:2225 blocked for more than 430 seconds. Not tainted 5.19.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.1 state:D stack: 0 pid: 2225 ppid: 1 flags:0x00000001 Backtrace: [<8171bca8>] (__schedule) from [<8171c794>] (schedule+0x5c/0xac kernel/sched/core.c:6566) r10:00000034 r9:8568d7c8 r8:df989e8c r7:00000002 r6:824f1f40 r5:824f2054 r4:841bd240 [<8171c738>] (schedule) from [<802ce194>] (synchronize_rcu_expedited+0x1c0/0x370 kernel/rcu/tree_exp.h:955) r5:824f2054 r4:00001914 [<802cdfd4>] (synchronize_rcu_expedited) from [<804c56f4>] (namespace_unlock+0xc4/0x16c fs/namespace.c:1497) r8:80200288 r7:00000034 r6:8c97b800 r5:82405cc0 r4:df989eec [<804c5630>] (namespace_unlock) from [<804c6be8>] (do_umount fs/namespace.c:1720 [inline]) [<804c5630>] (namespace_unlock) from [<804c6be8>] (path_umount+0x278/0x598 fs/namespace.c:1802) r6:8c97b800 r5:82405cc0 r4:0000000a [<804c6970>] (path_umount) from [<804c6f68>] (ksys_umount fs/namespace.c:1825 [inline]) [<804c6970>] (path_umount) from [<804c6f68>] (__do_sys_umount fs/namespace.c:1830 [inline]) [<804c6970>] (path_umount) from [<804c6f68>] (sys_umount+0x60/0x90 fs/namespace.c:1828) r10:00000034 r9:841bd240 r8:80200288 r7:00000034 r6:00120000 r5:7ea9c5b0 r4:0000000a [<804c6f08>] (sys_umount) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:64) Exception stack(0xdf989fa8 to 0xdf989ff0) 9fa0: 00085aa4 7ea9c5b0 7ea9c5b0 0000000a 00000000 00000000 9fc0: 00085aa4 7ea9c5b0 00120000 00000034 00085aa4 025dffd0 00000000 7ea9c570 9fe0: 7f0302ff 7ea9c534 0001496c 0004d54c r4:00085aa4 NMI backtrace for cpu 0 CPU: 0 PID: 26 Comm: khungtaskd Not tainted 5.19.0-syzkaller #0 Hardware name: ARM-Versatile Express Backtrace: [<816fd818>] (dump_backtrace) from [<816fdb48>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:253) r7:00000000 r6:00000000 r5:60000093 r4:81d83918 [<816fdb30>] (show_stack) from [<81706ab0>] (__dump_stack lib/dump_stack.c:88 [inline]) [<816fdb30>] (show_stack) from [<81706ab0>] (dump_stack_lvl+0x48/0x54 lib/dump_stack.c:106) [<81706a68>] (dump_stack_lvl) from [<81706ad4>] (dump_stack+0x18/0x1c lib/dump_stack.c:113) r5:00000013 r4:00000000 [<81706abc>] (dump_stack) from [<80821dc0>] (nmi_cpu_backtrace+0x164/0x180 lib/nmi_backtrace.c:111) [<80821c5c>] (nmi_cpu_backtrace) from [<80821f0c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d0 lib/nmi_backtrace.c:62) r7:00000000 r6:8240c498 r5:8240ccd4 r4:00000000 [<80821ddc>] (nmi_trigger_cpumask_backtrace) from [<80210f7c>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:863) r9:00097b40 r8:82404d40 r7:00007f4d r6:8268895c r5:8240c5fc r4:84cbac38 [<80210f64>] (arch_trigger_cpumask_backtrace) from [<8032d870>] (trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]) [<80210f64>] (arch_trigger_cpumask_backtrace) from [<8032d870>] (check_hung_uninterruptible_tasks kernel/hung_task.c:212 [inline]) [<80210f64>] (arch_trigger_cpumask_backtrace) from [<8032d870>] (watchdog+0x4a8/0x598 kernel/hung_task.c:369) [<8032d3c8>] (watchdog) from [<8026a520>] (kthread+0xf0/0x120 kernel/kthread.c:376) r10:00000000 r9:df819e4c r8:82a19a80 r7:00000000 r6:8032d3c8 r5:828f4680 r4:82ada300 [<8026a430>] (kthread) from [<80200100>] (ret_from_fork+0x14/0x34 arch/arm/kernel/entry-common.S:148) Exception stack(0xdf8c9fb0 to 0xdf8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026a430 r4:82ada300 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 2010 Comm: klogd Not tainted 5.19.0-syzkaller #0 Hardware name: ARM-Versatile Express PC is at alloc_skb_with_frags+0x44/0x1a4 net/core/skbuff.c:6019 LR is at __build_skb_around+0x6c/0x80 net/core/skbuff.c:214 pc : [<81296864>] lr : [<81292144>] psr: 600f0013 sp : eb909d70 ip : 8c855f20 fp : eb909da4 r10: 7fffffff r9 : eb909e20 r8 : 00000000 r7 : 00000073 r6 : 00000003 r5 : 00000000 r4 : 00000fff r3 : 00000000 r2 : 00000000 r1 : 00000000 r0 : 845a43c0 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 84514200 DAC: 00000000 CPU: 1 PID: 2010 Comm: klogd Not tainted 5.19.0-syzkaller #0 Hardware name: ARM-Versatile Express Backtrace: frame pointer underflow [<816fd818>] (dump_backtrace) from [<816fdb48>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:253) r7:00000017 r6:eb909d20 r5:600f0193 r4:81d83918 [<816fdb30>] (show_stack) from [<81706ab0>] (__dump_stack lib/dump_stack.c:88 [inline]) [<816fdb30>] (show_stack) from [<81706ab0>] (dump_stack_lvl+0x48/0x54 lib/dump_stack.c:106) [<81706a68>] (dump_stack_lvl) from [<81706ad4>] (dump_stack+0x18/0x1c lib/dump_stack.c:113) r5:000f0193 r4:00000001 [<81706abc>] (dump_stack) from [<8020911c>] (show_regs+0x14/0x18 arch/arm/kernel/process.c:204) [<80209108>] (show_regs) from [<80821d04>] (nmi_cpu_backtrace+0xa8/0x180 lib/nmi_backtrace.c:109) [<80821c5c>] (nmi_cpu_backtrace) from [<802101e8>] (do_handle_IPI+0x4c/0x3b4 arch/arm/kernel/smp.c:678) r7:00000017 r6:00000001 r5:8280cc40 r4:00000007 [<8021019c>] (do_handle_IPI) from [<80210570>] (ipi_handler+0x20/0x28 arch/arm/kernel/smp.c:706) r9:841b2f00 r8:df805f78 r7:00000017 r6:8190da44 r5:8280cc40 r4:82887d00 [<80210550>] (ipi_handler) from [<802b957c>] (handle_percpu_devid_irq+0x9c/0x2d4 kernel/irq/chip.c:930) [<802b94e0>] (handle_percpu_devid_irq) from [<802b2e88>] (generic_handle_irq_desc include/linux/irqdesc.h:158 [inline]) [<802b94e0>] (handle_percpu_devid_irq) from [<802b2e88>] (handle_irq_desc kernel/irq/irqdesc.c:648 [inline]) [<802b94e0>] (handle_percpu_devid_irq) from [<802b2e88>] (generic_handle_domain_irq+0x30/0x40 kernel/irq/irqdesc.c:704) r10:7fffffff r9:841b2f00 r8:00000000 r7:df80a00c r6:822a81f0 r5:df80a000 r4:8240ccec r3:00010000 [<802b2e58>] (generic_handle_domain_irq) from [<8083393c>] (gic_handle_irq+0x68/0x7c drivers/irqchip/irq-gic.c:372) [<808338d4>] (gic_handle_irq) from [<81719b0c>] (generic_handle_arch_irq+0x60/0x80 kernel/irq/handle.c:238) r7:eb909d20 r6:81f3376c r5:81f33784 r4:822a81e4 [<81719aac>] (generic_handle_arch_irq) from [<80815070>] (call_with_stack+0x1c/0x20 arch/arm/lib/call_with_stack.S:40) r9:841b2f00 r8:00000000 r7:eb909d54 r6:ffffffff r5:600f0013 r4:81296864 [<80815054>] (call_with_stack) from [<80200b44>] (__irq_svc+0x84/0xac arch/arm/kernel/entry-armv.S:221) Exception stack(0xeb909d20 to 0xeb909d68) 9d20: 845a43c0 00000000 00000000 00000000 00000fff 00000000 00000003 00000073 9d40: 00000000 eb909e20 7fffffff eb909da4 8c855f20 eb909d70 81292144 81296864 9d60: 600f0013 ffffffff [<81296820>] (alloc_skb_with_frags) from [<8128ca10>] (sock_alloc_send_pskb+0x208/0x22c net/core/sock.c:2663) r10:7fffffff r9:eb909e20 r8:00000000 r7:00000073 r6:802991fc r5:841b2f00 r4:836dde00 [<8128c808>] (sock_alloc_send_pskb) from [<81523114>] (unix_dgram_sendmsg+0x13c/0x974 net/unix/af_unix.c:1912) r10:00000121 r9:836dde00 r8:836df600 r7:00000073 r6:00000073 r5:838ccc80 r4:eb909ea0 [<81522fd8>] (unix_dgram_sendmsg) from [<81286e9c>] (sock_sendmsg_nosec net/socket.c:714 [inline]) [<81522fd8>] (unix_dgram_sendmsg) from [<81286e9c>] (sock_sendmsg+0x3c/0x4c net/socket.c:734) r10:00000121 r9:841b2f00 r8:80200288 r7:00004000 r6:00000000 r5:838ccc80 r4:eb909ea0 [<81286e60>] (sock_sendmsg) from [<81288f2c>] (__sys_sendto+0xd0/0x11c net/socket.c:2117) r5:838ccc80 r4:00000000 [<81288e5c>] (__sys_sendto) from [<81288fbc>] (__do_sys_send net/socket.c:2139 [inline]) [<81288e5c>] (__sys_sendto) from [<81288fbc>] (sys_send+0x20/0x28 net/socket.c:2136) r7:00000121 r6:00000001 r5:76f17080 r4:00b34190 [<81288f9c>] (sys_send) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:64) Exception stack(0xeb909fa8 to 0xeb909ff0) 9fa0: 00b34190 76f17080 00000003 00b3cb18 00000073 00004000 9fc0: 00b34190 76f17080 00000001 00000121 7ee7ccc0 00000000 76f17080 00000000 9fe0: 00000000 7ee7cbf8 76e48b88 76e4de78