INFO: task syz.1.852:7573 blocked for more than 430 seconds. Not tainted 6.11.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.1.852 state:D stack:0 pid:7573 tgid:7570 ppid:3109 flags:0x00400001 Call trace: [<8197e728>] (__schedule) from [<8197f2c0>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197e728>] (__schedule) from [<8197f2c0>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:dfc05e5c r9:dfc05d88 r8:00000000 r7:845a9f00 r6:845a9ff4 r5:845a9f00 r4:85728000 [<8197f294>] (schedule) from [<81457794>] (__lock_sock+0x68/0xac net/core/sock.c:2980) r5:845a9f00 r4:845a9fec [<8145772c>] (__lock_sock) from [<814578bc>] (lock_sock_nested net/core/sock.c:3548 [inline]) [<8145772c>] (__lock_sock) from [<814578bc>] (lock_sock include/net/sock.h:1607 [inline]) [<8145772c>] (__lock_sock) from [<814578bc>] (sockopt_lock_sock net/core/sock.c:1061 [inline]) [<8145772c>] (__lock_sock) from [<814578bc>] (sockopt_lock_sock+0x54/0x58 net/core/sock.c:1052) r6:00000000 r5:845a9fec r4:845a9f00 [<81457868>] (sockopt_lock_sock) from [<8162ba3c>] (do_ip_getsockopt+0x204/0xbb0 net/ipv4/ip_sockglue.c:1703) r5:00000000 r4:00000010 [<8162b83c>] (do_ip_getsockopt) from [<8162c44c>] (ip_getsockopt+0x64/0x134 net/ipv4/ip_sockglue.c:1765) r10:814538b4 r9:20000180 r8:00000000 r7:20000180 r6:00000000 r5:845a9f00 r4:00000010 [<8162c3e8>] (ip_getsockopt) from [<8163c878>] (tcp_getsockopt+0x34/0x6c net/ipv4/tcp.c:4409) r9:20000180 r8:830a8c80 r7:00000010 r6:00000000 r5:00000000 r4:8162c3e8 [<8163c844>] (tcp_getsockopt) from [<814538dc>] (sock_common_getsockopt+0x28/0x30 net/core/sock.c:3708) r4:8163c844 [<814538b4>] (sock_common_getsockopt) from [<814506d4>] (do_sock_getsockopt+0x124/0x2a0 net/socket.c:2386) r4:00000000 [<814505b0>] (do_sock_getsockopt) from [<81452654>] (__sys_getsockopt net/socket.c:2415 [inline]) [<814505b0>] (do_sock_getsockopt) from [<81452654>] (__do_sys_getsockopt net/socket.c:2425 [inline]) [<814505b0>] (do_sock_getsockopt) from [<81452654>] (sys_getsockopt+0x90/0xd4 net/socket.c:2422) r10:00000127 r9:85728000 r8:830a8c80 r7:00000000 r6:00000010 r5:00000000 r4:00000000 [<814525c4>] (sys_getsockopt) from [<8020028c>] (__sys_trace_return+0x0/0x10) Exception stack(0xdfc05fa8 to 0xdfc05ff0) 5fa0: 20000180 00000000 00000003 00000000 00000010 00000000 5fc0: 20000180 00000000 00276388 00000127 00000000 00006364 003d0f00 76b3d0bc 5fe0: 76b3cec0 76b3ceb0 000189f0 00132dc0 r8:8020029c r7:00000127 r6:00276388 r5:00000000 r4:20000180 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-rc5-syzkaller #0 Hardware name: ARM-Versatile Express Call trace: [<8195cb40>] (dump_backtrace) from [<8195cc3c>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:8200c924 [<8195cc24>] (show_stack) from [<8197a97c>] (__dump_stack lib/dump_stack.c:93 [inline]) [<8195cc24>] (show_stack) from [<8197a97c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:119) [<8197a90c>] (dump_stack_lvl) from [<8197a9a0>] (dump_stack+0x18/0x1c lib/dump_stack.c:128) r5:00000001 r4:00000001 [<8197a988>] (dump_stack) from [<81949e30>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81949cd0>] (nmi_cpu_backtrace) from [<81949f7c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8260c5d0 r5:8261a88c r4:ffffffff [<81949e4c>] (nmi_trigger_cpumask_backtrace) from [<802103c8>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:00014c40 r8:828b2130 r7:8260c734 r6:00007f53 r5:8261ae48 r4:8343851c [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]) [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (watchdog+0x498/0x5b8 kernel/hung_task.c:379) [<80350998>] (watchdog) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df819e58 r8:82e9e440 r7:00000000 r6:80350998 r5:82ee1800 r4:82f44cc0 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:82f44cc0 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2923 Comm: syslogd Not tainted 6.11.0-rc5-syzkaller #0 Hardware name: ARM-Versatile Express PC is at mmioset+0x24/0xac arch/arm/lib/memset.S:41 LR is at new_sync_write fs/read_write.c:489 [inline] LR is at vfs_write+0x188/0x44c fs/read_write.c:590 pc : [<8192eca4>] lr : [<80507e68>] psr: 20000013 sp : ec339ed8 ip : ec339f08 fp : ec339f64 r10: 81a19740 r9 : 021164d0 r8 : ec339f68 r7 : 838ec800 r6 : 00000084 r5 : 8428f000 r4 : 00000000 r3 : 00000000 r2 : 00000028 r1 : 00000000 r0 : ec339f08 Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84480700 DAC: fffffffd Call trace: [<80507ce0>] (vfs_write) from [<805082b0>] (ksys_write+0x78/0xf8 fs/read_write.c:643) r10:00000004 r9:838ec800 r8:8020029c r7:00000000 r6:00007444 r5:8428f000 r4:8428f000 [<80508238>] (ksys_write) from [<80508340>] (__do_sys_write fs/read_write.c:655 [inline]) [<80508238>] (ksys_write) from [<80508340>] (sys_write+0x10/0x14 fs/read_write.c:652) r7:00000004 r6:76f98548 r5:76fd35a0 r4:00000003 [<80508330>] (sys_write) from [<8020028c>] (__sys_trace_return+0x0/0x10) Exception stack(0xec339fa8 to 0xec339ff0) 9fa0: 00000003 76fd35a0 00000003 021164d0 00000084 00000000 9fc0: 00000003 76fd35a0 76f98548 00000004 00000084 021161c8 76f9854c 7efd2c84 9fe0: 76f97d74 7efd2b80 76ec2760 76e1b39c