INFO: task syz.0.318:5964 blocked for more than 430 seconds. Not tainted 6.11.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.0.318 state:D stack:0 pid:5964 tgid:5960 ppid:5052 flags:0x00400001 Call trace: [<8197ed48>] (__schedule) from [<8197f8e0>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ed48>] (__schedule) from [<8197f8e0>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:dfad1e64 r9:dfad1d90 r8:00000000 r7:84104d80 r6:84104e74 r5:84104d80 r4:848fd400 [<8197f8b4>] (schedule) from [<81457c8c>] (__lock_sock+0x68/0xac net/core/sock.c:2980) r5:84104d80 r4:84104e6c [<81457c24>] (__lock_sock) from [<81457db4>] (lock_sock_nested net/core/sock.c:3548 [inline]) [<81457c24>] (__lock_sock) from [<81457db4>] (lock_sock include/net/sock.h:1607 [inline]) [<81457c24>] (__lock_sock) from [<81457db4>] (sockopt_lock_sock net/core/sock.c:1061 [inline]) [<81457c24>] (__lock_sock) from [<81457db4>] (sockopt_lock_sock+0x54/0x58 net/core/sock.c:1052) r6:00000000 r5:84104e6c r4:84104d80 [<81457d60>] (sockopt_lock_sock) from [<8162bfd4>] (do_ip_getsockopt+0x204/0xbb0 net/ipv4/ip_sockglue.c:1703) r5:00000000 r4:00000034 [<8162bdd4>] (do_ip_getsockopt) from [<8162c9e4>] (ip_getsockopt+0x64/0x134 net/ipv4/ip_sockglue.c:1765) r10:00000127 r9:20000180 r8:00000000 r7:20000180 r6:00000000 r5:84104d80 r4:00000034 [<8162c980>] (ip_getsockopt) from [<8163ce10>] (tcp_getsockopt+0x34/0x6c net/ipv4/tcp.c:4409) r9:20000180 r8:00000000 r7:833be780 r6:00000034 r5:00000000 r4:8162c980 [<8163cddc>] (tcp_getsockopt) from [<81453dd4>] (sock_common_getsockopt+0x28/0x30 net/core/sock.c:3708) r4:8163cddc [<81453dac>] (sock_common_getsockopt) from [<81450bbc>] (do_sock_getsockopt+0x10c/0x298 net/socket.c:2386) r4:81453dac [<81450ab0>] (do_sock_getsockopt) from [<81452b4c>] (__sys_getsockopt net/socket.c:2415 [inline]) [<81450ab0>] (do_sock_getsockopt) from [<81452b4c>] (__do_sys_getsockopt net/socket.c:2425 [inline]) [<81450ab0>] (do_sock_getsockopt) from [<81452b4c>] (sys_getsockopt+0x90/0xd4 net/socket.c:2422) r9:848fd400 r8:833be780 r7:00000000 r6:00000034 r5:00000000 r4:00000000 [<81452abc>] (sys_getsockopt) from [<8020028c>] (__sys_trace_return+0x0/0x10) Exception stack(0xdfad1fa8 to 0xdfad1ff0) 1fa0: 20000180 00000000 00000003 00000000 00000034 00000000 1fc0: 20000180 00000000 00286388 00000127 00000000 00006364 003d0f00 76b430bc 1fe0: 76b42ec0 76b42eb0 000189d0 00132da0 r8:8020029c r7:00000127 r6:00286388 r5:00000000 r4:20000180 NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-rc7-syzkaller #0 Hardware name: ARM-Versatile Express Call trace: [<8195d178>] (dump_backtrace) from [<8195d274>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:8200ca20 [<8195d25c>] (show_stack) from [<8197afb0>] (__dump_stack lib/dump_stack.c:93 [inline]) [<8195d25c>] (show_stack) from [<8197afb0>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:119) [<8197af40>] (dump_stack_lvl) from [<8197afd4>] (dump_stack+0x18/0x1c lib/dump_stack.c:128) r5:00000000 r4:00000001 [<8197afbc>] (dump_stack) from [<8194a468>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<8194a308>] (nmi_cpu_backtrace) from [<8194a5b4>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8260c5d0 r5:8261a88c r4:ffffffff [<8194a484>] (nmi_trigger_cpumask_backtrace) from [<802103c8>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:0000b50d r8:828b3130 r7:8260c734 r6:00007f59 r5:8261ae48 r4:84e5421c [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]) [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (watchdog+0x498/0x5b8 kernel/hung_task.c:379) [<80350998>] (watchdog) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df819e58 r8:82e9e440 r7:00000000 r6:80350998 r5:82ee1800 r4:82f44cc0 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:82f44cc0 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 5962 Comm: syz.0.318 Not tainted 6.11.0-rc7-syzkaller #0 Hardware name: ARM-Versatile Express PC is at arm_copy_from_user+0xa8/0x378 arch/arm/lib/copy_template.S:128 LR is at raw_copy_from_user arch/arm/include/asm/uaccess.h:542 [inline] LR is at _inline_copy_from_user include/linux/uaccess.h:163 [inline] LR is at copy_from_user include/linux/uaccess.h:194 [inline] LR is at copy_from_sockptr_offset+0xd4/0x118 include/linux/sockptr.h:48 pc : [<8192cdb0>] lr : [<816342c8>] psr: 00000013 sp : dfa35ddc ip : 00000018 fp : dfa35e2c r10: 00fa2f10 r9 : dfa35e50 r8 : b5403587 r7 : dfa35e50 r6 : 00000008 r5 : 20fa2f10 r4 : 00000008 r3 : 00000000 r2 : ffffffe8 r1 : 20fa2f10 r0 : dfa35e50 Flags: nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 85c0f4c0 DAC: 00000000 Call trace: [<816341f4>] (copy_from_sockptr_offset) from [<8163b3f4>] (tcp_repair_options_est net/ipv4/tcp.c:3191 [inline]) [<816341f4>] (copy_from_sockptr_offset) from [<8163b3f4>] (do_tcp_setsockopt+0x8f0/0xc40 net/ipv4/tcp.c:3628) r8:841052e4 r7:20000148 r6:dfa35e48 r5:00000000 r4:84104d80 [<8163ab08>] (do_tcp_setsockopt) from [<8163b794>] (tcp_setsockopt+0x50/0x58 net/ipv4/tcp.c:3770) r10:00000126 r9:848f9800 r8:8020029c r7:00000000 r6:833be780 r5:00000000 r4:8163b744 [<8163b748>] (tcp_setsockopt) from [<81453e88>] (sock_common_setsockopt+0x38/0x40 net/core/sock.c:3735) r4:8163b744 [<81453e54>] (sock_common_setsockopt) from [<8144f4ac>] (do_sock_setsockopt+0xb0/0x17c net/socket.c:2324) r4:81453e50 [<8144f3fc>] (do_sock_setsockopt) from [<814529a4>] (__sys_setsockopt net/socket.c:2347 [inline]) [<8144f3fc>] (do_sock_setsockopt) from [<814529a4>] (__do_sys_setsockopt net/socket.c:2356 [inline]) [<8144f3fc>] (do_sock_setsockopt) from [<814529a4>] (sys_setsockopt+0x78/0xbc net/socket.c:2353) r6:833be780 r5:00000016 r4:00000006 [<8145292c>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xdfa35fa8 to 0xdfa35ff0) 5fa0: 20000149 00000000 00000003 00000006 00000016 20000000 5fc0: 20000149 00000000 002862f8 00000126 00000000 00006364 003d0f00 76b640bc 5fe0: 76b63ec0 76b63eb0 000189d0 00132da0 r7:00000126 r6:002862f8 r5:00000000 r4:20000149