INFO: task kworker/1:5:4946 blocked for more than 430 seconds. Not tainted 6.12.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:4946 tgid:4946 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819bf974>] (__schedule) from [<819c05cc>] (__schedule_loop kernel/sched/core.c:6770 [inline]) [<819bf974>] (__schedule) from [<819c05cc>] (schedule+0x2c/0xfc kernel/sched/core.c:6785) r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:dfe19da4 r5:84d70c00 r4:84d70c00 [<819c05a0>] (schedule) from [<819c0980>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6842) r5:84d70c00 r4:82717b6c [<819c0968>] (schedule_preempt_disabled) from [<819c3458>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<819c0968>] (schedule_preempt_disabled) from [<819c3458>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819c3170>] (__mutex_lock.constprop.0) from [<819c3d24>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe19e20 r4:00000000 [<819c3d10>] (__mutex_lock_slowpath) from [<819c3d64>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<819c3d28>] (mutex_lock) from [<804ae2cc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2844) [<804ae264>] (_vm_unmap_aliases) from [<804b2028>] (vm_reset_perms mm/vmalloc.c:3272 [inline]) [<804ae264>] (_vm_unmap_aliases) from [<804b2028>] (vfree+0x170/0x1e4 mm/vmalloc.c:3351) r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3f6c0 r4:00000000 [<804b1eb8>] (vfree) from [<80510b54>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:84d70c00 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f238000 [<80510b24>] (execmem_free) from [<8039c61c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:dfe71000 [<8039c60c>] (bpf_jit_free_exec) from [<8039c9fc>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<8039c60c>] (bpf_jit_free_exec) from [<8039c9fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<8039c994>] (bpf_jit_free) from [<8039db50>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2815) r5:84dbe754 r4:84dbe400 [<8039da04>] (bpf_prog_free_deferred) from [<802660a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3229) r7:ddde40c0 r6:82c18200 r5:84dbe754 r4:84f5f780 [<80265eec>] (process_one_work) from [<80266c84>] (process_scheduled_works kernel/workqueue.c:3310 [inline]) [<80265eec>] (process_one_work) from [<80266c84>] (worker_thread+0x1ec/0x3bc kernel/workqueue.c:3391) r10:84d70c00 r9:84f5f7ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 r4:84f5f780 [<80266a98>] (worker_thread) from [<8026fd00>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df87de78 r8:84eda480 r7:84f5f780 r6:80266a98 r5:84d70c00 r4:8468c900 [<8026fbfc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe19fb0 to 0xdfe19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fbfc r4:8468c900 INFO: task kworker/1:7:4963 blocked for more than 430 seconds. Not tainted 6.12.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:4963 tgid:4963 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819bf974>] (__schedule) from [<819c05cc>] (__schedule_loop kernel/sched/core.c:6770 [inline]) [<819bf974>] (__schedule) from [<819c05cc>] (schedule+0x2c/0xfc kernel/sched/core.c:6785) r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:dfda5da4 r5:84d72400 r4:84d72400 [<819c05a0>] (schedule) from [<819c0980>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6842) r5:84d72400 r4:82717b6c [<819c0968>] (schedule_preempt_disabled) from [<819c3458>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<819c0968>] (schedule_preempt_disabled) from [<819c3458>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819c3170>] (__mutex_lock.constprop.0) from [<819c3d24>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda5e20 r4:00000000 [<819c3d10>] (__mutex_lock_slowpath) from [<819c3d64>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<819c3d28>] (mutex_lock) from [<804ae2cc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2844) [<804ae264>] (_vm_unmap_aliases) from [<804b2028>] (vm_reset_perms mm/vmalloc.c:3272 [inline]) [<804ae264>] (_vm_unmap_aliases) from [<804b2028>] (vfree+0x170/0x1e4 mm/vmalloc.c:3351) r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8468c280 r4:00000000 [<804b1eb8>] (vfree) from [<80510b54>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:84d72400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f232000 [<80510b24>] (execmem_free) from [<8039c61c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:dfe4d000 [<8039c60c>] (bpf_jit_free_exec) from [<8039c9fc>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<8039c60c>] (bpf_jit_free_exec) from [<8039c9fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<8039c994>] (bpf_jit_free) from [<8039db50>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2815) r5:84d59b54 r4:84d59800 [<8039da04>] (bpf_prog_free_deferred) from [<802660a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3229) r7:ddde40c0 r6:82c18200 r5:84d59b54 r4:84f5fb80 [<80265eec>] (process_one_work) from [<80266c84>] (process_scheduled_works kernel/workqueue.c:3310 [inline]) [<80265eec>] (process_one_work) from [<80266c84>] (worker_thread+0x1ec/0x3bc kernel/workqueue.c:3391) r10:84d72400 r9:84f5fbac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 r4:84f5fb80 [<80266a98>] (worker_thread) from [<8026fd00>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:dfe19e78 r8:84eb1c40 r7:84f5fb80 r6:80266a98 r5:84d72400 r4:84f95000 [<8026fbfc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda5fb0 to 0xdfda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fbfc r4:84f95000 NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc7-syzkaller #0 Hardware name: ARM-Versatile Express Call trace: [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:8203df50 [<8199d55c>] (show_stack) from [<819bba5c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<819bba68>] (dump_stack) from [<8198a730>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<8198a5d0>] (nmi_cpu_backtrace) from [<8198a87c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8260c5d0 r5:8261af0c r4:ffffffff [<8198a74c>] (nmi_trigger_cpumask_backtrace) from [<80210408>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:00009d42 r8:828b6cf8 r7:8260c730 r6:00007ed7 r5:8261b4c8 r4:843dc51c [<802103f0>] (arch_trigger_cpumask_backtrace) from [<803582e4>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<802103f0>] (arch_trigger_cpumask_backtrace) from [<803582e4>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]) [<802103f0>] (arch_trigger_cpumask_backtrace) from [<803582e4>] (watchdog+0x498/0x5b8 kernel/hung_task.c:379) [<80357e4c>] (watchdog) from [<8026fd00>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df819e58 r8:82e9f380 r7:00000000 r6:80357e4c r5:82ee8c00 r4:82f45a80 [<8026fbfc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fbfc r4:82f45a80 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 6679 Comm: syz.3.513 Not tainted 6.12.0-rc7-syzkaller #0 Hardware name: ARM-Versatile Express PC is at __put_user_4+0x14/0x20 arch/arm/lib/putuser.S:63 LR is at ____sys_recvmsg+0xe4/0x184 net/socket.c:2839 pc : [<8196f0e8>] lr : [<814870a0>] psr: 80000013 sp : dfcd5d40 ip : a104301b fp : dfcd5dfc r10: dfcd5d4c r9 : 00000002 r8 : 00000000 r7 : 00000000 r6 : b5003500 r5 : 20043000 r4 : dfcd5ee0 r3 : b5403587 r2 : 00000000 r1 : 7effffff r0 : 20043018 Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 8565e400 DAC: 00000000 Call trace: [<81486fbc>] (____sys_recvmsg) from [<8148a228>] (___sys_recvmsg+0x88/0xbc net/socket.c:2868) r10:b5403587 r9:8537a400 r8:833b6f00 r7:00000002 r6:20043000 r5:dfcd5ee0 r4:00000000 [<8148a1a0>] (___sys_recvmsg) from [<8148a35c>] (do_recvmmsg+0x100/0x2d0 net/socket.c:2962) r8:00000000 r7:00000002 r6:0000217a r5:20043000 r4:dfcd5ec0 [<8148a25c>] (do_recvmmsg) from [<8148ad48>] (__sys_recvmmsg net/socket.c:3041 [inline]) [<8148a25c>] (do_recvmmsg) from [<8148ad48>] (__do_sys_recvmmsg_time32 net/socket.c:3075 [inline]) [<8148a25c>] (do_recvmmsg) from [<8148ad48>] (sys_recvmmsg_time32+0xc4/0xd8 net/socket.c:3068) r10:0000016d r9:8537a400 r8:00010106 r7:00000002 r6:00000000 r5:200000c0 r4:00000005 [<8148ac84>] (sys_recvmmsg_time32) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xdfcd5fa8 to 0xdfcd5ff0) 5fa0: 00000000 00000000 00000005 200000c0 00010106 00000002 5fc0: 00000000 00000000 00286388 0000016d 00000000 00006364 003d0f00 76b5c0bc 5fe0: 76b5bec0 76b5beb0 00018af0 00133450 r8:8020029c r7:0000016d r6:00286388 r5:00000000 r4:00000000