INFO: task kworker/1:5:4537 blocked for more than 430 seconds. Not tainted 6.12.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:4537 tgid:4537 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819bb694>] (__schedule) from [<819bc2d4>] (__schedule_loop kernel/sched/core.c:6759 [inline]) [<819bb694>] (__schedule) from [<819bc2d4>] (schedule+0x2c/0xfc kernel/sched/core.c:6774) r10:8260ca7c r9:00000000 r8:82717b64 r7:00000002 r6:df90dda4 r5:84b40c00 r4:84b40c00 [<819bc2a8>] (schedule) from [<819bc688>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6831) r5:84b40c00 r4:82717b60 [<819bc670>] (schedule_preempt_disabled) from [<819bf160>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<819bc670>] (schedule_preempt_disabled) from [<819bf160>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819bee78>] (__mutex_lock.constprop.0) from [<819bfa2c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df90de20 r4:00000000 [<819bfa18>] (__mutex_lock_slowpath) from [<819bfa6c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<819bfa30>] (mutex_lock) from [<804adbe8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2844) [<804adb80>] (_vm_unmap_aliases) from [<804b1944>] (vm_reset_perms mm/vmalloc.c:3272 [inline]) [<804adb80>] (_vm_unmap_aliases) from [<804b1944>] (vfree+0x170/0x1e4 mm/vmalloc.c:3351) r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85218c40 r4:00000000 [<804b17d4>] (vfree) from [<8050fb80>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:84b40c00 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f232000 [<8050fb50>] (execmem_free) from [<8039c4ac>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:dfc5f000 [<8039c49c>] (bpf_jit_free_exec) from [<8039c88c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<8039c49c>] (bpf_jit_free_exec) from [<8039c88c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<8039c824>] (bpf_jit_free) from [<8039d9e0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2815) r5:85032b54 r4:85032800 [<8039d894>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3229) r7:ddde40c0 r6:82c18200 r5:85032b54 r4:8516f400 [<80265e80>] (process_one_work) from [<80266c18>] (process_scheduled_works kernel/workqueue.c:3310 [inline]) [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc kernel/workqueue.c:3391) r10:84b40c00 r9:8516f42c r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 r4:8516f400 [<80266a2c>] (worker_thread) from [<8026fc90>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:dfd6de78 r8:852251c0 r7:8516f400 r6:80266a2c r5:84b40c00 r4:852255c0 [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf90dfb0 to 0xdf90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:852255c0 INFO: task kworker/0:34:6020 blocked for more than 430 seconds. Not tainted 6.12.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:6020 tgid:6020 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819bb694>] (__schedule) from [<819bc2d4>] (__schedule_loop kernel/sched/core.c:6759 [inline]) [<819bb694>] (__schedule) from [<819bc2d4>] (schedule+0x2c/0xfc kernel/sched/core.c:6774) r10:8260ca7c r9:00000000 r8:82717b64 r7:00000002 r6:dfd81da4 r5:84b83c00 r4:84b83c00 [<819bc2a8>] (schedule) from [<819bc688>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6831) r5:84b83c00 r4:82717b60 [<819bc670>] (schedule_preempt_disabled) from [<819bf160>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<819bc670>] (schedule_preempt_disabled) from [<819bf160>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819bee78>] (__mutex_lock.constprop.0) from [<819bfa2c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd81e20 r4:00000000 [<819bfa18>] (__mutex_lock_slowpath) from [<819bfa6c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<819bfa30>] (mutex_lock) from [<804adbe8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2844) [<804adb80>] (_vm_unmap_aliases) from [<804b1944>] (vm_reset_perms mm/vmalloc.c:3272 [inline]) [<804adb80>] (_vm_unmap_aliases) from [<804b1944>] (vfree+0x170/0x1e4 mm/vmalloc.c:3351) r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525c640 r4:00000000 [<804b17d4>] (vfree) from [<8050fb80>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:84b83c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f230000 [<8050fb50>] (execmem_free) from [<8039c4ac>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:dfbc5000 [<8039c49c>] (bpf_jit_free_exec) from [<8039c88c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<8039c49c>] (bpf_jit_free_exec) from [<8039c88c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<8039c824>] (bpf_jit_free) from [<8039d9e0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2815) r5:85033354 r4:85033000 [<8039d894>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3229) r7:dddd00c0 r6:82c18000 r5:85033354 r4:84541d80 [<80265e80>] (process_one_work) from [<80266c18>] (process_scheduled_works kernel/workqueue.c:3310 [inline]) [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc kernel/workqueue.c:3391) r10:84b83c00 r9:84541dac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 r4:84541d80 [<80266a2c>] (worker_thread) from [<8026fc90>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:dfd19e78 r8:8514f5c0 r7:84541d80 r6:80266a2c r5:84b83c00 r4:84457700 [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd81fb0 to 0xdfd81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:84457700 INFO: task kworker/1:32:6100 blocked for more than 430 seconds. Not tainted 6.12.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:6100 tgid:6100 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819bb694>] (__schedule) from [<819bc2d4>] (__schedule_loop kernel/sched/core.c:6759 [inline]) [<819bb694>] (__schedule) from [<819bc2d4>] (schedule+0x2c/0xfc kernel/sched/core.c:6774) r10:8260ca7c r9:00000000 r8:82717b64 r7:00000002 r6:dfe65da4 r5:85105400 r4:85105400 [<819bc2a8>] (schedule) from [<819bc688>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6831) r5:85105400 r4:82717b60 [<819bc670>] (schedule_preempt_disabled) from [<819bf160>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<819bc670>] (schedule_preempt_disabled) from [<819bf160>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819bee78>] (__mutex_lock.constprop.0) from [<819bfa2c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe65e20 r4:00000000 [<819bfa18>] (__mutex_lock_slowpath) from [<819bfa6c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<819bfa30>] (mutex_lock) from [<804adbe8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2844) [<804adb80>] (_vm_unmap_aliases) from [<804b1944>] (vm_reset_perms mm/vmalloc.c:3272 [inline]) [<804adb80>] (_vm_unmap_aliases) from [<804b1944>] (vfree+0x170/0x1e4 mm/vmalloc.c:3351) r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e6dc0 r4:00000000 [<804b17d4>] (vfree) from [<8050fb80>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:85105400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f252000 [<8050fb50>] (execmem_free) from [<8039c4ac>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:e0037000 [<8039c49c>] (bpf_jit_free_exec) from [<8039c88c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<8039c49c>] (bpf_jit_free_exec) from [<8039c88c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<8039c824>] (bpf_jit_free) from [<8039d9e0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2815) r5:85031b54 r4:85031800 [<8039d894>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3229) r7:ddde40c0 r6:82c18200 r5:85031b54 r4:84468180 [<80265e80>] (process_one_work) from [<80266c18>] (process_scheduled_works kernel/workqueue.c:3310 [inline]) [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc kernel/workqueue.c:3391) r10:85105400 r9:844681ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 r4:84468180 [<80266a2c>] (worker_thread) from [<8026fc90>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:dfdcde78 r8:8523c780 r7:84468180 r6:80266a2c r5:85105400 r4:841fdb00 [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe65fb0 to 0xdfe65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:841fdb00 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc2-syzkaller #0 Hardware name: ARM-Versatile Express Call trace: [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000013 r5:60000093 r4:8203d408 [<819992bc>] (show_stack) from [<819b7780>] (__dump_stack lib/dump_stack.c:94 [inline]) [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<819b778c>] (dump_stack) from [<81986498>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81986338>] (nmi_cpu_backtrace) from [<819865e4>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8260c5d0 r5:8261af0c r4:ffffffff [<819864b4>] (nmi_trigger_cpumask_backtrace) from [<802103e8>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:0001164c r8:828b6cf8 r7:8260c730 r6:00007d4d r5:8261b4c8 r4:8589601c [<802103d0>] (arch_trigger_cpumask_backtrace) from [<803581b0>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<802103d0>] (arch_trigger_cpumask_backtrace) from [<803581b0>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]) [<802103d0>] (arch_trigger_cpumask_backtrace) from [<803581b0>] (watchdog+0x498/0x5b8 kernel/hung_task.c:379) [<80357d18>] (watchdog) from [<8026fc90>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df819e58 r8:82f18400 r7:00000000 r6:80357d18 r5:82fd8c00 r4:82ecfa00 [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:82ecfa00 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 3079 Comm: sshd Not tainted 6.12.0-rc2-syzkaller #0 Hardware name: ARM-Versatile Express PC is at __raw_write_unlock_irq include/linux/rwlock_api_smp.h:274 [inline] PC is at _raw_write_unlock_irq+0x24/0x50 kernel/locking/spinlock.c:358 LR is at release_task+0x468/0x62c kernel/exit.c:279 pc : [<819c4b38>] lr : [<80247d04>] psr: 60000013 sp : df815da8 ip : df815db8 fp : df815db4 r10: 84278000 r9 : 82870d08 r8 : 00000000 r7 : 83528000 r6 : 83e0df00 r5 : 00000011 r4 : 84278000 r3 : 00000000 r2 : 00000004 r1 : 84278000 r0 : 82604040 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84150a80 DAC: fffffffd Call trace: [<819c4b14>] (_raw_write_unlock_irq) from [<80247d04>] (release_task+0x468/0x62c kernel/exit.c:279) [<8024789c>] (release_task) from [<802483c4>] (wait_task_zombie kernel/exit.c:1250 [inline]) [<8024789c>] (release_task) from [<802483c4>] (wait_consider_task+0x4fc/0xb80 kernel/exit.c:1477) r10:00000010 r9:00f0b414 r8:0000ff00 r7:83e9aa00 r6:00000c22 r5:df815edc r4:84278000 [<80247ec8>] (wait_consider_task) from [<802499b8>] (do_wait_thread kernel/exit.c:1540 [inline]) [<80247ec8>] (wait_consider_task) from [<802499b8>] (__do_wait+0x8c/0x224 kernel/exit.c:1658) r10:00000072 r9:84278000 r8:8427daac r7:000006ac r6:8427d400 r5:8427d400 r4:df815edc [<8024992c>] (__do_wait) from [<80249bbc>] (do_wait+0x6c/0x14c kernel/exit.c:1692) r9:8427d400 r8:df815ef4 r7:00000001 r6:df815edc r5:8427d400 r4:00000005 [<80249b50>] (do_wait) from [<8024a174>] (kernel_wait4+0x9c/0x154 kernel/exit.c:1851) r9:8427d400 r8:00000000 r7:00000000 r6:7ec79238 r5:00000000 r4:00000005 [<8024a0d8>] (kernel_wait4) from [<8024a3bc>] (__do_sys_wait4 kernel/exit.c:1879 [inline]) [<8024a0d8>] (kernel_wait4) from [<8024a3bc>] (sys_wait4+0xf4/0x100 kernel/exit.c:1875) r9:8427d400 r8:8020029c r7:ffffffff r6:00000001 r5:00000000 r4:7ec79238 [<8024a2c8>] (sys_wait4) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xdf815fa8 to 0xdf815ff0) 5fa0: 00000000 ffffffff ffffffff 7ec79238 00000001 00000000 5fc0: 00000000 ffffffff 76f02c80 00000072 00689488 ffffffff 00000001 005308c8 5fe0: 00530c10 7ec79170 76ad97f8 76ad96a8 r7:00000072 r6:76f02c80 r5:ffffffff r4:00000000