INFO: task kworker/0:4:3074 blocked for more than 430 seconds. Not tainted 6.12.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3074 tgid:3074 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819bb4d4>] (__schedule) from [<819bc114>] (__schedule_loop kernel/sched/core.c:6759 [inline]) [<819bb4d4>] (__schedule) from [<819bc114>] (schedule+0x2c/0xfc kernel/sched/core.c:6774) r10:8260ca7c r9:00000000 r8:82717b64 r7:00000002 r6:ec671da4 r5:841fe000 r4:841fe000 [<819bc0e8>] (schedule) from [<819bc4c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6831) r5:841fe000 r4:82717b60 [<819bc4b0>] (schedule_preempt_disabled) from [<819befa0>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<819bc4b0>] (schedule_preempt_disabled) from [<819befa0>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819becb8>] (__mutex_lock.constprop.0) from [<819bf86c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec671e20 r4:00000000 [<819bf858>] (__mutex_lock_slowpath) from [<819bf8ac>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<819bf870>] (mutex_lock) from [<804adb80>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2844) [<804adb18>] (_vm_unmap_aliases) from [<804b18dc>] (vm_reset_perms mm/vmalloc.c:3272 [inline]) [<804adb18>] (_vm_unmap_aliases) from [<804b18dc>] (vfree+0x170/0x1e4 mm/vmalloc.c:3351) r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:82e9f700 r4:00000000 [<804b176c>] (vfree) from [<8050fb18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:841fe000 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f02b000 [<8050fae8>] (execmem_free) from [<8039c444>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:ee62b000 [<8039c434>] (bpf_jit_free_exec) from [<8039c824>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<8039c434>] (bpf_jit_free_exec) from [<8039c824>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<8039c7bc>] (bpf_jit_free) from [<8039d978>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2815) r5:84d17f54 r4:84d17c00 [<8039d82c>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3229) r7:dddd00c0 r6:82c18000 r5:84d17f54 r4:84057c00 [<80265e80>] (process_one_work) from [<80266c18>] (process_scheduled_works kernel/workqueue.c:3310 [inline]) [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc kernel/workqueue.c:3391) r10:841fe000 r9:84057c2c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 r4:84057c00 [<80266a2c>] (worker_thread) from [<8026fc90>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:ec66de78 r8:843ec8c0 r7:84057c00 r6:80266a2c r5:841fe000 r4:843e4e00 [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec671fb0 to 0xec671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:843e4e00 INFO: task kworker/1:0:8618 blocked for more than 430 seconds. Not tainted 6.12.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:8618 tgid:8618 ppid:2 flags:0x00000000 Workqueue: events drain_vmap_area_work Call trace: [<819bb4d4>] (__schedule) from [<819bc114>] (__schedule_loop kernel/sched/core.c:6759 [inline]) [<819bb4d4>] (__schedule) from [<819bc114>] (schedule+0x2c/0xfc kernel/sched/core.c:6774) r10:82c18215 r9:00000000 r8:82717b64 r7:00000002 r6:dfe59e74 r5:84590000 r4:84590000 [<819bc0e8>] (schedule) from [<819bc4c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6831) r5:84590000 r4:82717b60 [<819bc4b0>] (schedule_preempt_disabled) from [<819befa0>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<819bc4b0>] (schedule_preempt_disabled) from [<819befa0>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819becb8>] (__mutex_lock.constprop.0) from [<819bf86c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:82c18215 r9:84590000 r8:01800000 r7:ddde40c0 r6:82c18200 r5:82717b48 r4:82717b60 [<819bf858>] (__mutex_lock_slowpath) from [<819bf8ac>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<819bf870>] (mutex_lock) from [<804add90>] (drain_vmap_area_work+0x18/0x38 mm/vmalloc.c:2321) [<804add78>] (drain_vmap_area_work) from [<80266034>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3229) r5:82717b48 r4:85178200 [<80265e80>] (process_one_work) from [<80266c18>] (process_scheduled_works kernel/workqueue.c:3310 [inline]) [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc kernel/workqueue.c:3391) r10:84590000 r9:8517822c r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 r4:85178200 [<80266a2c>] (worker_thread) from [<8026fc90>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df9ede78 r8:851596c0 r7:85178200 r6:80266a2c r5:84590000 r4:84d2c5c0 [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:84d2c5c0 NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc2-syzkaller #0 Hardware name: ARM-Versatile Express Call trace: [<81999018>] (dump_backtrace) from [<81999114>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:8203d3fc [<819990fc>] (show_stack) from [<819b75c0>] (__dump_stack lib/dump_stack.c:94 [inline]) [<819990fc>] (show_stack) from [<819b75c0>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<819b7550>] (dump_stack_lvl) from [<819b75e4>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<819b75cc>] (dump_stack) from [<819862d8>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81986178>] (nmi_cpu_backtrace) from [<81986424>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8260c5d0 r5:8261af0c r4:ffffffff [<819862f4>] (nmi_trigger_cpumask_backtrace) from [<802103e8>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:00018000 r8:828b6cf8 r7:8260c730 r6:00007f26 r5:8261b4c8 r4:8503b91c [<802103d0>] (arch_trigger_cpumask_backtrace) from [<80358148>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<802103d0>] (arch_trigger_cpumask_backtrace) from [<80358148>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]) [<802103d0>] (arch_trigger_cpumask_backtrace) from [<80358148>] (watchdog+0x498/0x5b8 kernel/hung_task.c:379) [<80357cb0>] (watchdog) from [<8026fc90>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df819e58 r8:82e9f400 r7:00000000 r6:80357cb0 r5:82ee8c00 r4:82f45a00 [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:82f45a00 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2934 Comm: klogd Not tainted 6.12.0-rc2-syzkaller #0 Hardware name: ARM-Versatile Express PC is at skb_copy_datagram_from_iter+0x0/0x284 net/core/datagram.c:555 LR is at unix_dgram_sendmsg+0x1a4/0x8b8 net/unix/af_unix.c:2040 pc : [<8149fb1c>] lr : [<8174816c>] psr: 80000013 sp : ec571df8 ip : 8479a87f fp : ec571e6c r10: 00000000 r9 : 82fbcf00 r8 : 83e50c00 r7 : 0000007f r6 : 0000007f r5 : 83140500 r4 : ec571e98 r3 : 0000007f r2 : ec571ea8 r1 : 00000000 r0 : 8440f6c0 Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 841e6140 DAC: 00000000 Call trace: [<81747fc8>] (unix_dgram_sendmsg) from [<81483660>] (sock_sendmsg_nosec net/socket.c:729 [inline]) [<81747fc8>] (unix_dgram_sendmsg) from [<81483660>] (__sock_sendmsg+0x44/0x78 net/socket.c:744) r10:00000121 r9:83e50c00 r8:00000003 r7:83140500 r6:83140500 r5:ec571e98 r4:00000000 [<8148361c>] (__sock_sendmsg) from [<81485cb8>] (__sys_sendto+0x108/0x14c net/socket.c:2214) r7:83140500 r6:00000000 r5:00004000 r4:00000000 [<81485bb0>] (__sys_sendto) from [<81485d40>] (__do_sys_send net/socket.c:2236 [inline]) [<81485bb0>] (__sys_sendto) from [<81485d40>] (sys_send+0x20/0x28 net/socket.c:2233) r8:8020029c r7:00000121 r6:76f625a0 r5:76f625a0 r4:01bf0358 [<81485d20>] (sys_send) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xec571fa8 to 0xec571ff0) 1fa0: 01bf0358 76f625a0 00000003 01bf1620 0000007f 00004000 1fc0: 01bf0358 76f625a0 76f625a0 00000121 00000000 00000013 76e30e60 01bf1623 1fe0: 00000000 7ebf9bc8 76db8460 76dbd918