INFO: task kworker/0:34:8285 blocked for more than 430 seconds. Not tainted 6.8.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:8285 tgid:8285 ppid:2 flags:0x00400000 Workqueue: events bpf_prog_free_deferred Backtrace: [<818597ac>] (__schedule) from [<8185a3e4>] (__schedule_loop kernel/sched/core.c:6802 [inline]) [<818597ac>] (__schedule) from [<8185a3e4>] (schedule+0x2c/0xb8 kernel/sched/core.c:6817) r10:82c16005 r9:00000000 r8:8270dd7c r7:00000002 r6:dfc71dac r5:84a8e000 r4:84a8e000 [<8185a3b8>] (schedule) from [<8185a9b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6874) r5:84a8e000 r4:8270dd78 [<8185a998>] (schedule_preempt_disabled) from [<8185d298>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8185a998>] (schedule_preempt_disabled) from [<8185d298>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<8185cfb0>] (__mutex_lock.constprop.0) from [<8185db64>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:82c16005 r9:dfc71e38 r8:00000000 r7:ffffffff r6:00000000 r5:851244c0 r4:00000000 [<8185db50>] (__mutex_lock_slowpath) from [<8185dba4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<8185db68>] (mutex_lock) from [<8048e118>] (_vm_unmap_aliases+0x60/0x2e4 mm/vmalloc.c:2267) [<8048e0b8>] (_vm_unmap_aliases) from [<80491cb8>] (vm_reset_perms mm/vmalloc.c:2753 [inline]) [<8048e0b8>] (_vm_unmap_aliases) from [<80491cb8>] (vfree+0x170/0x1e0 mm/vmalloc.c:2832) r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851244c0 r4:00000000 [<80491b48>] (vfree) from [<802ea46c>] (module_memfree+0x30/0x50 kernel/module/main.c:1189) r9:84a8e000 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f02d000 [<802ea43c>] (module_memfree) from [<80388ba4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1048) r5:00001000 r4:dfc81000 [<80388b94>] (bpf_jit_free_exec) from [<80388d64>] (bpf_jit_binary_free kernel/bpf/core.c:1094 [inline]) [<80388b94>] (bpf_jit_free_exec) from [<80388d64>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1218) [<80388cfc>] (bpf_jit_free) from [<80389e44>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2772) r5:851c7350 r4:851c7000 [<80389cf8>] (bpf_prog_free_deferred) from [<80267028>] (process_one_work+0x19c/0x4a4 kernel/workqueue.c:2633) r7:dddd1280 r6:82c16000 r5:851c7350 r4:84fe7000 [<80266e8c>] (process_one_work) from [<80267570>] (process_scheduled_works kernel/workqueue.c:2706 [inline]) [<80266e8c>] (process_one_work) from [<80267570>] (worker_thread+0x240/0x48c kernel/workqueue.c:2787) r10:61c88647 r9:84a8e000 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:84fe702c r4:84fe7000 [<80267330>] (worker_thread) from [<8026e84c>] (kthread+0x104/0x134 kernel/kthread.c:388) r10:00000000 r9:e007de90 r8:84fffa80 r7:84fe7000 r6:80267330 r5:84a8e000 r4:85246ac0 [<8026e748>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30 arch/arm/kernel/entry-common.S:134) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e748 r4:85246ac0 INFO: task kworker/1:39:8553 blocked for more than 430 seconds. Not tainted 6.8.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:8553 tgid:8553 ppid:2 flags:0x00400000 Workqueue: events bpf_prog_free_deferred Backtrace: [<818597ac>] (__schedule) from [<8185a3e4>] (__schedule_loop kernel/sched/core.c:6802 [inline]) [<818597ac>] (__schedule) from [<8185a3e4>] (schedule+0x2c/0xb8 kernel/sched/core.c:6817) r10:82c16205 r9:00000000 r8:8270dd7c r7:00000002 r6:dfc11dac r5:841fbc00 r4:841fbc00 [<8185a3b8>] (schedule) from [<8185a9b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6874) r5:841fbc00 r4:8270dd78 [<8185a998>] (schedule_preempt_disabled) from [<8185d298>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8185a998>] (schedule_preempt_disabled) from [<8185d298>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<8185cfb0>] (__mutex_lock.constprop.0) from [<8185db64>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:82c16205 r9:dfc11e38 r8:00000000 r7:ffffffff r6:00000000 r5:85187e80 r4:00000000 [<8185db50>] (__mutex_lock_slowpath) from [<8185dba4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<8185db68>] (mutex_lock) from [<8048e118>] (_vm_unmap_aliases+0x60/0x2e4 mm/vmalloc.c:2267) [<8048e0b8>] (_vm_unmap_aliases) from [<80491cb8>] (vm_reset_perms mm/vmalloc.c:2753 [inline]) [<8048e0b8>] (_vm_unmap_aliases) from [<80491cb8>] (vfree+0x170/0x1e0 mm/vmalloc.c:2832) r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187e80 r4:00000000 [<80491b48>] (vfree) from [<802ea46c>] (module_memfree+0x30/0x50 kernel/module/main.c:1189) r9:841fbc00 r8:00000080 r7:00000000 r6:82c16200 r5:00001000 r4:7f02f000 [<802ea43c>] (module_memfree) from [<80388ba4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1048) r5:00001000 r4:dfdbb000 [<80388b94>] (bpf_jit_free_exec) from [<80388d64>] (bpf_jit_binary_free kernel/bpf/core.c:1094 [inline]) [<80388b94>] (bpf_jit_free_exec) from [<80388d64>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1218) [<80388cfc>] (bpf_jit_free) from [<80389e44>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2772) r5:851c7f50 r4:851c7c00 [<80389cf8>] (bpf_prog_free_deferred) from [<80267028>] (process_one_work+0x19c/0x4a4 kernel/workqueue.c:2633) r7:ddde4280 r6:82c16200 r5:851c7f50 r4:85128d00 [<80266e8c>] (process_one_work) from [<80267570>] (process_scheduled_works kernel/workqueue.c:2706 [inline]) [<80266e8c>] (process_one_work) from [<80267570>] (worker_thread+0x240/0x48c kernel/workqueue.c:2787) r10:61c88647 r9:841fbc00 r8:ddde42a0 r7:82604d40 r6:ddde4280 r5:85128d2c r4:85128d00 [<80267330>] (worker_thread) from [<8026e84c>] (kthread+0x104/0x134 kernel/kthread.c:388) r10:00000000 r9:dfd09e90 r8:82cc7f40 r7:85128d00 r6:80267330 r5:841fbc00 r4:85169440 [<8026e748>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30 arch/arm/kernel/entry-common.S:134) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e748 r4:85169440 NMI backtrace for cpu 0 CPU: 0 PID: 30 Comm: khungtaskd Not tainted 6.8.0-syzkaller #0 Hardware name: ARM-Versatile Express Backtrace: [<818382cc>] (dump_backtrace) from [<818383c8>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:256) r7:00000000 r6:00000013 r5:60000093 r4:81fbd67c [<818383b0>] (show_stack) from [<818558e4>] (__dump_stack lib/dump_stack.c:88 [inline]) [<818383b0>] (show_stack) from [<818558e4>] (dump_stack_lvl+0x48/0x54 lib/dump_stack.c:106) [<8185589c>] (dump_stack_lvl) from [<81855908>] (dump_stack+0x18/0x1c lib/dump_stack.c:113) r5:00000000 r4:00000001 [<818558f0>] (dump_stack) from [<818256f8>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81825598>] (nmi_cpu_backtrace) from [<81825844>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8260c494 r5:8261a7d8 r4:ffffffff [<81825714>] (nmi_trigger_cpumask_backtrace) from [<80210574>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:00000001 r8:82895eb8 r7:8260c5ec r6:00007ef3 r5:8261adc8 r4:83452f2c [<8021055c>] (arch_trigger_cpumask_backtrace) from [<80347ebc>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<8021055c>] (arch_trigger_cpumask_backtrace) from [<80347ebc>] (check_hung_uninterruptible_tasks kernel/hung_task.c:222 [inline]) [<8021055c>] (arch_trigger_cpumask_backtrace) from [<80347ebc>] (watchdog+0x48c/0x59c kernel/hung_task.c:379) [<80347a30>] (watchdog) from [<8026e84c>] (kthread+0x104/0x134 kernel/kthread.c:388) r10:00000000 r9:df819e58 r8:82e9f440 r7:00000000 r6:80347a30 r5:82ee1800 r4:82f459c0 [<8026e748>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30 arch/arm/kernel/entry-common.S:134) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e748 r4:82f459c0 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 2980 Comm: syz-fuzzer Not tainted 6.8.0-syzkaller #0 Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at unlock_task_sighand include/linux/sched/signal.h:756 [inline] LR is at do_send_sig_info+0x70/0xa0 kernel/signal.c:1301 pc : [<818629ac>] lr : [<80257f80>] psr: 60000013 sp : ec43de00 ip : ec43de10 fp : ec43de0c r10: 00400000 r9 : 00000001 r8 : 00000001 r7 : 0000001c r6 : a0000013 r5 : 83d95500 r4 : 00000000 r3 : 000095e7 r2 : 83451210 r1 : a0000013 r0 : 83d95500 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 84019280 DAC: 00000000 Backtrace: [<81862984>] (_raw_spin_unlock_irqrestore) from [<80257f80>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81862984>] (_raw_spin_unlock_irqrestore) from [<80257f80>] (unlock_task_sighand include/linux/sched/signal.h:756 [inline]) [<81862984>] (_raw_spin_unlock_irqrestore) from [<80257f80>] (do_send_sig_info+0x70/0xa0 kernel/signal.c:1301) [<80257f10>] (do_send_sig_info) from [<8025801c>] (group_send_sig_info+0x6c/0x78 kernel/signal.c:1451) r9:ec43df00 r8:00000001 r7:82ee6000 r6:00000001 r5:0000001c r4:00000000 [<80257fb0>] (group_send_sig_info) from [<80375f4c>] (bpf_send_signal_common+0xc8/0x10c kernel/trace/bpf_trace.c:881) r9:ec43df00 r8:00000001 r7:0000001c r6:82ee6000 r5:00000000 r4:dfec7000 [<80375e84>] (bpf_send_signal_common) from [<80375fa4>] (____bpf_send_signal kernel/trace/bpf_trace.c:886 [inline]) [<80375e84>] (bpf_send_signal_common) from [<80375fa4>] (bpf_send_signal+0x14/0x1c kernel/trace/bpf_trace.c:884) r9:ec43df00 r8:ec43df44 r7:84f4c7c8 r6:80375f90 r5:00000000 r4:dfec7000 [<80375f90>] (bpf_send_signal) from [<7f031e68>] (bpf_prog_8cc4ff36b5985b6a+0x60/0x6c) [<7f031e08>] (bpf_prog_8cc4ff36b5985b6a) from [<80376664>] (bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline]) [<7f031e08>] (bpf_prog_8cc4ff36b5985b6a) from [<80376664>] (__bpf_prog_run include/linux/filter.h:651 [inline]) [<7f031e08>] (bpf_prog_8cc4ff36b5985b6a) from [<80376664>] (bpf_prog_run include/linux/filter.h:658 [inline]) [<7f031e08>] (bpf_prog_8cc4ff36b5985b6a) from [<80376664>] (__bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline]) [<7f031e08>] (bpf_prog_8cc4ff36b5985b6a) from [<80376664>] (bpf_trace_run2+0x70/0x158 kernel/trace/bpf_trace.c:2420) r9:82ee6000 r8:80200288 r7:84f4c7c8 r6:000000ad r5:00000000 r4:dfec7000 [<803765f4>] (bpf_trace_run2) from [<80209780>] (__bpf_trace_sys_enter+0x28/0x30 include/trace/events/syscalls.h:18) r8:80200288 r7:84f4c7c8 r6:000000ad r5:ec43dfb0 r4:82ee6000 [<80209758>] (__bpf_trace_sys_enter) from [<8020a8cc>] (__traceiter_sys_enter include/trace/events/syscalls.h:18 [inline]) [<80209758>] (__bpf_trace_sys_enter) from [<8020a8cc>] (trace_sys_enter include/trace/events/syscalls.h:18 [inline]) [<80209758>] (__bpf_trace_sys_enter) from [<8020a8cc>] (syscall_trace_enter+0x100/0x1d0 arch/arm/kernel/ptrace.c:869) [<8020a7cc>] (syscall_trace_enter) from [<80200234>] (__sys_trace+0x8/0x3c) Exception stack(0xec43dfa8 to 0xec43dff0) dfa0: 00000000 00000000 00000000 00000000 00000080 00000000 dfc0: 00000000 00000000 00000000 000000ad 00000000 00000000 030022d0 3b9aca00 dfe0: 00098968 03045c88 00068164 7ec6e574 r7:000000ad r6:00000000 r5:00000000 r4:00000000