INFO: task kworker/1:5:3813 blocked for more than 430 seconds. Not tainted 6.11.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3813 tgid:3813 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8197ed48>] (__schedule) from [<8197f8e0>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ed48>] (__schedule) from [<8197f8e0>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:dfe85da4 r5:83eb0c00 r4:83eb0c00 [<8197f8b4>] (schedule) from [<8197fc94>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:83eb0c00 r4:82714ab4 [<8197fc7c>] (schedule_preempt_disabled) from [<8198276c>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fc7c>] (schedule_preempt_disabled) from [<8198276c>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<81982484>] (__mutex_lock.constprop.0) from [<81983038>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe85e20 r4:00000000 [<81983024>] (__mutex_lock_slowpath) from [<81983078>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<8198303c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline]) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354) r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f7b700 r4:00000000 [<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:83eb0c00 r8:01800000 r7:00000000 r6:82c16200 r5:00001000 r4:7f041000 [<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:dff59000 [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:85202354 r4:85202000 [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:ddde4000 r6:82c16200 r5:85202354 r4:85044700 [<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389) r10:83eb0c00 r9:8504472c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 r4:85044700 [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df87de78 r8:8504c040 r7:85044700 r6:80266900 r5:83eb0c00 r4:850a0e80 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe85fb0 to 0xdfe85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:850a0e80 INFO: task kworker/0:29:4106 blocked for more than 430 seconds. Not tainted 6.11.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:4106 tgid:4106 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8197ed48>] (__schedule) from [<8197f8e0>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ed48>] (__schedule) from [<8197f8e0>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:dff89da4 r5:83768c00 r4:83768c00 [<8197f8b4>] (schedule) from [<8197fc94>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:83768c00 r4:82714ab4 [<8197fc7c>] (schedule_preempt_disabled) from [<8198276c>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fc7c>] (schedule_preempt_disabled) from [<8198276c>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<81982484>] (__mutex_lock.constprop.0) from [<81983038>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff89e20 r4:00000000 [<81983024>] (__mutex_lock_slowpath) from [<81983078>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<8198303c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline]) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354) r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846a0840 r4:00000000 [<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:83768c00 r8:00800000 r7:00000000 r6:82c16000 r5:00001000 r4:7f03f000 [<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:dff53000 [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:85203b54 r4:85203800 [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:dddd0000 r6:82c16000 r5:85203b54 r4:85056a80 [<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389) r10:83768c00 r9:85056aac r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 r4:85056a80 [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:dff49e78 r8:8505d300 r7:85056a80 r6:80266900 r5:83768c00 r4:8505da00 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff89fb0 to 0xdff89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:8505da00 INFO: task kworker/1:20:4128 blocked for more than 430 seconds. Not tainted 6.11.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:4128 tgid:4128 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8197ed48>] (__schedule) from [<8197f8e0>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ed48>] (__schedule) from [<8197f8e0>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:e042dda4 r5:836b6000 r4:836b6000 [<8197f8b4>] (schedule) from [<8197fc94>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:836b6000 r4:82714ab4 [<8197fc7c>] (schedule_preempt_disabled) from [<8198276c>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fc7c>] (schedule_preempt_disabled) from [<8198276c>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<81982484>] (__mutex_lock.constprop.0) from [<81983038>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e042de20 r4:00000000 [<81983024>] (__mutex_lock_slowpath) from [<81983078>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<8198303c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline]) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354) r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c7f00 r4:00000000 [<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:836b6000 r8:01800000 r7:00000000 r6:82c16200 r5:00001000 r4:7f03d000 [<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:dfeeb000 [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:85203f54 r4:85203c00 [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:ddde4000 r6:82c16200 r5:85203f54 r4:850aaa00 [<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389) r10:836b6000 r9:850aaa2c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 r4:850aaa00 [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df9b1e78 r8:85057bc0 r7:850aaa00 r6:80266900 r5:836b6000 r4:850b5280 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe042dfb0 to 0xe042dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:850b5280 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller #0 Hardware name: ARM-Versatile Express Call trace: [<8195d160>] (dump_backtrace) from [<8195d25c>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:8200ca8c [<8195d244>] (show_stack) from [<8197af9c>] (__dump_stack lib/dump_stack.c:93 [inline]) [<8195d244>] (show_stack) from [<8197af9c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:119) [<8197af2c>] (dump_stack_lvl) from [<8197afc0>] (dump_stack+0x18/0x1c lib/dump_stack.c:128) r5:00000001 r4:00000001 [<8197afa8>] (dump_stack) from [<8194a450>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<8194a2f0>] (nmi_cpu_backtrace) from [<8194a59c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8260c5d0 r5:8261a88c r4:ffffffff [<8194a46c>] (nmi_trigger_cpumask_backtrace) from [<802103c8>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:0000e38d r8:828b3130 r7:8260c734 r6:00007d51 r5:8261ae48 r4:854b661c [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]) [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (watchdog+0x498/0x5b8 kernel/hung_task.c:379) [<80350998>] (watchdog) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df819e58 r8:82ed0600 r7:00000000 r6:80350998 r5:82e9b000 r4:82f82b00 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:82f82b00 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2921 Comm: syslogd Not tainted 6.11.0-rc6-syzkaller #0 Hardware name: ARM-Versatile Express PC is at should_fail_usercopy+0x0/0x20 lib/fault-inject-usercopy.c:36 LR is at copy_from_user_iter lib/iov_iter.c:50 [inline] LR is at iterate_ubuf include/linux/iov_iter.h:29 [inline] LR is at iterate_and_advance2 include/linux/iov_iter.h:245 [inline] LR is at iterate_and_advance include/linux/iov_iter.h:271 [inline] LR is at __copy_from_iter lib/iov_iter.c:249 [inline] LR is at copy_page_from_iter_atomic+0x1a0/0x88c lib/iov_iter.c:481 pc : [<808be6f8>] lr : [<8080dc24>] psr: 60000013 sp : ec231dc8 ip : ec231d80 fp : ec231e3c r10: 8286d4e8 r9 : 00000000 r8 : 0205b4d0 r7 : def8e344 r6 : 00000000 r5 : 00000000 r4 : 0000008c r3 : 0000008c r2 : ec231ef0 r1 : 80219a38 r0 : ffefd000 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 8428ec80 DAC: fffffffd Call trace: [<8080da84>] (copy_page_from_iter_atomic) from [<804309fc>] (copy_folio_from_iter_atomic include/linux/uio.h:186 [inline]) [<8080da84>] (copy_page_from_iter_atomic) from [<804309fc>] (generic_perform_write+0x180/0x320 mm/filemap.c:4032) r10:81a195c0 r9:000003e5 r8:0000008c r7:83f85960 r6:0002bc1b r5:00000000 r4:def8e344 [<8043087c>] (generic_perform_write) from [<8045a020>] (shmem_file_write_iter+0x7c/0x84 mm/shmem.c:3074) r10:81a19740 r9:0205b4d0 r8:8469a9c0 r7:ec231ef0 r6:83f858d8 r5:ec231f08 r4:00000000 [<80459fa4>] (shmem_file_write_iter) from [<80507f54>] (new_sync_write fs/read_write.c:497 [inline]) [<80459fa4>] (shmem_file_write_iter) from [<80507f54>] (vfs_write+0x274/0x44c fs/read_write.c:590) r9:0205b4d0 r8:ec231f68 r7:83ee3c00 r6:0000008c r5:8469a9c0 r4:80459fa4 [<80507ce0>] (vfs_write) from [<805082b0>] (ksys_write+0x78/0xf8 fs/read_write.c:643) r10:00000004 r9:83ee3c00 r8:8020029c r7:00000000 r6:0002bc1b r5:8469a9c0 r4:8469a9c0 [<80508238>] (ksys_write) from [<80508340>] (__do_sys_write fs/read_write.c:655 [inline]) [<80508238>] (ksys_write) from [<80508340>] (sys_write+0x10/0x14 fs/read_write.c:652) r7:00000004 r6:76f08548 r5:76f415a0 r4:00000003 [<80508330>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xec231fa8 to 0xec231ff0) 1fa0: 00000003 76f415a0 00000003 0205b4d0 0000008c 00000000 1fc0: 00000003 76f415a0 76f08548 00000004 0000008c 0205b1c8 76f0854c 7ebd6c84 1fe0: 76f07d74 7ebd6b80 76e32760 76d8b39c