INFO: task kworker/1:4:4222 blocked for more than 430 seconds. Not tainted 6.12.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:4222 tgid:4222 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819bb914>] (__schedule) from [<819bc554>] (__schedule_loop kernel/sched/core.c:6759 [inline]) [<819bb914>] (__schedule) from [<819bc554>] (schedule+0x2c/0xfc kernel/sched/core.c:6774) r10:8260ca7c r9:00000000 r8:82717b64 r7:00000002 r6:e0715da4 r5:836c9800 r4:836c9800 [<819bc528>] (schedule) from [<819bc908>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6831) r5:836c9800 r4:82717b60 [<819bc8f0>] (schedule_preempt_disabled) from [<819bf3e0>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<819bc8f0>] (schedule_preempt_disabled) from [<819bf3e0>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819bf0f8>] (__mutex_lock.constprop.0) from [<819bfcac>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0715e20 r4:00000000 [<819bfc98>] (__mutex_lock_slowpath) from [<819bfcec>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<819bfcb0>] (mutex_lock) from [<804adc10>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2844) [<804adba8>] (_vm_unmap_aliases) from [<804b196c>] (vm_reset_perms mm/vmalloc.c:3272 [inline]) [<804adba8>] (_vm_unmap_aliases) from [<804b196c>] (vfree+0x170/0x1e4 mm/vmalloc.c:3351) r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4880 r4:00000000 [<804b17fc>] (vfree) from [<8050fba8>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:836c9800 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f019000 [<8050fb78>] (execmem_free) from [<8039c4d4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:eb1bf000 [<8039c4c4>] (bpf_jit_free_exec) from [<8039c8b4>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<8039c4c4>] (bpf_jit_free_exec) from [<8039c8b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<8039c84c>] (bpf_jit_free) from [<8039da08>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2815) r5:850faf54 r4:850fac00 [<8039d8bc>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3229) r7:ddde40c0 r6:82c18200 r5:850faf54 r4:85045e80 [<80265e80>] (process_one_work) from [<80266c18>] (process_scheduled_works kernel/workqueue.c:3310 [inline]) [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc kernel/workqueue.c:3391) r10:836c9800 r9:85045eac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 r4:85045e80 [<80266a2c>] (worker_thread) from [<8026fc90>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df931e78 r8:846f1f00 r7:85045e80 r6:80266a2c r5:836c9800 r4:849f9280 [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0715fb0 to 0xe0715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:849f9280 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc3-syzkaller #0 Hardware name: ARM-Versatile Express Call trace: [<81999458>] (dump_backtrace) from [<81999554>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000013 r5:60000093 r4:8203d3f8 [<8199953c>] (show_stack) from [<819b7a00>] (__dump_stack lib/dump_stack.c:94 [inline]) [<8199953c>] (show_stack) from [<819b7a00>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<819b7990>] (dump_stack_lvl) from [<819b7a24>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<819b7a0c>] (dump_stack) from [<81986718>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<819865b8>] (nmi_cpu_backtrace) from [<81986864>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8260c5d0 r5:8261af0c r4:ffffffff [<81986734>] (nmi_trigger_cpumask_backtrace) from [<802103e8>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:00009790 r8:828b6cf8 r7:8260c730 r6:00007f3f r5:8261b4c8 r4:83458e1c [<802103d0>] (arch_trigger_cpumask_backtrace) from [<803581b0>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<802103d0>] (arch_trigger_cpumask_backtrace) from [<803581b0>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]) [<802103d0>] (arch_trigger_cpumask_backtrace) from [<803581b0>] (watchdog+0x498/0x5b8 kernel/hung_task.c:379) [<80357d18>] (watchdog) from [<8026fc90>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df819e58 r8:82f41180 r7:00000000 r6:80357d18 r5:82e51800 r4:82f41080 [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:82f41080 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 3107 Comm: sshd Not tainted 6.12.0-rc3-syzkaller #0 Hardware name: ARM-Versatile Express PC is at skb_peek include/linux/skbuff.h:2135 [inline] PC is at __skb_dequeue include/linux/skbuff.h:2441 [inline] PC is at process_backlog+0xb0/0x17c net/core/dev.c:6108 LR is at debug_smp_processor_id+0x20/0x24 lib/smp_processor_id.c:60 pc : [<814b9f54>] lr : [<819b8ffc>] psr: 20000013 sp : df801e40 ip : df801e30 fp : df801e74 r10: dddd10c8 r9 : 00000040 r8 : 00000022 r7 : 00000000 r6 : 00000000 r5 : dddd11b0 r4 : 843729c0 r3 : 00000101 r2 : 00000000 r1 : 8203d3f8 r0 : 00000000 Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 834fee40 DAC: fffffffd Call trace: frame pointer underflow [<814b9ea4>] (process_backlog) from [<814bae50>] (__napi_poll+0x34/0x240 net/core/dev.c:6775) r10:dddd10c0 r9:dddd1300 r8:df801ed0 r7:df801ecb r6:00000040 r5:dddd11b0 r4:00000001 [<814bae1c>] (__napi_poll) from [<814bb6c4>] (napi_poll net/core/dev.c:6844 [inline]) [<814bae1c>] (__napi_poll) from [<814bb6c4>] (net_rx_action+0x358/0x440 net/core/dev.c:6966) r9:dddd1300 r8:df801ed0 r7:0000012c r6:00009794 r5:dddd11b0 r4:00000000 [<814bb36c>] (net_rx_action) from [<8024b524>] (handle_softirqs+0x158/0x464 kernel/softirq.c:554) r10:00000008 r9:83f5ec00 r8:00000101 r7:00400100 r6:00000003 r5:00000004 r4:8260408c [<8024b3cc>] (handle_softirqs) from [<802012d0>] (__do_softirq+0x14/0x18 kernel/softirq.c:588) r10:82f49480 r9:82920f00 r8:00000000 r7:850bbbcc r6:845687c0 r5:00000001 r4:60000013 [<802012bc>] (__do_softirq) from [<80208800>] (____do_softirq+0x10/0x14 arch/arm/kernel/irq.c:77) [<802087f0>] (____do_softirq) from [<819688f8>] (call_with_stack+0x1c/0x20 arch/arm/lib/call_with_stack.S:40) [<819688dc>] (call_with_stack) from [<8020883c>] (do_softirq_own_stack+0x38/0x3c arch/arm/kernel/irq.c:82) [<80208804>] (do_softirq_own_stack) from [<8024ba3c>] (do_softirq kernel/softirq.c:455 [inline]) [<80208804>] (do_softirq_own_stack) from [<8024ba3c>] (do_softirq+0x5c/0x64 kernel/softirq.c:442) [<8024b9e0>] (do_softirq) from [<8024bb10>] (__local_bh_enable_ip+0xcc/0xd0 kernel/softirq.c:382) r5:00000001 r4:83f5ec00 [<8024ba44>] (__local_bh_enable_ip) from [<81660604>] (local_bh_enable include/linux/bottom_half.h:33 [inline]) [<8024ba44>] (__local_bh_enable_ip) from [<81660604>] (__ip_local_out+0x90/0x1a4 net/ipv4/ip_output.c:105) r5:82920f00 r4:84401780 [<81660574>] (__ip_local_out) from [<81660ae0>] (ip_local_out net/ipv4/ip_output.c:128 [inline]) [<81660574>] (__ip_local_out) from [<81660ae0>] (__ip_queue_xmit+0x178/0x49c net/ipv4/ip_output.c:536) r7:84568a58 r6:00000045 r5:845687c0 r4:84401780 [<81660968>] (__ip_queue_xmit) from [<81660e18>] (ip_queue_xmit+0x14/0x18 net/ipv4/ip_output.c:550) r10:00122480 r9:0000006b r8:84401798 r7:00000020 r6:00000000 r5:84401780 r4:845687c0 [<81660e04>] (ip_queue_xmit) from [<81686688>] (__tcp_transmit_skb+0x558/0xd14 net/ipv4/tcp_output.c:1466) [<81686130>] (__tcp_transmit_skb) from [<81688b50>] (tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]) [<81686130>] (__tcp_transmit_skb) from [<81688b50>] (tcp_write_xmit+0x388/0x1848 net/ipv4/tcp_output.c:2827) r10:0000ffcb r9:0000ffcb r8:935e6567 r7:845688e8 r6:00000000 r5:845687c0 r4:844016c0 [<816887c8>] (tcp_write_xmit) from [<8168a048>] (__tcp_push_pending_frames+0x38/0x108 net/ipv4/tcp_output.c:3012) r10:00000125 r9:83f5ec00 r8:8020029c r7:00000000 r6:845688e8 r5:844016c0 r4:845687c0 [<8168a010>] (__tcp_push_pending_frames) from [<8168ae30>] (tcp_send_fin+0x64/0x248 net/ipv4/tcp_output.c:3618) r5:844016c0 r4:845687c0 [<8168adcc>] (tcp_send_fin) from [<8166dac0>] (tcp_shutdown net/ipv4/tcp.c:2993 [inline]) [<8168adcc>] (tcp_send_fin) from [<8166dac0>] (tcp_shutdown+0x54/0x58 net/ipv4/tcp.c:2978) r6:00000002 r5:00000084 r4:845687c0 [<8166da6c>] (tcp_shutdown) from [<816b32d4>] (inet_shutdown+0xa4/0x100 net/ipv4/af_inet.c:925) r5:8315f680 r4:845687c0 [<816b3230>] (inet_shutdown) from [<814866c8>] (__sys_shutdown_sock net/socket.c:2448 [inline]) [<816b3230>] (inet_shutdown) from [<814866c8>] (__sys_shutdown_sock net/socket.c:2442 [inline]) [<816b3230>] (inet_shutdown) from [<814866c8>] (__sys_shutdown+0x64/0xa8 net/socket.c:2460) r7:00000125 r6:00000001 r5:00000000 r4:8315f680 [<81486664>] (__sys_shutdown) from [<8148671c>] (__do_sys_shutdown net/socket.c:2468 [inline]) [<81486664>] (__sys_shutdown) from [<8148671c>] (sys_shutdown+0x10/0x14 net/socket.c:2466) r6:004bda07 r5:004bdf47 r4:019d9cf8 [<8148670c>] (sys_shutdown) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xdf989fa8 to 0xdf989ff0) 9fa0: 019d9cf8 004bdf47 00000007 00000001 00000000 00000000 9fc0: 019d9cf8 004bdf47 004bda07 00000125 019ee198 00000006 00000001 00000007 9fe0: 004f0ce0 7ef8e0b4 0046f2e0 76bcdb3c