INFO: task kworker/1:3:2888 blocked for more than 430 seconds. Not tainted 6.16.0-rc4-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:2888 tgid:2888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a306b8>] (__schedule) from [<81a31640>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a306b8>] (__schedule) from [<81a31640>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb8ddd84 r8:00000002 r7:60000013 r6:eb8ddd8c r5:83ab6c00 r4:83ab6c00 [<81a31614>] (schedule) from [<81a31a28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ab6c00 r4:829185c0 [<81a31a10>] (schedule_preempt_disabled) from [<81a3410c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31a10>] (schedule_preempt_disabled) from [<81a3410c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a33e0c>] (__mutex_lock.constprop.0) from [<81a345d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8dde08 r4:00000000 [<81a345c4>] (__mutex_lock_slowpath) from [<81a34618>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a345dc>] (mutex_lock) from [<804e520c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e51a4>] (_vm_unmap_aliases) from [<804e90fc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e51a4>] (_vm_unmap_aliases) from [<804e90fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b8c6c0 r4:00000000 [<804e8f90>] (vfree) from [<8054ec5c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ab6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f250000 [<8054ec2c>] (execmem_free) from [<803c6c50>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff65000 [<803c6c40>] (bpf_jit_free_exec) from [<803c7030>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c40>] (bpf_jit_free_exec) from [<803c7030>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6fc8>] (bpf_jit_free) from [<803c80c0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f4cf8c r4:84f4cc00 [<803c7f74>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84f4cf8c r4:84935e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab6c00 r8:84935eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84935e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84935e80 r8:8027ed34 r7:df879e60 r6:84935e00 r5:83ab6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8ddfb0 to 0xeb8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84937300 INFO: task kworker/1:3:2888 is blocked on a mutex likely owned by task kworker/1:2:44. task:kworker/1:2 state:R running task stack:0 pid:44 tgid:44 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a306b8>] (__schedule) from [<81a31a74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8339b000 r8:80200be4 r7:df915d54 r6:ffffffff r5:8339b000 r4:00000000 [<81a31a34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf915d20 to 0xdf915d68) 5d20: a95a3000 e4731000 00000001 80239bb8 7f24a000 00000001 82abf1c4 82abe5a0 5d40: 7f24a000 e4731000 8280c9b4 df915d9c df915da0 df915d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4fd0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4d4c>] (__purge_vmap_area_lazy) from [<804e5388>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df915dc0 r5:df915e08 r4:df915dc0 [<804e51a4>] (_vm_unmap_aliases) from [<804e90fc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e51a4>] (_vm_unmap_aliases) from [<804e90fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85db1e80 r4:00000000 [<804e8f90>] (vfree) from [<8054ec5c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8339b000 r7:00000000 r6:83018200 r5:00001000 r4:7f24e000 [<8054ec2c>] (execmem_free) from [<803c6c50>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe25000 [<803c6c40>] (bpf_jit_free_exec) from [<803c7030>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c40>] (bpf_jit_free_exec) from [<803c7030>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6fc8>] (bpf_jit_free) from [<803c80c0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587778c r4:85877400 [<803c7f74>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8587778c r4:832d7c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8339b000 r8:832d7c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832d7c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832d7c00 r8:8027ed34 r7:df879e60 r6:83328c00 r5:8339b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf915fb0 to 0xdf915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:832d6c40 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000013 r5:60000093 r4:8225c190 [<80201ae4>] (show_stack) from [<8021fd88>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021fd94>] (dump_stack) from [<81a1a5d4>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a1a474>] (nmi_cpu_backtrace) from [<81a1a720>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281af40 r4:ffffffff [<81a1a5f0>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8280c80c r8:82ab3564 r7:8281bb28 r6:00007f13 r5:8281b508 r4:83ccb90c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380df4>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380df4>] (check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380df4>] (watchdog+0x4a8/0x74c kernel/hung_task.c:470) [<8038094c>] (watchdog) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8038094c r7:83328600 r6:83328600 r5:83259800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:832c0a00 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 6371 Comm: kworker/u8:0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Workqueue: netns cleanup_net PC is at xt_get_this_cpu_counter include/linux/netfilter/x_tables.h:436 [inline] PC is at xt_get_this_cpu_counter include/linux/netfilter/x_tables.h:433 [inline] PC is at ip6t_do_table+0x558/0x8b8 net/ipv6/netfilter/ip6_tables.c:320 LR is at 0x0 pc : [<81883fbc>] lr : [<00000000>] psr: 20000113 sp : df801c30 ip : 00000000 fp : df801d04 r10: 84fd70d8 r9 : 00000000 r8 : 85d09240 r7 : 81e7c304 r6 : 85a84800 r5 : 85a849b8 r4 : 85a84910 r3 : 00000002 r2 : 00000000 r1 : 00000000 r0 : 00000000 Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 858b2000 DAC: fffffffd Call trace: frame pointer underflow [<81883a64>] (ip6t_do_table) from [<81885ea8>] (ip6table_mangle_hook+0x3c/0x19c net/ipv6/netfilter/ip6table_mangle.c:73) r10:dddcfe88 r9:830cc200 r8:df801d8c r7:85d09240 r6:85d09240 r5:00000000 r4:df801d8c [<81885e6c>] (ip6table_mangle_hook) from [<81685690>] (nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]) [<81885e6c>] (ip6table_mangle_hook) from [<81685690>] (nf_hook_slow+0x40/0x104 net/netfilter/core.c:623) r10:dddcfe88 r9:830cc200 r8:df801d8c r7:85d09240 r6:830cc200 r5:00000000 r4:85d09240 [<81685650>] (nf_hook_slow) from [<8181a010>] (nf_hook include/linux/netfilter.h:272 [inline]) [<81685650>] (nf_hook_slow) from [<8181a010>] (NF_HOOK include/linux/netfilter.h:315 [inline]) [<81685650>] (nf_hook_slow) from [<8181a010>] (ip6_input+0xb8/0xd8 net/ipv6/ip6_input.c:491) r9:00000040 r8:00000021 r7:00000000 r6:84f82700 r5:84fd7000 r4:85d09240 [<81819f58>] (ip6_input) from [<8181957c>] (dst_input include/net/dst.h:469 [inline]) [<81819f58>] (ip6_input) from [<8181957c>] (ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]) [<81819f58>] (ip6_input) from [<8181957c>] (NF_HOOK include/linux/netfilter.h:317 [inline]) [<81819f58>] (ip6_input) from [<8181957c>] (NF_HOOK include/linux/netfilter.h:311 [inline]) [<81819f58>] (ip6_input) from [<8181957c>] (ipv6_rcv+0x150/0x15c net/ipv6/ip6_input.c:309) r6:84f82700 r5:85d09240 r4:00000001 [<8181942c>] (ipv6_rcv) from [<81569cdc>] (__netif_receive_skb_one_core+0x5c/0x80 net/core/dev.c:5977) r6:00000000 r5:8181942c r4:84fd7000 [<81569c80>] (__netif_receive_skb_one_core) from [<81569d48>] (__netif_receive_skb+0x18/0x5c net/core/dev.c:6090) r5:dddcff70 r4:85d09240 [<81569d30>] (__netif_receive_skb) from [<8156a050>] (process_backlog+0xa0/0x17c net/core/dev.c:6442) r5:dddcff70 r4:85d09240 [<81569fb0>] (process_backlog) from [<8156b03c>] (__napi_poll+0x34/0x240 net/core/dev.c:7414) r10:dddcfe80 r9:00000000 r8:df801ed8 r7:df801ed3 r6:00000040 r5:dddcff70 r4:00000001 [<8156b008>] (__napi_poll) from [<8156b928>] (napi_poll net/core/dev.c:7478 [inline]) [<8156b008>] (__napi_poll) from [<8156b928>] (net_rx_action+0x3a0/0x430 net/core/dev.c:7605) r9:00000000 r8:df801ed8 r7:0000012c r6:00000000 r5:5b70d000 r4:dddcff70 [<8156b588>] (net_rx_action) from [<802619dc>] (handle_softirqs+0x140/0x458 kernel/softirq.c:579) r10:84b5c800 r9:82804d40 r8:00000101 r7:00000003 r6:00000008 r5:00000004 r4:8280408c [<8026189c>] (handle_softirqs) from [<802012d0>] (__do_softirq+0x14/0x18 kernel/softirq.c:613) r10:00000000 r9:84f82124 r8:859db554 r7:00000158 r6:84f81a00 r5:00000001 r4:60000113 [<802012bc>] (__do_softirq) from [<8022858c>] (____do_softirq+0x10/0x14 arch/arm/kernel/irq.c:77) [<8022857c>] (____do_softirq) from [<819fc814>] (call_with_stack+0x1c/0x20 arch/arm/lib/call_with_stack.S:40) [<819fc7f8>] (call_with_stack) from [<802285c8>] (do_softirq_own_stack+0x38/0x3c arch/arm/kernel/irq.c:82) [<80228590>] (do_softirq_own_stack) from [<80261fe4>] (do_softirq kernel/softirq.c:480 [inline]) [<80228590>] (do_softirq_own_stack) from [<80261fe4>] (do_softirq+0x5c/0x64 kernel/softirq.c:467) [<80261f88>] (do_softirq) from [<802620b8>] (__local_bh_enable_ip+0xcc/0xd0 kernel/softirq.c:407) r5:00000001 r4:84b5c800 [<80261fec>] (__local_bh_enable_ip) from [<81a39a68>] (__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]) [<80261fec>] (__local_bh_enable_ip) from [<81a39a68>] (_raw_spin_unlock_bh+0x34/0x38 kernel/locking/spinlock.c:210) r5:00000000 r4:859f6000 [<81a39a34>] (_raw_spin_unlock_bh) from [<81820658>] (spin_unlock_bh include/linux/spinlock.h:396 [inline]) [<81a39a34>] (_raw_spin_unlock_bh) from [<81820658>] (addrconf_ifdown+0x130/0x76c net/ipv6/addrconf.c:3911) [<81820528>] (addrconf_ifdown) from [<81826dec>] (addrconf_notify+0x98/0x770 net/ipv6/addrconf.c:3780) r10:dfb7dd64 r9:00000000 r8:81826d54 r7:00000002 r6:84f81a00 r5:859f6000 r4:84ef4000 [<81826d54>] (addrconf_notify) from [<8028957c>] (notifier_call_chain+0x60/0x1b4 kernel/notifier.c:85) r10:dfb7dd64 r9:00000000 r8:81826d54 r7:00000000 r6:ffffffd1 r5:829e4bcc r4:829e5a24 [<8028951c>] (notifier_call_chain) from [<802897b4>] (raw_notifier_call_chain+0x20/0x28 kernel/notifier.c:453) r10:82423920 r9:00000000 r8:84ef4000 r7:00000001 r6:84f81a00 r5:00000002 r4:dfb7dd64 [<80289794>] (raw_notifier_call_chain) from [<81563df8>] (call_netdevice_notifiers_info+0x54/0xa0 net/core/dev.c:2230) [<81563da4>] (call_netdevice_notifiers_info) from [<81564408>] (call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]) [<81563da4>] (call_netdevice_notifiers_info) from [<81564408>] (call_netdevice_notifiers net/core/dev.c:2282 [inline]) [<81563da4>] (call_netdevice_notifiers_info) from [<81564408>] (dev_close_many+0xfc/0x150 net/core/dev.c:1785) r6:dfb7ddd8 r5:84ef7000 r4:84ef4114 [<8156430c>] (dev_close_many) from [<8156f250>] (unregister_netdevice_many_notify+0x1e8/0xbc0 net/core/dev.c:12047) r9:00000001 r8:dfb7ddd8 r7:dfb7de40 r6:84d50114 r5:85a7d114 r4:dfb7dd34 [<8156f068>] (unregister_netdevice_many_notify) from [<8156fc40>] (unregister_netdevice_many+0x18/0x1c net/core/dev.c:12140) r10:00000001 r9:00000001 r8:829d1c80 r7:dfb7de78 r6:829d1c80 r5:829d1c80 r4:dfb7de98 [<8156fc28>] (unregister_netdevice_many) from [<81551e54>] (ops_exit_rtnl_list net/core/net_namespace.c:188 [inline]) [<8156fc28>] (unregister_netdevice_many) from [<81551e54>] (ops_undo_list+0x214/0x238 net/core/net_namespace.c:249) [<81551c40>] (ops_undo_list) from [<81553f58>] (cleanup_net+0x20c/0x384 net/core/net_namespace.c:686) r10:00000000 r9:ffffffd4 r8:84f83400 r7:829d1ba8 r6:829d1b80 r5:82c1c780 r4:84f81a20 [<81553d4c>] (cleanup_net) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:8300f070 r9:8301bc15 r8:84b5c800 r7:8300e600 r6:8301bc00 r5:829d1b98 r4:85d0dd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b5c800 r8:85d0dd2c r7:82804d40 r6:8300e600 r5:8300e620 r4:85d0dd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d0dd00 r8:8027ed34 r7:ec245e60 r6:85d0dd80 r5:84b5c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856fd240