INFO: task kworker/1:2:25138 blocked for more than 430 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:25138 tgid:25138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcb1d84 r8:00000002 r7:60000113 r6:dfcb1d8c r5:83b0a400 r4:83b0a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b0a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8908f600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83b0a400 r7:00000000 r6:83018200 r5:00001000 r4:7f2be000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cc5b8c r4:85cc5800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cc5b8c r4:8bb9da80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b0a400 r8:8bb9daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8bb9da80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8bb9da80 r8:80287e08 r7:df9e5e60 r6:88e82400 r5:83b0a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb1fb0 to 0xdfcb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8ba9db00 INFO: task kworker/1:2:25138 is blocked on a mutex likely owned by task kworker/1:4:25139. task:kworker/1:4 state:R running task stack:0 pid:25139 tgid:25139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85020000 r8:80200be4 r7:dfd25d5c r6:ffffffff r5:85020000 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd25d28 to 0xdfd25d70) 5d20: a6b66000 fe540000 00000001 80239b98 7f2b8000 00000001 5d40: 82ac15a0 7f2b8000 fe540000 8280c928 82ac21c4 dfd25da4 dfd25da8 dfd25d78 5d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd25dc0 r5:dfd25e08 r4:dfd25dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86a48dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f2ba000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe73000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f8038c r4:85f80000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f8038c r4:8bb9db00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8bb9db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8bb9db00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8bb9db00 r8:80287e08 r7:df9e5e60 r6:88e82c80 r5:85020000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd25fb0 to 0xdfd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8569fc40 NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:82257c34 [<80201ac8>] (show_stack) from [<8022003c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<80220048>] (dump_stack) from [<81a3c88c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a3c72c>] (nmi_cpu_backtrace) from [<81a3c9d8>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c610 r5:8281af00 r4:ffffffff [<81a3c8a8>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:0005e85e r8:82ab6564 r7:8280c788 r6:00007f04 r5:8281b4c8 r4:85d53f0c [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386ef4>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386ef4>] (check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386ef4>] (watchdog+0x4a8/0x69c kernel/hung_task.c:437) [<80386a4c>] (watchdog) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:80386a4c r7:833aa200 r6:833aa200 r5:83369800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:833a7700 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 23105 Comm: syz.3.4558 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at kmap_local_sched_in kernel/sched/core.c:5156 [inline] PC is at finish_task_switch+0x8c/0x284 kernel/sched/core.c:5258 LR is at __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline] LR is at _raw_spin_unlock+0x2c/0x50 kernel/locking/spinlock.c:186 pc : [<8029ebbc>] lr : [<81a5b9c0>] psr: 20000113 sp : eb80de68 ip : eb80de58 fp : eb80deac r10: 00000000 r9 : 84231800 r8 : 855c6c00 r7 : 84231800 r6 : 81a52c18 r5 : ddde30c0 r4 : 00000000 r3 : 84231800 r2 : 00000001 r1 : 82257c34 r0 : 00000001 Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 8b9b7700 DAC: 00000000 Call trace: [<8029eb30>] (finish_task_switch) from [<81a52c18>] (context_switch kernel/sched/core.c:5385 [inline]) [<8029eb30>] (finish_task_switch) from [<81a52c18>] (__schedule+0x4f4/0xf58 kernel/sched/core.c:6767) r10:a402b648 r9:8a4be100 r8:00000000 r7:84231800 r6:84231800 r5:ddde30c0 r4:85020000 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:00006364 r9:84231800 r8:00000000 r7:84231800 r6:00000000 r5:eb80dfb0 r4:84231800 [<81a5367c>] (schedule) from [<8022b7f4>] (do_work_pending+0x34/0x4f8 arch/arm/kernel/signal.c:612) r5:eb80dfb0 r4:84231800 [<8022b7c0>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) Exception stack(0xeb80dfb0 to 0xeb80dff8) dfa0: ffffffff 00000004 000001e4 00000000 dfc0: 00000000 0000eaa2 00000000 00000000 002d0000 00000000 00006364 76b740bc dfe0: 200002b0 200002b0 00019438 00019438 20000010 ffffffff r10:00006364 r9:84231800 r8:00000000 r7:84231800 r6:ffffffff r5:20000010 r4:00019438