INFO: task kworker/0:7:25978 blocked for more than 430 seconds. Not tainted 6.8.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:25978 tgid:25978 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Backtrace: [<81869bd8>] (__schedule) from [<8186a814>] (__schedule_loop kernel/sched/core.c:6813 [inline]) [<81869bd8>] (__schedule) from [<8186a814>] (schedule+0x2c/0xfc kernel/sched/core.c:6828) r10:82c16005 r9:00000000 r8:8270ea7c r7:00000002 r6:e066dd94 r5:847fe000 r4:847fe000 [<8186a7e8>] (schedule) from [<8186ae24>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6885) r5:847fe000 r4:8270ea78 [<8186ae0c>] (schedule_preempt_disabled) from [<8186d704>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8186ae0c>] (schedule_preempt_disabled) from [<8186d704>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<8186d41c>] (__mutex_lock.constprop.0) from [<8186dfd0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:82c16005 r9:e066de20 r8:00000001 r7:8472b000 r6:8472c000 r5:87c3aac0 r4:00000000 [<8186dfbc>] (__mutex_lock_slowpath) from [<8186e010>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<8186dfd4>] (mutex_lock) from [<80494c38>] (_vm_unmap_aliases+0x60/0x2e4 mm/vmalloc.c:2267) [<80494bd8>] (_vm_unmap_aliases) from [<804987d8>] (vm_reset_perms mm/vmalloc.c:2753 [inline]) [<80494bd8>] (_vm_unmap_aliases) from [<804987d8>] (vfree+0x170/0x1e0 mm/vmalloc.c:2832) r10:82c16005 r9:00000001 r8:00000001 r7:8472b000 r6:8472c000 r5:87c3aac0 r4:00000000 [<80498668>] (vfree) from [<802ec7e4>] (module_memfree+0x30/0x50 kernel/module/main.c:1189) r9:847fe000 r8:00000080 r7:00000000 r6:82c16000 r5:00001000 r4:7f22e000 [<802ec7b4>] (module_memfree) from [<8038f6f4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1048) r5:00001000 r4:dfb55000 [<8038f6e4>] (bpf_jit_free_exec) from [<8038f8b4>] (bpf_jit_binary_free kernel/bpf/core.c:1094 [inline]) [<8038f6e4>] (bpf_jit_free_exec) from [<8038f8b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1218) [<8038f84c>] (bpf_jit_free) from [<80390994>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2772) r5:84d4eb50 r4:84d4e800 [<80390848>] (bpf_prog_free_deferred) from [<80266390>] (process_one_work+0x1b8/0x508 kernel/workqueue.c:3254) r7:dddcfdc0 r6:82c16000 r5:84d4eb50 r4:84d68180 [<802661d8>] (process_one_work) from [<802670b4>] (process_scheduled_works kernel/workqueue.c:3335 [inline]) [<802661d8>] (process_one_work) from [<802670b4>] (worker_thread+0x1ec/0x418 kernel/workqueue.c:3416) r10:847fe000 r9:84d681ac r8:61c88647 r7:dddcfde0 r6:82604d40 r5:dddcfdc0 r4:84d68180 [<80266ec8>] (worker_thread) from [<8026fda8>] (kthread+0x104/0x134 kernel/kthread.c:388) r10:00000000 r9:ed2c1e90 r8:83684c80 r7:84d68180 r6:80266ec8 r5:847fe000 r4:84d176c0 [<8026fca4>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30 arch/arm/kernel/entry-common.S:134) Exception stack(0xe066dfb0 to 0xe066dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fca4 r4:84d176c0 NMI backtrace for cpu 0 CPU: 0 PID: 31 Comm: khungtaskd Not tainted 6.8.0-syzkaller #0 Hardware name: ARM-Versatile Express Backtrace: [<81848214>] (dump_backtrace) from [<81848310>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:256) r7:00000000 r6:00000013 r5:60000093 r4:81fbc05c [<818482f8>] (show_stack) from [<81865d08>] (__dump_stack lib/dump_stack.c:88 [inline]) [<818482f8>] (show_stack) from [<81865d08>] (dump_stack_lvl+0x48/0x54 lib/dump_stack.c:106) [<81865cc0>] (dump_stack_lvl) from [<81865d2c>] (dump_stack+0x18/0x1c lib/dump_stack.c:113) r5:00000000 r4:00000001 [<81865d14>] (dump_stack) from [<818355ec>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<8183548c>] (nmi_cpu_backtrace) from [<81835738>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8260c490 r5:8261a818 r4:ffffffff [<81835608>] (nmi_trigger_cpumask_backtrace) from [<802105b4>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:8260c5f4 r8:00097219 r7:82896eb8 r6:00007f26 r5:83404a04 r4:82fc5724 [<8021059c>] (arch_trigger_cpumask_backtrace) from [<8034e8dc>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<8021059c>] (arch_trigger_cpumask_backtrace) from [<8034e8dc>] (check_hung_uninterruptible_tasks kernel/hung_task.c:222 [inline]) [<8021059c>] (arch_trigger_cpumask_backtrace) from [<8034e8dc>] (watchdog+0x480/0x594 kernel/hung_task.c:379) [<8034e45c>] (watchdog) from [<8026fda8>] (kthread+0x104/0x134 kernel/kthread.c:388) r10:00000000 r9:df819e58 r8:82ea02c0 r7:00000000 r6:8034e45c r5:82ee9800 r4:82f48140 [<8026fca4>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30 arch/arm/kernel/entry-common.S:134) Exception stack(0xdf8ddfb0 to 0xdf8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fca4 r4:82f48140 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 10738 Comm: syz-executor.1 Not tainted 6.8.0-syzkaller #0 Hardware name: ARM-Versatile Express PC is at 0x16910 LR is at 0x16910 pc : [<00016910>] lr : [<00016910>] psr: 20000010 sp : 200002e0 ip : 200002e0 fp : 76b700fc r10: 003d0f00 r9 : 7e82c32f r8 : 7e82c32e r7 : 00000000 r6 : 00000000 r5 : 00001015 r4 : 00000000 r3 : 00000000 r2 : 000001b0 r1 : 00000004 r0 : ffffffff Flags: nzCv IRQs on FIQs on Mode USER_32 ISA ARM Segment none Control: 30c5387d Table: 8532a2c0 DAC: 00000000 Backtrace: invalid frame pointer 0x76b700fc