INFO: task kworker/0:2:30315 blocked for more than 430 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:30315 tgid:30315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc55d84 r8:00000002 r7:60000113 r6:dfc55d8c r5:856cec00 r4:856cec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856cec00 r4:82918640 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e4dd4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d4c0 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df8e3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508d38c r4:8508d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8508d38c r4:8552f480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cec00 r8:8552f4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8552f480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f480 r8:8027ed34 r7:dfa41e60 r6:8552f080 r5:856cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc55fb0 to 0xdfc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:88bb4c80 INFO: task kworker/0:2:30315 is blocked on a mutex likely owned by task kworker/1:41:30657. task:kworker/1:41 state:R running task stack:0 pid:30657 tgid:30657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84ee0c00 r8:80200be4 r7:dfdadd54 r6:ffffffff r5:84ee0c00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfdadd20 to 0xdfdadd68) dd20: 93d61000 eaabf000 00000001 80239bb8 7f003000 00000001 82ac11c4 82ac05a0 dd40: 7f003000 eaabf000 8280c9b4 dfdadd9c dfdadda0 dfdadd70 80230af4 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4914>] (__purge_vmap_area_lazy) from [<804e4f50>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfdaddc0 r5:dfdade08 r4:dfdaddc0 [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1600 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f01f000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd87000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:86e7a38c r4:86e7a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86e7a38c r4:85178900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0c00 r8:8517892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85178900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85178900 r8:8027ed34 r7:dfc49e60 r6:8559d100 r5:84ee0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b1b40 INFO: task kworker/0:17:30651 blocked for more than 430 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:30651 tgid:30651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfcf9d84 r8:00000002 r7:60000113 r6:dfcf9d8c r5:84ee1800 r4:84ee1800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ee1800 r4:82918640 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e4dd4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85677740 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ee1800 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85125f8c r4:85125c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85125f8c r4:8559d280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee1800 r8:8559d2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8559d280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559d280 r8:8027ed34 r7:dfbe1e60 r6:8559df80 r5:84ee1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:872dd680 INFO: task kworker/0:17:30651 is blocked on a mutex likely owned by task kworker/1:41:30657. task:kworker/1:41 state:R running task stack:0 pid:30657 tgid:30657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84ee0c00 r8:80200be4 r7:dfdadd54 r6:ffffffff r5:84ee0c00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfdadd20 to 0xdfdadd68) dd20: 94db6000 eaabf000 00000001 80239bb8 7f003000 00000001 82ac11c4 82ac05a0 dd40: 7f003000 eaabf000 8280c9b4 dfdadd9c dfdadda0 dfdadd70 80230af4 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4914>] (__purge_vmap_area_lazy) from [<804e4f50>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfdaddc0 r5:dfdade08 r4:dfdaddc0 [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1600 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f01f000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd87000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:86e7a38c r4:86e7a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86e7a38c r4:85178900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0c00 r8:8517892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85178900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85178900 r8:8027ed34 r7:dfc49e60 r6:8559d100 r5:84ee0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b1b40 INFO: task kworker/0:18:30652 blocked for more than 430 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:30652 tgid:30652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:84ee3000 r4:84ee3000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ee3000 r4:82918640 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e4dd4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85658d00 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ee3000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe85000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85126f8c r4:85126c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85126f8c r4:8559de80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee3000 r8:8559deac r7:82804d40 r6:dddced40 r5:dddced60 r4:8559de80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559de80 r8:8027ed34 r7:dfcf9e60 r6:8559d780 r5:84ee3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:872ddc40 INFO: task kworker/0:18:30652 is blocked on a mutex likely owned by task kworker/1:41:30657. task:kworker/1:41 state:R running task stack:0 pid:30657 tgid:30657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84ee0c00 r8:80200be4 r7:dfdadd54 r6:ffffffff r5:84ee0c00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfdadd20 to 0xdfdadd68) dd20: 9e36c000 eaabf000 00000001 80239bb8 7f003000 00000001 82ac11c4 82ac05a0 dd40: 7f003000 eaabf000 8280c9b4 dfdadd9c dfdadda0 dfdadd70 80230af4 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4914>] (__purge_vmap_area_lazy) from [<804e4f50>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfdaddc0 r5:dfdade08 r4:dfdaddc0 [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1600 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f01f000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd87000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:86e7a38c r4:86e7a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86e7a38c r4:85178900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0c00 r8:8517892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85178900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85178900 r8:8027ed34 r7:dfc49e60 r6:8559d100 r5:84ee0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b1b40 INFO: task kworker/1:42:30658 blocked for more than 430 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:30658 tgid:30658 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfe35d84 r8:00000002 r7:60000013 r6:dfe35d8c r5:84ee0000 r4:84ee0000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ee0000 r4:82918640 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe35e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e4dd4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85183a80 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee0000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514878c r4:85148400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514878c r4:85178c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0000 r8:85178c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85178c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85178c00 r8:8027ed34 r7:dfdade60 r6:8559d480 r5:84ee0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe35fb0 to 0xdfe35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b1280 INFO: task kworker/1:42:30658 is blocked on a mutex likely owned by task kworker/1:41:30657. task:kworker/1:41 state:R running task stack:0 pid:30657 tgid:30657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84ee0c00 r8:80200be4 r7:dfdadd54 r6:ffffffff r5:84ee0c00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfdadd20 to 0xdfdadd68) dd20: a37ce000 eaabf000 00000001 80239bb8 7f003000 00000001 82ac11c4 82ac05a0 dd40: 7f003000 eaabf000 8280c9b4 dfdadd9c dfdadda0 dfdadd70 80230af4 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4914>] (__purge_vmap_area_lazy) from [<804e4f50>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfdaddc0 r5:dfdade08 r4:dfdaddc0 [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1600 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f01f000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd87000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:86e7a38c r4:86e7a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86e7a38c r4:85178900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0c00 r8:8517892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85178900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85178900 r8:8027ed34 r7:dfc49e60 r6:8559d100 r5:84ee0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b1b40 INFO: task kworker/1:43:30659 blocked for more than 430 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:30659 tgid:30659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfe39d84 r8:00000002 r7:60000113 r6:dfe39d8c r5:84ee2400 r4:84ee2400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ee2400 r4:82918640 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe39e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e4dd4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501cc00 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee2400 r7:00000000 r6:83018200 r5:00001000 r4:7f019000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa59000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:86e7b38c r4:86e7b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86e7b38c r4:85178b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee2400 r8:85178bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85178b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85178b80 r8:8027ed34 r7:dfe35e60 r6:8559d880 r5:84ee2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe39fb0 to 0xdfe39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b1280 INFO: task kworker/1:43:30659 is blocked on a mutex likely owned by task kworker/1:41:30657. task:kworker/1:41 state:R running task stack:0 pid:30657 tgid:30657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84ee0c00 r8:80200be4 r7:dfdadd54 r6:ffffffff r5:84ee0c00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfdadd20 to 0xdfdadd68) dd20: a69bc000 eaabf000 00000001 80239bb8 7f003000 00000001 82ac11c4 82ac05a0 dd40: 7f003000 eaabf000 8280c9b4 dfdadd9c dfdadda0 dfdadd70 80230af4 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4914>] (__purge_vmap_area_lazy) from [<804e4f50>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfdaddc0 r5:dfdade08 r4:dfdaddc0 [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1600 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f01f000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd87000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:86e7a38c r4:86e7a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86e7a38c r4:85178900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0c00 r8:8517892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85178900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85178900 r8:8027ed34 r7:dfc49e60 r6:8559d100 r5:84ee0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b1b40 INFO: task kworker/0:19:30684 blocked for more than 430 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:30684 tgid:30684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfe8dd84 r8:00000002 r7:60000113 r6:dfe8dd8c r5:85262400 r4:85262400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85262400 r4:82918640 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe8de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e4dd4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567e4c0 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85262400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff53000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:86e7af8c r4:86e7ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:86e7af8c r4:8559dc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85262400 r8:8559dcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8559dc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559dc80 r8:8027ed34 r7:dfcf9e60 r6:8559da00 r5:85262400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe8dfb0 to 0xdfe8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8547d5c0 INFO: task kworker/0:19:30684 is blocked on a mutex likely owned by task kworker/1:41:30657. task:kworker/1:41 state:R running task stack:0 pid:30657 tgid:30657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84ee0c00 r8:80200be4 r7:dfdadd54 r6:ffffffff r5:84ee0c00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfdadd20 to 0xdfdadd68) dd20: a69bc000 eaabf000 00000001 80239bb8 7f003000 00000001 82ac11c4 82ac05a0 dd40: 7f003000 eaabf000 8280c9b4 dfdadd9c dfdadda0 dfdadd70 80230af4 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4914>] (__purge_vmap_area_lazy) from [<804e4f50>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfdaddc0 r5:dfdade08 r4:dfdaddc0 [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1600 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f01f000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd87000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:86e7a38c r4:86e7a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86e7a38c r4:85178900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0c00 r8:8517892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85178900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85178900 r8:8027ed34 r7:dfc49e60 r6:8559d100 r5:84ee0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b1b40 INFO: task kworker/0:20:30685 blocked for more than 431 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:30685 tgid:30685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfeb9d84 r8:00000002 r7:60000113 r6:dfeb9d8c r5:8324c800 r4:8324c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324c800 r4:82918640 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeb9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e4dd4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500e600 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8324c800 r7:00000000 r6:83018000 r5:00001000 r4:7f017000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df91f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509478c r4:85094400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8509478c r4:8559db80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324c800 r8:8559dbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8559db80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559db80 r8:8027ed34 r7:dfe8de60 r6:846e8f00 r5:8324c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeb9fb0 to 0xdfeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8547d5c0 INFO: task kworker/0:20:30685 is blocked on a mutex likely owned by task kworker/1:41:30657. task:kworker/1:41 state:R running task stack:0 pid:30657 tgid:30657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84ee0c00 r8:80200be4 r7:dfdadd54 r6:ffffffff r5:84ee0c00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfdadd20 to 0xdfdadd68) dd20: a8215000 eaabf000 00000001 80239bb8 7f003000 00000001 82ac11c4 82ac05a0 dd40: 7f003000 eaabf000 8280c9b4 dfdadd9c dfdadda0 dfdadd70 80230af4 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4914>] (__purge_vmap_area_lazy) from [<804e4f50>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfdaddc0 r5:dfdade08 r4:dfdaddc0 [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1600 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f01f000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd87000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:86e7a38c r4:86e7a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86e7a38c r4:85178900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0c00 r8:8517892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85178900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85178900 r8:8027ed34 r7:dfc49e60 r6:8559d100 r5:84ee0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b1b40 INFO: task kworker/0:21:30692 blocked for more than 431 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:30692 tgid:30692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e0265d84 r8:00000002 r7:60000113 r6:e0265d8c r5:8324bc00 r4:8324bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324bc00 r4:82918640 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0265e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e4dd4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500e480 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8324bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df90d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85095b8c r4:85095800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85095b8c r4:8559d400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324bc00 r8:8559d42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8559d400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559d400 r8:8027ed34 r7:dfeb9e60 r6:846e8b00 r5:8324bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0265fb0 to 0xe0265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8567e240 INFO: task kworker/0:21:30692 is blocked on a mutex likely owned by task kworker/1:41:30657. task:kworker/1:41 state:R running task stack:0 pid:30657 tgid:30657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84ee0c00 r8:80200be4 r7:dfdadd54 r6:ffffffff r5:84ee0c00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfdadd20 to 0xdfdadd68) dd20: a8397000 eaabf000 00000001 80239bb8 7f003000 00000001 82ac11c4 82ac05a0 dd40: 7f003000 eaabf000 8280c9b4 dfdadd9c dfdadda0 dfdadd70 80230af4 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4914>] (__purge_vmap_area_lazy) from [<804e4f50>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfdaddc0 r5:dfdade08 r4:dfdaddc0 [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1600 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f01f000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd87000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:86e7a38c r4:86e7a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86e7a38c r4:85178900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0c00 r8:8517892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85178900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85178900 r8:8027ed34 r7:dfc49e60 r6:8559d100 r5:84ee0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b1b40 INFO: task kworker/0:22:30697 blocked for more than 431 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:30697 tgid:30697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df849d84 r8:00000002 r7:60000113 r6:df849d8c r5:856cc800 r4:856cc800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856cc800 r4:82918640 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df849e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e4dd4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f7300 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f003000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df845000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509578c r4:85095400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8509578c r4:8559d300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cc800 r8:8559d32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8559d300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559d300 r8:8027ed34 r7:e0265e60 r6:8754b780 r5:856cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf849fb0 to 0xdf849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84e28240 INFO: task kworker/0:22:30697 is blocked on a mutex likely owned by task kworker/1:41:30657. task:kworker/1:41 state:R running task stack:0 pid:30657 tgid:30657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84ee0c00 r8:80200be4 r7:dfdadd54 r6:ffffffff r5:84ee0c00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfdadd20 to 0xdfdadd68) dd20: ac60e000 eaabf000 00000001 80239bb8 7f003000 00000001 82ac11c4 82ac05a0 dd40: 7f003000 eaabf000 8280c9b4 dfdadd9c dfdadda0 dfdadd70 80230af4 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4914>] (__purge_vmap_area_lazy) from [<804e4f50>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfdaddc0 r5:dfdade08 r4:dfdaddc0 [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1600 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f01f000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd87000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:86e7a38c r4:86e7a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86e7a38c r4:85178900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0c00 r8:8517892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85178900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85178900 r8:8027ed34 r7:dfc49e60 r6:8559d100 r5:84ee0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b1b40 INFO: task kworker/0:23:30698 blocked for more than 431 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:30698 tgid:30698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df959d84 r8:00000002 r7:60000113 r6:df959d8c r5:856ce000 r4:856ce000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856ce000 r4:82918640 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df959e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e4dd4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b8080 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f01b000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514af8c r4:8514ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514af8c r4:8559d500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ce000 r8:8559d52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8559d500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559d500 r8:8027ed34 r7:df849e60 r6:8754ba00 r5:856ce000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf959fb0 to 0xdf959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84e28240 INFO: task kworker/0:23:30698 is blocked on a mutex likely owned by task kworker/1:41:30657. task:kworker/1:41 state:R running task stack:0 pid:30657 tgid:30657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84ee0c00 r8:80200be4 r7:dfdadd54 r6:ffffffff r5:84ee0c00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfdadd20 to 0xdfdadd68) dd20: ac60e000 eaabf000 00000001 80239bb8 7f003000 00000001 82ac11c4 82ac05a0 dd40: 7f003000 eaabf000 8280c9b4 dfdadd9c dfdadda0 dfdadd70 80230af4 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4914>] (__purge_vmap_area_lazy) from [<804e4f50>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfdaddc0 r5:dfdade08 r4:dfdaddc0 [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d6c>] (_vm_unmap_aliases) from [<804e8cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1600 r4:00000000 [<804e8b58>] (vfree) from [<80549e94>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f01f000 [<80549e64>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd87000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:86e7a38c r4:86e7a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86e7a38c r4:85178900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0c00 r8:8517892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85178900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85178900 r8:8027ed34 r7:dfc49e60 r6:8559d100 r5:84ee0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b1b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc1-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00030113 r5:60030193 r4:8225e950 [<80201ae4>] (show_stack) from [<8021fdc4>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ae4>] (show_stack) from [<8021fdc4>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fd54>] (dump_stack_lvl) from [<8021fde8>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021fdd0>] (dump_stack) from [<81a4a378>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4a218>] (nmi_cpu_backtrace) from [<81a4a4c4>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281afc0 r4:ffffffff [<81a4a394>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8280c80c r8:82ab5564 r7:8281bba8 r6:00007dc7 r5:8281b588 r4:851aa90c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380d34>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380d34>] (check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380d34>] (watchdog+0x4a8/0x74c kernel/hung_task.c:470) [<8038088c>] (watchdog) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8038088c r7:83349780 r6:83349780 r5:83259800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8334c580 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2815 Comm: pr/ttyAMA0 Not tainted 6.16.0-rc1-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a69954>] lr : [<80a6caa8>] psr: 60000013 sp : eb801eb0 ip : eb801ec0 fp : eb801ebc r10: 8295a48c r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 8295a3f0 r5 : 00000000 r4 : 00000001 r3 : 0000580d r2 : 00000000 r1 : 60000013 r0 : 84322440 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 846f99c0 DAC: 00000000 Call trace: [<81a6992c>] (_raw_spin_unlock_irqrestore) from [<80a6caa8>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6992c>] (_raw_spin_unlock_irqrestore) from [<80a6caa8>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6992c>] (_raw_spin_unlock_irqrestore) from [<80a6caa8>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a6ca88>] (pl011_console_device_unlock) from [<802e7e64>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7de4>] (nbcon_emit_one) from [<802e8084>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c690 r5:84151800 r4:8295a3f0 [<802e7edc>] (nbcon_kthread_func) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295a3f0 r8:802e7edc r7:844a2980 r6:844a2980 r5:84151800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8386bb00