INFO: task kworker/0:158:5395 blocked for more than 430 seconds. Not tainted 6.11.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:158 state:D stack:0 pid:5395 tgid:5395 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8197ec88>] (__schedule) from [<8197f820>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ec88>] (__schedule) from [<8197f820>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:e889dda4 r5:853abc00 r4:853abc00 [<8197f7f4>] (schedule) from [<8197fbd4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:853abc00 r4:82714ab4 [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819823c4>] (__mutex_lock.constprop.0) from [<81982f78>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e889de20 r4:00000000 [<81982f64>] (__mutex_lock_slowpath) from [<81982fb8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<81982f7c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline]) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354) r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bd440 r4:00000000 [<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:853abc00 r8:00800000 r7:00000000 r6:82c16000 r5:00001000 r4:7f061000 [<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:eaf8d000 [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:84d41b54 r4:84d41800 [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:dddd0000 r6:82c16000 r5:84d41b54 r4:85069c00 [<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389) r10:853abc00 r9:85069c2c r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 r4:85069c00 [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:eab3de78 r8:85123340 r7:85069c00 r6:80266900 r5:853abc00 r4:8529b240 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe889dfb0 to 0xe889dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:8529b240 INFO: task kworker/1:109:20064 blocked for more than 430 seconds. Not tainted 6.11.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:109 state:D stack:0 pid:20064 tgid:20064 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8197ec88>] (__schedule) from [<8197f820>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ec88>] (__schedule) from [<8197f820>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:dfafdda4 r5:854fb000 r4:854fb000 [<8197f7f4>] (schedule) from [<8197fbd4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:854fb000 r4:82714ab4 [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819823c4>] (__mutex_lock.constprop.0) from [<81982f78>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde20 r4:00000000 [<81982f64>] (__mutex_lock_slowpath) from [<81982fb8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<81982f7c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline]) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354) r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41600 r4:00000000 [<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:854fb000 r8:01800000 r7:00000000 r6:82c16200 r5:00001000 r4:7f003000 [<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:dfdf7000 [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:85b0df54 r4:85b0dc00 [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:ddde4000 r6:82c16200 r5:85b0df54 r4:85170380 [<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389) r10:854fb000 r9:851703ac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 r4:85170380 [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:e00c5e78 r8:8529cec0 r7:85170380 r6:80266900 r5:854fb000 r4:84d84fc0 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:84d84fc0 INFO: task kworker/1:110:20075 blocked for more than 430 seconds. Not tainted 6.11.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:110 state:D stack:0 pid:20075 tgid:20075 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8197ec88>] (__schedule) from [<8197f820>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ec88>] (__schedule) from [<8197f820>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:ea92dda4 r5:854fd400 r4:854fd400 [<8197f7f4>] (schedule) from [<8197fbd4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:854fd400 r4:82714ab4 [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819823c4>] (__mutex_lock.constprop.0) from [<81982f78>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea92de20 r4:00000000 [<81982f64>] (__mutex_lock_slowpath) from [<81982fb8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<81982f7c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline]) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354) r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d6cfc0 r4:00000000 [<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:854fd400 r8:01800000 r7:00000000 r6:82c16200 r5:00001000 r4:7f053000 [<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:ead0d000 [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:85470f54 r4:85470c00 [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:ddde4000 r6:82c16200 r5:85470f54 r4:85170100 [<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389) r10:854fd400 r9:8517012c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 r4:85170100 [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:dfafde78 r8:8529c100 r7:85170100 r6:80266900 r5:854fd400 r4:845bf9c0 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea92dfb0 to 0xea92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:845bf9c0 INFO: task kworker/0:88:20082 blocked for more than 430 seconds. Not tainted 6.11.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:88 state:D stack:0 pid:20082 tgid:20082 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8197ec88>] (__schedule) from [<8197f820>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ec88>] (__schedule) from [<8197f820>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:ea97dda4 r5:854fbc00 r4:854fbc00 [<8197f7f4>] (schedule) from [<8197fbd4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:854fbc00 r4:82714ab4 [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819823c4>] (__mutex_lock.constprop.0) from [<81982f78>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea97de20 r4:00000000 [<81982f64>] (__mutex_lock_slowpath) from [<81982fb8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<81982f7c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline]) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354) r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827ac0 r4:00000000 [<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:854fbc00 r8:00800000 r7:00000000 r6:82c16000 r5:00001000 r4:7f031000 [<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:dff61000 [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:85471b54 r4:85471800 [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:dddd0000 r6:82c16000 r5:85471b54 r4:85cc5e00 [<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389) r10:854fbc00 r9:85cc5e2c r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 r4:85cc5e00 [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:eab4de78 r8:85c72380 r7:85cc5e00 r6:80266900 r5:854fbc00 r4:85c72ac0 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea97dfb0 to 0xea97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:85c72ac0 INFO: task kworker/0:91:20101 blocked for more than 430 seconds. Not tainted 6.11.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:91 state:D stack:0 pid:20101 tgid:20101 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8197ec88>] (__schedule) from [<8197f820>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ec88>] (__schedule) from [<8197f820>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:eaa89da4 r5:854fe000 r4:854fe000 [<8197f7f4>] (schedule) from [<8197fbd4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:854fe000 r4:82714ab4 [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819823c4>] (__mutex_lock.constprop.0) from [<81982f78>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa89e20 r4:00000000 [<81982f64>] (__mutex_lock_slowpath) from [<81982fb8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<81982f7c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline]) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354) r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c6cd40 r4:00000000 [<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:854fe000 r8:00800000 r7:00000000 r6:82c16000 r5:00001000 r4:7f055000 [<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:eaec5000 [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:85b0fb54 r4:85b0f800 [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:dddd0000 r6:82c16000 r5:85b0fb54 r4:85cc5f80 [<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389) r10:854fe000 r9:85cc5fac r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 r4:85cc5f80 [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:ea97de78 r8:84f56240 r7:85cc5f80 r6:80266900 r5:854fe000 r4:84f56d00 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa89fb0 to 0xeaa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:84f56d00 INFO: task kworker/1:126:20121 blocked for more than 430 seconds. Not tainted 6.11.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:126 state:D stack:0 pid:20121 tgid:20121 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8197ec88>] (__schedule) from [<8197f820>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ec88>] (__schedule) from [<8197f820>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:eaf55da4 r5:8451bc00 r4:8451bc00 [<8197f7f4>] (schedule) from [<8197fbd4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:8451bc00 r4:82714ab4 [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819823c4>] (__mutex_lock.constprop.0) from [<81982f78>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf55e20 r4:00000000 [<81982f64>] (__mutex_lock_slowpath) from [<81982fb8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<81982f7c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline]) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354) r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a21200 r4:00000000 [<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:8451bc00 r8:01800000 r7:00000000 r6:82c16200 r5:00001000 r4:7f057000 [<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:eaf4b000 [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:85e3ef54 r4:85e3ec00 [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:ddde4000 r6:82c16200 r5:85e3ef54 r4:85170900 [<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389) r10:8451bc00 r9:8517092c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 r4:85170900 [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:dfafde78 r8:85c6c8c0 r7:85170900 r6:80266900 r5:8451bc00 r4:85a21f00 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf55fb0 to 0xeaf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:85a21f00 INFO: task kworker/0:99:20123 blocked for more than 430 seconds. Not tainted 6.11.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:99 state:D stack:0 pid:20123 tgid:20123 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8197ec88>] (__schedule) from [<8197f820>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ec88>] (__schedule) from [<8197f820>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:eaf79da4 r5:8451d400 r4:8451d400 [<8197f7f4>] (schedule) from [<8197fbd4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:8451d400 r4:82714ab4 [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819823c4>] (__mutex_lock.constprop.0) from [<81982f78>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e20 r4:00000000 [<81982f64>] (__mutex_lock_slowpath) from [<81982fb8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<81982f7c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline]) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354) r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ec55c0 r4:00000000 [<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:8451d400 r8:00800000 r7:00000000 r6:82c16000 r5:00001000 r4:7f02f000 [<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:dfe01000 [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:85472f54 r4:85472c00 [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:dddd0000 r6:82c16000 r5:85472f54 r4:85cc5a00 [<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389) r10:8451d400 r9:85cc5a2c r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 r4:85cc5a00 [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:ea97de78 r8:84f56040 r7:85cc5a00 r6:80266900 r5:8451d400 r4:84f56740 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf79fb0 to 0xeaf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:84f56740 INFO: task kworker/0:101:20156 blocked for more than 430 seconds. Not tainted 6.11.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:101 state:D stack:0 pid:20156 tgid:20156 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8197ec88>] (__schedule) from [<8197f820>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ec88>] (__schedule) from [<8197f820>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:dfef5da4 r5:8451b000 r4:8451b000 [<8197f7f4>] (schedule) from [<8197fbd4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:8451b000 r4:82714ab4 [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819823c4>] (__mutex_lock.constprop.0) from [<81982f78>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfef5e20 r4:00000000 [<81982f64>] (__mutex_lock_slowpath) from [<81982fb8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<81982f7c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline]) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354) r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827300 r4:00000000 [<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:8451b000 r8:00800000 r7:00000000 r6:82c16000 r5:00001000 r4:7f033000 [<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:e051f000 [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:85471354 r4:85471000 [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:dddd0000 r6:82c16000 r5:85471354 r4:85cc5980 [<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389) r10:8451b000 r9:85cc59ac r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 r4:85cc5980 [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:dfb71e78 r8:858275c0 r7:85cc5980 r6:80266900 r5:8451b000 r4:858277c0 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef5fb0 to 0xdfef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:858277c0 INFO: task kworker/0:102:20164 blocked for more than 430 seconds. Not tainted 6.11.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:102 state:D stack:0 pid:20164 tgid:20164 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8197ec88>] (__schedule) from [<8197f820>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<8197ec88>] (__schedule) from [<8197f820>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:eaf91da4 r5:84519800 r4:84519800 [<8197f7f4>] (schedule) from [<8197fbd4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:84519800 r4:82714ab4 [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<8197fbbc>] (schedule_preempt_disabled) from [<819826ac>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819823c4>] (__mutex_lock.constprop.0) from [<81982f78>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e20 r4:00000000 [<81982f64>] (__mutex_lock_slowpath) from [<81982fb8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<81982f7c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline]) [<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354) r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd4000 r4:00000000 [<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:84519800 r8:00800000 r7:00000000 r6:82c16000 r5:00001000 r4:7f035000 [<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:e0629000 [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:85b0e754 r4:85b0e400 [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:dddd0000 r6:82c16000 r5:85b0e754 r4:85cc5c80 [<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389) r10:84519800 r9:85cc5cac r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 r4:85cc5c80 [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:dfb71e78 r8:85827e40 r7:85cc5c80 r6:80266900 r5:84519800 r4:858272c0 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf91fb0 to 0xeaf91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:858272c0 NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-rc5-syzkaller #0 Hardware name: ARM-Versatile Express Call trace: [<8195d0a0>] (dump_backtrace) from [<8195d19c>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:8200ca8c [<8195d184>] (show_stack) from [<8197aedc>] (__dump_stack lib/dump_stack.c:93 [inline]) [<8195d184>] (show_stack) from [<8197aedc>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:119) [<8197ae6c>] (dump_stack_lvl) from [<8197af00>] (dump_stack+0x18/0x1c lib/dump_stack.c:128) r5:00000000 r4:00000001 [<8197aee8>] (dump_stack) from [<8194a390>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<8194a230>] (nmi_cpu_backtrace) from [<8194a4dc>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8260c5d0 r5:8261a88c r4:ffffffff [<8194a3ac>] (nmi_trigger_cpumask_backtrace) from [<802103c8>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:0002e5e7 r8:828b3130 r7:8260c734 r6:00007d58 r5:8261ae48 r4:84e0201c [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]) [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (watchdog+0x498/0x5b8 kernel/hung_task.c:379) [<80350998>] (watchdog) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df819e58 r8:82e9e440 r7:00000000 r6:80350998 r5:82ee1800 r4:82f44cc0 [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:82f44cc0 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2923 Comm: syslogd Not tainted 6.11.0-rc5-syzkaller #0 Hardware name: ARM-Versatile Express PC is at avc_search_node security/selinux/avc.c:532 [inline] PC is at avc_lookup security/selinux/avc.c:560 [inline] PC is at avc_has_perm_noaudit+0x7c/0x150 security/selinux/avc.c:1158 LR is at rcu_read_lock include/linux/rcupdate.h:836 [inline] LR is at avc_has_perm_noaudit+0x2c/0x150 security/selinux/avc.c:1157 pc : [<806f5030>] lr : [<806f4fe0>] psr: 60000013 sp : ebb89d78 ip : 00000047 fp : ebb89dac r10: 00000001 r9 : ebb89e2c r8 : 00000019 r7 : 00000047 r6 : 00000002 r5 : ebb89dc0 r4 : 00000047 r3 : 84376738 r2 : 000000cb r1 : 00000047 r0 : 00000047 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 84324e40 DAC: 00000000 Call trace: [<806f4fb4>] (avc_has_perm_noaudit) from [<806f515c>] (avc_has_perm+0x58/0xe4 security/selinux/avc.c:1196) r9:ebb89e2c r8:00000019 r7:00000047 r6:00000047 r5:83f61f80 r4:00000002 [<806f5104>] (avc_has_perm) from [<806f5674>] (inode_has_perm+0x60/0x74 security/selinux/hooks.c:1671) r9:00000047 r8:82205f14 r7:8304d480 r6:00000002 r5:83f61f80 r4:00000002 [<806f5614>] (inode_has_perm) from [<806f5828>] (file_has_perm+0xf4/0xfc security/selinux/hooks.c:1761) r4:83491e40 [<806f5734>] (file_has_perm) from [<806fe2dc>] (selinux_revalidate_file_permission security/selinux/hooks.c:3622 [inline]) [<806f5734>] (file_has_perm) from [<806fe2dc>] (selinux_file_permission+0xc8/0x110 security/selinux/hooks.c:3643) r8:00000004 r7:83d10000 r6:834921cc r5:00000004 r4:83491e40 [<806fe214>] (selinux_file_permission) from [<806efaac>] (security_file_permission+0x38/0x54 security/security.c:2722) r9:83d10000 r8:013f21d0 r7:00000000 r6:83491e40 r5:00000004 r4:82206424 [<806efa74>] (security_file_permission) from [<80505740>] (rw_verify_area+0x5c/0x174 fs/read_write.c:377) r7:00000000 r6:83d10000 r5:00000004 r4:83491e40 [<805056e4>] (rw_verify_area) from [<805074c8>] (vfs_read+0x6c/0x324 fs/read_write.c:467) r5:000000ff r4:83491e40 [<8050745c>] (vfs_read) from [<805081f0>] (ksys_read+0xc4/0xf8 fs/read_write.c:619) r10:00000003 r9:83d10000 r8:8020029c r7:000000ff r6:013f21d0 r5:83491e40 r4:83491e40 [<8050812c>] (ksys_read) from [<80508234>] (__do_sys_read fs/read_write.c:629 [inline]) [<8050812c>] (ksys_read) from [<80508234>] (sys_read+0x10/0x14 fs/read_write.c:627) r7:00000003 r6:013f22d0 r5:76f5b5a0 r4:fffffc00 [<80508224>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xebb89fa8 to 0xebb89ff0) 9fa0: fffffc00 76f5b5a0 00000000 013f21d0 000000ff 00000000 9fc0: fffffc00 76f5b5a0 013f22d0 00000003 00000000 013f21c8 76f2854c 76f28548 9fe0: 76f279f8 7ebdfc70 76e9d2ec 76dab2fc