INFO: task kworker/0:1:12 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:12 tgid:12 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:df849d84 r8:00000002 r7:60000113 r6:df849d8c r5:83240c00 r4:83240c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:83240c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df849e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa5640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83240c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa67000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515c78c r4:8515c400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515c78c r4:830b8700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240c00 r8:830b872c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:8027ecf4 r7:df83de60 r6:830b8800 r5:83240c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf849fb0 to 0xdf849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:830b6ac0 INFO: task kworker/0:1:12 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 9147e000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 INFO: task kworker/1:1:47 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:47 tgid:47 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:df921d84 r8:00000002 r7:60000013 r6:df921d8c r5:833e0c00 r4:833e0c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:833e0c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df921e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97f80 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:833e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb2d000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514cf8c r4:8514cc00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514cf8c r4:8329e800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833e0c00 r8:8329e82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8329e800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8329e800 r8:8027ecf4 r7:df879e60 r6:833a9300 r5:833e0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf921fb0 to 0xdf921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8329ac80 INFO: task kworker/1:1:47 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 INFO: task kworker/0:3:3906 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3906 tgid:3906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfd75d84 r8:00000002 r7:60000113 r6:dfd75d8c r5:84d24800 r4:84d24800 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84d24800 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd75e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa5540 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84d24800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df98b000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515cb8c r4:8515c800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515cb8c r4:84febd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d24800 r8:84febdac r7:82804d40 r6:dddced40 r5:dddced60 r4:84febd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84febd80 r8:8027ecf4 r7:df911e60 r6:84febd00 r5:84d24800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd75fb0 to 0xdfd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a51880 INFO: task kworker/0:3:3906 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 INFO: task kworker/0:4:3907 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3907 tgid:3907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfd79d84 r8:00000002 r7:60000013 r6:dfd79d8c r5:84de3000 r4:84de3000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84de3000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd79e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aba580 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84de3000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ff000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85216b8c r4:85216800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85216b8c r4:84ea5680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84de3000 r8:84ea56ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ea5680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ea5680 r8:8027ecf4 r7:df911e60 r6:84ea5480 r5:84de3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd79fb0 to 0xdfd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e991c0 INFO: task kworker/0:4:3907 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 INFO: task kworker/0:64:4237 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:64 state:D stack:0 pid:4237 tgid:4237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dffb9d84 r8:00000002 r7:60000013 r6:dffb9d8c r5:85093000 r4:85093000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85093000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb9e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ab680 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85093000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa79000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515d38c r4:8515d000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515d38c r4:84a9ae80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85093000 r8:84a9aeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a9ae80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9ae80 r8:8027ecf4 r7:dff0de60 r6:84a9af00 r5:85093000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb9fb0 to 0xdffb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a7b5c0 INFO: task kworker/0:64:4237 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 INFO: task kworker/0:65:4248 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:65 state:D stack:0 pid:4248 tgid:4248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:85096000 r4:85096000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85096000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa5780 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85096000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9eb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515cf8c r4:8515cc00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515cf8c r4:85110f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85096000 r8:85110fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85110f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85110f80 r8:8027ecf4 r7:dffb9e60 r6:84aa3000 r5:85096000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aa9f00 INFO: task kworker/0:65:4248 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 INFO: task kworker/1:61:4249 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:4249 tgid:4249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfad5d84 r8:00000002 r7:60000013 r6:dfad5d8c r5:85096c00 r4:85096c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85096c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab5040 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85096c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc67000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520438c r4:85204000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520438c r4:84ab2c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85096c00 r8:84ab2cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2c80 r8:8027ecf4 r7:dfbbde60 r6:84aa3080 r5:85096c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a99f80 INFO: task kworker/1:61:4249 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 INFO: task kworker/1:64:4256 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:64 state:D stack:0 pid:4256 tgid:4256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfc95d84 r8:00000002 r7:60000113 r6:dfc95d8c r5:85091800 r4:85091800 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85091800 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab52c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85091800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd3000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520638c r4:85206000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520638c r4:84ab2e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85091800 r8:84ab2e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2e00 r8:8027ecf4 r7:dfad5e60 r6:84aa3200 r5:85091800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ab5080 INFO: task kworker/1:64:4256 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 INFO: task kworker/1:65:4257 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:65 state:D stack:0 pid:4257 tgid:4257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfcc1d84 r8:00000002 r7:60000113 r6:dfcc1d8c r5:841f3c00 r4:841f3c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:841f3c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc1e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6fc0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:841f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fb78c r4:851fb400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851fb78c r4:84ab2d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841f3c00 r8:84ab2d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d00 r8:8027ecf4 r7:dfc95e60 r6:84aa3280 r5:841f3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc1fb0 to 0xdfcc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ab5080 INFO: task kworker/1:65:4257 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 INFO: task kworker/1:66:4260 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:66 state:D stack:0 pid:4260 tgid:4260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfd1dd84 r8:00000002 r7:60000013 r6:dfd1dd8c r5:84068c00 r4:84068c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84068c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd1de08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab5540 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84068c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf1000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520678c r4:85206400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520678c r4:84ab2e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84068c00 r8:84ab2eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2e80 r8:8027ecf4 r7:dfcc1e60 r6:84aa3300 r5:84068c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd1dfb0 to 0xdfd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ab5600 INFO: task kworker/1:66:4260 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:67:4261 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:67 state:D stack:0 pid:4261 tgid:4261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfe09d84 r8:00000002 r7:60000013 r6:dfe09d8c r5:850cd400 r4:850cd400 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:850cd400 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe09e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab5580 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd6f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85207f8c r4:85207c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85207f8c r4:84ab2f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cd400 r8:84ab2f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2f00 r8:8027ecf4 r7:dfcc1e60 r6:84ab2f80 r5:850cd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe09fb0 to 0xdfe09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ab5080 INFO: task kworker/1:67:4261 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:68:4264 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:68 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfae1d84 r8:00000002 r7:60000013 r6:dfae1d8c r5:850cc800 r4:850cc800 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:850cc800 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab5880 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd93000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85207b8c r4:85207800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85207b8c r4:84ab2000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cc800 r8:84ab202c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2000 r8:8027ecf4 r7:dfcc1e60 r6:84ab3000 r5:850cc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ab5940 INFO: task kworker/1:68:4264 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:69:4265 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:69 state:D stack:0 pid:4265 tgid:4265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfd91d84 r8:00000002 r7:60000013 r6:dfd91d8c r5:850ce000 r4:850ce000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:850ce000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd91e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab5f00 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fbb8c r4:851fb800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851fbb8c r4:84ab3180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ce000 r8:84ab31ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab3180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab3180 r8:8027ecf4 r7:dfcc1e60 r6:84ab3100 r5:850ce000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd91fb0 to 0xdfd91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ab5a80 INFO: task kworker/1:69:4265 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:70:4268 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:70 state:D stack:0 pid:4268 tgid:4268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfe91d84 r8:00000002 r7:60000113 r6:dfe91d8c r5:850c8000 r4:850c8000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:850c8000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe91e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa64c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed1000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e6f8c r4:851e6c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e6f8c r4:84ab3280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c8000 r8:84ab32ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab3280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab3280 r8:8027ecf4 r7:dfcc1e60 r6:84ab3300 r5:850c8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe91fb0 to 0xdfe91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849b6f40 INFO: task kworker/1:70:4268 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 94fde000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:71:4269 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:71 state:D stack:0 pid:4269 tgid:4269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfe6dd84 r8:00000002 r7:60000113 r6:dfe6dd8c r5:850cb000 r4:850cb000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:850cb000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe6de08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515f38c r4:8515f000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515f38c r4:84ab3200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cb000 r8:84ab322c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab3200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab3200 r8:8027ecf4 r7:dfe91e60 r6:84ab3080 r5:850cb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe6dfb0 to 0xdfe6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a96d40 INFO: task kworker/1:71:4269 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8029358c>] (preempt_count_sub) from [<81a30c60>] (preempt_schedule_irq+0x4c/0xa8 kernel/sched/core.c:7115) [<819fb9d8>] (call_with_stack) from [<80200bcc>] (__irq_svc+0x8c/0xbc arch/arm/kernel/entry-armv.S:228) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: 9ab0a000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:72:4272 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:72 state:D stack:0 pid:4272 tgid:4272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfed9d84 r8:00000002 r7:60000013 r6:dfed9d8c r5:85220c00 r4:85220c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85220c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfed9e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab5d00 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85220c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee3000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506cb8c r4:8506c800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8506cb8c r4:84ab3480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85220c00 r8:84ab34ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab3480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab3480 r8:8027ecf4 r7:dfe6de60 r6:84ab3500 r5:85220c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfed9fb0 to 0xdfed9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ab5c40 INFO: task kworker/1:72:4272 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: a053d000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:73:4273 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:73 state:D stack:0 pid:4273 tgid:4273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfe55d84 r8:00000002 r7:60000013 r6:dfe55d8c r5:85220000 r4:85220000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85220000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe55e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a972c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85220000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba9000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e738c r4:851e7000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e738c r4:84ab3580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85220000 r8:84ab35ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab3580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab3580 r8:8027ecf4 r7:dfe6de60 r6:84ab3600 r5:85220000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe55fb0 to 0xdfe55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ab5a40 INFO: task kworker/1:73:4273 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: a6161000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:66:4278 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:66 state:D stack:0 pid:4278 tgid:4278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfb0dd84 r8:00000002 r7:60000013 r6:dfb0dd8c r5:85223000 r4:85223000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85223000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad040 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85223000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd9000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506c78c r4:8506c400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506c78c r4:84aa3380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85223000 r8:84aa33ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3380 r8:8027ecf4 r7:dffb9e60 r6:84ab3680 r5:85223000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849ab4c0 INFO: task kworker/0:66:4278 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: ac219000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:67:4279 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:67 state:D stack:0 pid:4279 tgid:4279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfb8dd84 r8:00000002 r7:60000013 r6:dfb8dd8c r5:85222400 r4:85222400 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85222400 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a996c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85222400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf9000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515f78c r4:8515f400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515f78c r4:84aa3400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85222400 r8:84aa342c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3400 r8:8027ecf4 r7:dfb0de60 r6:84ab3700 r5:85222400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849abe80 INFO: task kworker/0:67:4279 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: ac219000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:68:4282 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:68 state:D stack:0 pid:4282 tgid:4282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff25d84 r8:00000002 r7:60000113 r6:dff25d8c r5:85224800 r4:85224800 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85224800 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff25e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a96540 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85224800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb25000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515ff8c r4:8515fc00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515ff8c r4:84aa3480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85224800 r8:84aa34ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3480 r8:8027ecf4 r7:dfb0de60 r6:84ab3780 r5:85224800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff25fb0 to 0xdff25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a7fa80 INFO: task kworker/0:68:4282 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: ac219000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:69:4283 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:69 state:D stack:0 pid:4283 tgid:4283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff55d84 r8:00000002 r7:60000013 r6:dff55d8c r5:85223c00 r4:85223c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85223c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff55e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9c2c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85223c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd2f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515fb8c r4:8515f800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515fb8c r4:84aa3500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85223c00 r8:84aa352c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3500 r8:8027ecf4 r7:dfb0de60 r6:84ab3800 r5:85223c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff55fb0 to 0xdff55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a99700 INFO: task kworker/0:69:4283 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: ac219000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:74:4286 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:74 state:D stack:0 pid:4286 tgid:4286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff61d84 r8:00000002 r7:60000013 r6:dff61d8c r5:85226c00 r4:85226c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85226c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff61e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa8840 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85226c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd37000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514ff8c r4:8514fc00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514ff8c r4:84ab3880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85226c00 r8:84ab38ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab3880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab3880 r8:8027ecf4 r7:dfe55e60 r6:84ab3900 r5:85226c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a97380 INFO: task kworker/1:74:4286 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: ac219000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:75:4287 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:75 state:D stack:0 pid:4287 tgid:4287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff5dd84 r8:00000002 r7:60000113 r6:dff5dd8c r5:85226000 r4:85226000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85226000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff5de08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad740 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85226000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff91000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85205b8c r4:85205800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85205b8c r4:84ab3980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85226000 r8:84ab39ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab3980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab3980 r8:8027ecf4 r7:dff61e60 r6:84ab3a00 r5:85226000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff5dfb0 to 0xdff5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a97040 INFO: task kworker/1:75:4287 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: ac555000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:4290 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:4290 tgid:4290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff6dd84 r8:00000002 r7:60000013 r6:dff6dd8c r5:85221800 r4:85221800 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85221800 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff6de08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad4c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85221800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff75000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85205f8c r4:85205c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85205f8c r4:84aa3600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85221800 r8:84aa362c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3600 r8:8027ecf4 r7:dfb0de60 r6:84ab3a80 r5:85221800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff6dfb0 to 0xdff6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aad100 INFO: task kworker/0:70:4290 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: af7fe000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:4291 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:4291 tgid:4291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff71d84 r8:00000002 r7:60000113 r6:dff71d8c r5:85225400 r4:85225400 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85225400 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff71e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aade40 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85225400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdbd000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521438c r4:85214000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8521438c r4:84aa3680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85225400 r8:84aa36ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3680 r8:8027ecf4 r7:dff6de60 r6:84ab3b00 r5:85225400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aad280 INFO: task kworker/0:71:4291 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: af7fe000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:72:4294 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:72 state:D stack:0 pid:4294 tgid:4294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff59d84 r8:00000002 r7:60000113 r6:dff59d8c r5:84f08000 r4:84f08000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84f08000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff59e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa8740 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84f08000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd47000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514fb8c r4:8514f800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514fb8c r4:84aa3700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f08000 r8:84aa372c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3700 r8:8027ecf4 r7:dff71e60 r6:84ab3c00 r5:84f08000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aad080 INFO: task kworker/0:72:4294 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: af7fe000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:76:4295 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:76 state:D stack:0 pid:4295 tgid:4295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dffb1d84 r8:00000002 r7:60000013 r6:dffb1d8c r5:84f08c00 r4:84f08c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84f08c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb1e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad840 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84f08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc37000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515ef8c r4:8515ec00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515ef8c r4:84ab3d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f08c00 r8:84ab3d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab3d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab3d00 r8:8027ecf4 r7:dff61e60 r6:84ab3d80 r5:84f08c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb1fb0 to 0xdffb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a97ac0 INFO: task kworker/1:76:4295 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: af7fe000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:77:4298 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:77 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff81d84 r8:00000002 r7:60000013 r6:dff81d8c r5:84f0a400 r4:84f0a400 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84f0a400 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff81e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8ddc0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84f0a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca3000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851df78c r4:851df400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851df78c r4:84ab3e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f0a400 r8:84ab3e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab3e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab3e00 r8:8027ecf4 r7:dff61e60 r6:84ab3e80 r5:84f0a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff81fb0 to 0xdff81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a97f40 INFO: task kworker/1:77:4298 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b0234000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:78:4301 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:4301 tgid:4301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfd19d84 r8:00000002 r7:60000113 r6:dfd19d8c r5:84f0bc00 r4:84f0bc00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84f0bc00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd19e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97780 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84f0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc7f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dff8c r4:851dfc00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851dff8c r4:84ab3f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f0bc00 r8:84ab3f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab3f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab3f00 r8:8027ecf4 r7:dff81e60 r6:84ab3f80 r5:84f0bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd19fb0 to 0xdfd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a97e00 INFO: task kworker/1:78:4301 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b0234000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:79:4304 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:4304 tgid:4304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfccdd84 r8:00000002 r7:60000113 r6:dfccdd8c r5:84f0d400 r4:84f0d400 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84f0d400 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aba240 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84f0d400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df98d000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521678c r4:85216400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8521678c r4:84aab000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f0d400 r8:84aab02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aab000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aab000 r8:8027ecf4 r7:dff61e60 r6:84aab080 r5:84f0d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfccdfb0 to 0xdfccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aa8780 INFO: task kworker/1:79:4304 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b0234000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:73:4305 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:73 state:D stack:0 pid:4305 tgid:4305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfdb1d84 r8:00000002 r7:60000113 r6:dfdb1d8c r5:84f0e000 r4:84f0e000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84f0e000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdb1e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aadd40 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84f0e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7d000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dfb8c r4:851df800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851dfb8c r4:84aa3780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f0e000 r8:84aa37ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3780 r8:8027ecf4 r7:dff71e60 r6:84aab180 r5:84f0e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdb1fb0 to 0xdfdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aad980 INFO: task kworker/0:73:4305 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b0234000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:81:4308 blocked for more than 432 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:81 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfe85d84 r8:00000002 r7:60000113 r6:dfe85d8c r5:84f0b000 r4:84f0b000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84f0b000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe85e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84f0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1b000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e538c r4:851e5000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e538c r4:84aab280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f0b000 r8:84aab2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aab280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aab280 r8:8027ecf4 r7:dfccde60 r6:84aab300 r5:84f0b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe85fb0 to 0xdfe85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a08540 INFO: task kworker/1:81:4308 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b4d53000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:4310 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:74 state:D stack:0 pid:4310 tgid:4310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfea1d84 r8:00000002 r7:60000113 r6:dfea1d8c r5:84f09800 r4:84f09800 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84f09800 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfea1e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad280 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84f09800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa69000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e4b8c r4:851e4800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e4b8c r4:84aa3800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f09800 r8:84aa382c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3800 r8:8027ecf4 r7:dfdb1e60 r6:84aab400 r5:84f09800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfea1fb0 to 0xdfea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aadfc0 INFO: task kworker/0:74:4310 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b5ad9000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:82:4313 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:82 state:D stack:0 pid:4313 tgid:4313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfe19d84 r8:00000002 r7:60000113 r6:dfe19d8c r5:85238000 r4:85238000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85238000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe19e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8da80 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85238000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb19000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514e78c r4:8514e400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514e78c r4:84aab480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85238000 r8:84aab4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aab480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aab480 r8:8027ecf4 r7:dfdb5e60 r6:84aab580 r5:85238000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe19fb0 to 0xdfe19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aba1c0 INFO: task kworker/1:82:4313 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b5ad9000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:75:4316 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:75 state:D stack:0 pid:4316 tgid:4316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfbd5d84 r8:00000002 r7:60000113 r6:dfbd5d8c r5:85239800 r4:85239800 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85239800 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84962580 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85239800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0005000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525538c r4:85255000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525538c r4:84aa3880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85239800 r8:84aa38ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3880 r8:8027ecf4 r7:dfdb1e60 r6:84aab600 r5:85239800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aad680 INFO: task kworker/0:75:4316 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b5ad9000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:4317 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:4317 tgid:4317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfeddd84 r8:00000002 r7:60000013 r6:dfeddd8c r5:8523a400 r4:8523a400 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8523a400 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfedde08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aadc00 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8523a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae7000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85204b8c r4:85204800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85204b8c r4:84aa3900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523a400 r8:84aa392c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3900 r8:8027ecf4 r7:dfbd5e60 r6:84aab680 r5:8523a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeddfb0 to 0xdfeddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aadd00 INFO: task kworker/0:76:4317 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b5ad9000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:77:4320 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:77 state:D stack:0 pid:4320 tgid:4320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfee1d84 r8:00000002 r7:60000013 r6:dfee1d8c r5:85238c00 r4:85238c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85238c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfee1e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a99280 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85238c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb85000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515d78c r4:8515d400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515d78c r4:84aa3980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85238c00 r8:84aa39ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3980 r8:8027ecf4 r7:dfbd5e60 r6:84aab700 r5:85238c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfee1fb0 to 0xdfee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aade80 INFO: task kworker/0:77:4320 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b5ad9000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:83:4323 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:83 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfee9d84 r8:00000002 r7:60000013 r6:dfee9d8c r5:8523bc00 r4:8523bc00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8523bc00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfee9e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa95c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8523bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffad000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85216f8c r4:85216c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85216f8c r4:84aab800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523bc00 r8:84aab82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aab800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aab800 r8:8027ecf4 r7:dfdb5e60 r6:84aab880 r5:8523bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfee9fb0 to 0xdfee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84abadc0 INFO: task kworker/1:83:4323 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b5ad9000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:4324 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:4324 tgid:4324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfeedd84 r8:00000002 r7:60000113 r6:dfeedd8c r5:8523c800 r4:8523c800 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8523c800 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeede08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7f880 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8523c800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbad000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515e78c r4:8515e400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515e78c r4:84aa3a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523c800 r8:84aa3a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3a00 r8:8027ecf4 r7:dfbd5e60 r6:84aab900 r5:8523c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeedfb0 to 0xdfeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849f1e40 INFO: task kworker/0:78:4324 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b5f90000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:79:4325 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:79 state:D stack:0 pid:4325 tgid:4325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff09d84 r8:00000002 r7:60000113 r6:dff09d8c r5:8523d400 r4:8523d400 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8523d400 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff09e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad680 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8523d400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc7000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515df8c r4:8515dc00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515df8c r4:84aa3a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523d400 r8:84aa3aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3a80 r8:8027ecf4 r7:dfbd5e60 r6:84aab980 r5:8523d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a993c0 INFO: task kworker/0:79:4325 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b5f90000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:80:4328 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:80 state:D stack:0 pid:4328 tgid:4328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfc15d84 r8:00000002 r7:60000013 r6:dfc15d8c r5:85230000 r4:85230000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85230000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67b40 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85230000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde1000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525438c r4:85254000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525438c r4:84aa3b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85230000 r8:84aa3bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3b80 r8:8027ecf4 r7:dfbd5e60 r6:84aa3c80 r5:85230000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a929c0 INFO: task kworker/0:80:4328 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b5f90000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:81:4329 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:4329 tgid:4329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff1dd84 r8:00000002 r7:60000013 r6:dff1dd8c r5:85230c00 r4:85230c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85230c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff1de08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa5f80 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85230c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfefb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525478c r4:85254400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525478c r4:84aa3d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85230c00 r8:84aa3d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3d00 r8:8027ecf4 r7:dfbd5e60 r6:84aa3d80 r5:85230c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff1dfb0 to 0xdff1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aad780 INFO: task kworker/0:81:4329 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b5f90000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:82:4333 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:82 state:D stack:0 pid:4333 tgid:4333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff9dd84 r8:00000002 r7:60000013 r6:dff9dd8c r5:85233000 r4:85233000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85233000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff9de08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa9280 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85233000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff15000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85254b8c r4:85254800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85254b8c r4:84aa3e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85233000 r8:84aa3eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3e80 r8:8027ecf4 r7:dfbd5e60 r6:84aa3f00 r5:85233000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aa9c40 INFO: task kworker/0:82:4333 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b5f90000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:83:4334 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:83 state:D stack:0 pid:4334 tgid:4334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff99d84 r8:00000002 r7:60000113 r6:dff99d8c r5:85232400 r4:85232400 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85232400 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff99e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849621c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85232400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffcd000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85215b8c r4:85215800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85215b8c r4:84aa3f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85232400 r8:84aa3fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa3f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa3f80 r8:8027ecf4 r7:dfbd5e60 r6:84aa3580 r5:85232400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff99fb0 to 0xdff99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84962040 INFO: task kworker/0:83:4334 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b7e58000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:84:4337 blocked for more than 433 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:4337 tgid:4337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dff85d84 r8:00000002 r7:60000113 r6:dff85d8c r5:85233c00 r4:85233c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85233c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff85e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84962300 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85233c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff1000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85254f8c r4:85254c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85254f8c r4:84abf080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85233c00 r8:84abf0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84abf080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abf080 r8:8027ecf4 r7:dfbd5e60 r6:84abf100 r5:85233c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff85fb0 to 0xdff85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84962040 INFO: task kworker/0:84:4337 is blocked on a mutex likely owned by task kworker/1:63:4253. task:kworker/1:63 state:R running task stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:85092400 r8:80200be4 r7:dfc1dd54 r6:ffffffff r5:85092400 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfc1dd20 to 0xdfc1dd68) dd20: b7e58000 ecbb9000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 ecbb9000 8280c9b4 dfc1dd9c dfc1dda0 dfc1dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc1ddc0 r5:dfc1de08 r4:dfc1ddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520478c r4:85204400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8520478c r4:84ab2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84ab2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ab2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab2d80 r8:8027ecf4 r7:dfad5e60 r6:84aa3180 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aaa3c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc5-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:8225c2a4 [<80201ae4>] (show_stack) from [<8021fd88>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021fd94>] (dump_stack) from [<81a197b4>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a19654>] (nmi_cpu_backtrace) from [<81a19900>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281af40 r4:ffffffff [<81a197d0>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8280c80c r8:82ab3564 r7:8281bb28 r6:00007997 r5:8281b508 r4:85f63c0c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037ff64>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037ff64>] (check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037ff64>] (watchdog+0x4a8/0x74c kernel/hung_task.c:470) [<8037fabc>] (watchdog) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8037fabc r7:8329e300 r6:8329e300 r5:832dc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8338a180 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2824 Comm: pr/ttyAMA0 Not tainted 6.16.0-rc5-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a38d94>] lr : [<80a70c14>] psr: 60070113 sp : eb95deb0 ip : eb95dec0 fp : eb95debc r10: 8295a38c r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 8295a2f0 r5 : 00000000 r4 : 00000001 r3 : 00001157 r2 : 00000000 r1 : 60070113 r0 : 83d46c40 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 8428acc0 DAC: 00000000 Call trace: [<81a38d6c>] (_raw_spin_unlock_irqrestore) from [<80a70c14>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a38d6c>] (_raw_spin_unlock_irqrestore) from [<80a70c14>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a38d6c>] (_raw_spin_unlock_irqrestore) from [<80a70c14>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a70bf4>] (pl011_console_device_unlock) from [<802e7e24>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7da4>] (nbcon_emit_one) from [<802e8044>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c690 r5:84be0c00 r4:8295a2f0 [<802e7e9c>] (nbcon_kthread_func) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295a2f0 r8:802e7e9c r7:842f0680 r6:842f0680 r5:84be0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb95dfb0 to 0xeb95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:832aad00