INFO: task kworker/1:29:5674 blocked for more than 430 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:5674 tgid:5674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:e04c1d84 r8:00000002 r7:60000113 r6:e04c1d8c r5:85dfc800 r4:85dfc800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:85dfc800 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c1e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86d8d9c0 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85dfc800 r7:00000000 r6:83018200 r5:00001000 r4:7f2c4000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd61000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:858ce78c r4:858bb300 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858ce78c r4:858bb300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85dfc800 r8:858bb32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:858bb300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bb300 r8:8027ecf4 r7:dfd11e60 r6:85b1fa80 r5:85dfc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c1fb0 to 0xe04c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85f43540 INFO: task kworker/1:29:5674 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: a35d0000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 INFO: task kworker/0:12:6525 blocked for more than 430 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:6525 tgid:6525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dff31d84 r8:00000002 r7:60000013 r6:dff31d8c r5:83a9e000 r4:83a9e000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:83a9e000 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff31e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8606ee80 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f2d2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff33000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85a73f8c r4:86082800 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a73f8c r4:86082800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a9e000 r8:8608282c r7:82804d40 r6:dddced40 r5:dddced60 r4:86082800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86082800 r8:8027ecf4 r7:dfa79e60 r6:85618900 r5:83a9e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff31fb0 to 0xdff31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85f43ac0 INFO: task kworker/0:12:6525 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: a775a000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 INFO: task kworker/0:14:6530 blocked for more than 430 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:6530 tgid:6530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:86041800 r4:86041800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86041800 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86318cc0 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:86041800 r7:00000000 r6:83018000 r5:00001000 r4:7f348000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051f000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85ec378c r4:8628a000 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ec378c r4:8628a000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86041800 r8:8628a02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8628a000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8628a000 r8:8027ecf4 r7:dfa79e60 r6:8628a080 r5:86041800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85de4400 INFO: task kworker/0:14:6530 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: a810b000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 INFO: task kworker/0:17:6592 blocked for more than 430 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:6592 tgid:6592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfa31d84 r8:00000002 r7:60000013 r6:dfa31d8c r5:86043000 r4:86043000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86043000 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d26600 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:86043000 r7:00000000 r6:83018000 r5:00001000 r4:7f35c000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47ae000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85d6478c r4:85e08f80 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d6478c r4:85e08f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86043000 r8:85e08fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85e08f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e08f80 r8:8027ecf4 r7:dfa79e60 r6:85e08a80 r5:86043000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85f395c0 INFO: task kworker/0:17:6592 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: a84b1000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 INFO: task kworker/0:0:8767 blocked for more than 430 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:8767 tgid:8767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfc55d84 r8:00000002 r7:60080113 r6:dfc55d8c r5:85dfbc00 r4:85dfbc00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:85dfbc00 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84856740 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85dfbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f35a000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a8000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85d65b8c r4:85c63800 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d65b8c r4:85c63800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85dfbc00 r8:85c6382c r7:82804d40 r6:dddced40 r5:dddced60 r4:85c63800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c63800 r8:8027ecf4 r7:dfa31e60 r6:85af9200 r5:85dfbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc55fb0 to 0xdfc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85c8ccc0 INFO: task kworker/0:0:8767 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: abfde000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 INFO: task kworker/0:2:9339 blocked for more than 430 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:9339 tgid:9339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dff85d84 r8:00000002 r7:60000113 r6:dff85d8c r5:83aa6000 r4:83aa6000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:83aa6000 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff85e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dbbd00 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83aa6000 r7:00000000 r6:83018000 r5:00001000 r4:7f2c6000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe2d000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22b8c r4:858b5400 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:86b22b8c r4:858b5400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa6000 r8:858b542c r7:82804d40 r6:dddced40 r5:dddced60 r4:858b5400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b5400 r8:8027ecf4 r7:dff31e60 r6:861ad780 r5:83aa6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff85fb0 to 0xdff85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:861d5fc0 INFO: task kworker/0:2:9339 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b0282000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 INFO: task kworker/1:20:9529 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:9529 tgid:9529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dffddd84 r8:00000002 r7:60000113 r6:dffddd8c r5:8324b000 r4:8324b000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:8324b000 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffdde08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5a280 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8324b000 r7:00000000 r6:83018200 r5:00001000 r4:7f34c000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0609000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:855c078c r4:86c07d00 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855c078c r4:86c07d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324b000 r8:86c07d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:86c07d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86c07d00 r8:8027ecf4 r7:dfa79e60 r6:86c07d80 r5:8324b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffddfb0 to 0xdffddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:862db6c0 INFO: task kworker/1:20:9529 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 INFO: task kworker/1:23:9536 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:9536 tgid:9536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:83aa8c00 r4:83aa8c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:83aa8c00 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8626f100 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83aa8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f300000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85ec1f8c r4:86c07000 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ec1f8c r4:86c07000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa8c00 r8:86c0702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:86c07000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86c07000 r8:8027ecf4 r7:dfa79e60 r6:86c07e80 r5:83aa8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32040 INFO: task kworker/1:23:9536 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 INFO: task kworker/0:4:10396 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:10396 tgid:10396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:832e4800 r4:832e4800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:832e4800 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85844100 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:832e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f34a000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c5000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:855c338c r4:86083a00 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c338c r4:86083a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832e4800 r8:86083a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:86083a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86083a00 r8:8027ecf4 r7:dff31e60 r6:86083580 r5:832e4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8630ff80 INFO: task kworker/0:4:10396 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 INFO: task kworker/0:7:10442 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:10442 tgid:10442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfe59d84 r8:00000002 r7:60000113 r6:dfe59d8c r5:833a8000 r4:833a8000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:833a8000 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe59e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86264340 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:833a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f352000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0699000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85ec238c r4:86083300 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ec238c r4:86083300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a8000 r8:8608332c r7:82804d40 r6:dddced40 r5:dddced60 r4:86083300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86083300 r8:8027ecf4 r7:dfe49e60 r6:86083380 r5:833a8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:86d2f180 INFO: task kworker/0:7:10442 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:10722 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:10722 tgid:10722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfd69d84 r8:00000002 r7:60000113 r6:dfd69d8c r5:86e73c00 r4:86e73c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86e73c00 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd69e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86a16c40 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:86e73c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2d0000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff21000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:868adb8c r4:869fbb80 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:868adb8c r4:869fbb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86e73c00 r8:869fbbac r7:82804d40 r6:dddced40 r5:dddced60 r4:869fbb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:869fbb80 r8:8027ecf4 r7:dff31e60 r6:869fbb00 r5:86e73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd69fb0 to 0xdfd69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:862692c0 INFO: task kworker/0:8:10722 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:10723 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:10723 tgid:10723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:86e71800 r4:86e71800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86e71800 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86256bc0 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:86e71800 r7:00000000 r6:83018000 r5:00001000 r4:7f2c8000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe37000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b2278c r4:869fbc80 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:86b2278c r4:869fbc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86e71800 r8:869fbcac r7:82804d40 r6:dddced40 r5:dddced60 r4:869fbc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:869fbc80 r8:8027ecf4 r7:dfd69e60 r6:869fbc00 r5:86e71800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:86269800 INFO: task kworker/0:9:10723 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:11114 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:11114 tgid:11114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:e0555d84 r8:00000002 r7:60000113 r6:e0555d8c r5:83a9bc00 r4:83a9bc00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:83a9bc00 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0555e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86e2d6c0 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83a9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f304000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0037000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85a8638c r4:86934300 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a8638c r4:86934300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a9bc00 r8:8693432c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:86934300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86934300 r8:8027ecf4 r7:dfb85e60 r6:86a17f00 r5:83a9bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0555fb0 to 0xe0555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:86cd6280 INFO: task kworker/1:26:11114 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:11128 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:11128 tgid:11128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:e048dd84 r8:00000002 r7:60000113 r6:e048dd8c r5:83a9b000 r4:83a9b000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:83a9b000 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e048de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8698c9c0 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83a9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f302000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0031000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85ec338c r4:86934b80 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ec338c r4:86934b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a9b000 r8:86934bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:86934b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86934b80 r8:8027ecf4 r7:e0555e60 r6:86a17580 r5:83a9b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe048dfb0 to 0xe048dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:86cd69c0 INFO: task kworker/1:28:11128 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:11142 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:11142 tgid:11142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfcfdd84 r8:00000002 r7:60000113 r6:dfcfdd8c r5:868d8c00 r4:868d8c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:868d8c00 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8606ec80 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:868d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f288000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff4b000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85a7178c r4:86f92480 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7178c r4:86f92480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:868d8c00 r8:86f924ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:86f92480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86f92480 r8:8027ecf4 r7:e0555e60 r6:86a17880 r5:868d8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcfdfb0 to 0xdfcfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b49900 INFO: task kworker/1:30:11142 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:11780 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:11780 tgid:11780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfd29d84 r8:00000002 r7:60000113 r6:dfd29d8c r5:86903000 r4:86903000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86903000 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86ce12c0 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:86903000 r7:00000000 r6:83018000 r5:00001000 r4:7f2ce000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeef000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85d9ab8c r4:85b29280 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d9ab8c r4:85b29280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86903000 r8:85b292ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b29280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b29280 r8:8027ecf4 r7:dfa91e60 r6:861a7180 r5:86903000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd29fb0 to 0xdfd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85cb5080 INFO: task kworker/0:11:11780 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:13591 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:13591 tgid:13591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:85f98000 r4:85f98000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:85f98000 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:864ee4c0 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85f98000 r7:00000000 r6:83018000 r5:00001000 r4:7f35e000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47cd000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86147b8c r4:86d0c800 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:86147b8c r4:86d0c800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85f98000 r8:86d0c82c r7:82804d40 r6:dddced40 r5:dddced60 r4:86d0c800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86d0c800 r8:8027ecf4 r7:dfbf9e60 r6:86d14100 r5:85f98000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:86c016c0 INFO: task kworker/0:21:13591 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:13592 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:13592 tgid:13592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfba5d84 r8:00000002 r7:60000013 r6:dfba5d8c r5:86e7bc00 r4:86e7bc00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86e7bc00 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cd11c0 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:86e7bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f25a000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe73000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:862b178c r4:86d0cd00 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:862b178c r4:86d0cd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86e7bc00 r8:86d0cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:86d0cd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86d0cd00 r8:8027ecf4 r7:dfb11e60 r6:86d14980 r5:86e7bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:86c014c0 INFO: task kworker/0:22:13592 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:13648 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:13648 tgid:13648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfc41d84 r8:00000002 r7:60000013 r6:dfc41d8c r5:868dbc00 r4:868dbc00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:868dbc00 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cdda00 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:868dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f306000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0081000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85ec2f8c r4:86d14580 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ec2f8c r4:86d14580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:868dbc00 r8:86d145ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:86d14580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86d14580 r8:8027ecf4 r7:e0639e60 r6:86d14200 r5:868dbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:861c4540 INFO: task kworker/1:5:13648 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:13664 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:13664 tgid:13664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfc69d84 r8:00000002 r7:60000113 r6:dfc69d8c r5:86045400 r4:86045400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86045400 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f9e80 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:86045400 r7:00000000 r6:83018200 r5:00001000 r4:7f344000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0427000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:857b838c r4:86d14080 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b838c r4:86d14080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86045400 r8:86d140ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:86d14080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86d14080 r8:8027ecf4 r7:dfa95e60 r6:86d0c300 r5:86045400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:863e1780 INFO: task kworker/1:12:13664 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:13665 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:13665 tgid:13665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:86040000 r4:86040000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86040000 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86003a40 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:86040000 r7:00000000 r6:83018200 r5:00001000 r4:7f342000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e040b000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85ec278c r4:86d14880 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ec278c r4:86d14880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86040000 r8:86d148ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:86d14880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86d14880 r8:8027ecf4 r7:dfc69e60 r6:86d0cb80 r5:86040000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:863e1b40 INFO: task kworker/1:14:13665 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:13673 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:13673 tgid:13673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfc9dd84 r8:00000002 r7:60000113 r6:dfc9dd8c r5:86044800 r4:86044800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86044800 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc9de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86003180 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:86044800 r7:00000000 r6:83018200 r5:00001000 r4:7f340000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0405000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85ec2b8c r4:85877000 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ec2b8c r4:85877000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86044800 r8:8587702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85877000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85877000 r8:8027ecf4 r7:dfc41e60 r6:86d0c500 r5:86044800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc9dfb0 to 0xdfc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:860840c0 INFO: task kworker/1:15:13673 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:14300 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:14300 tgid:14300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:e0481d84 r8:00000002 r7:60000113 r6:e0481d8c r5:86e7a400 r4:86e7a400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86e7a400 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0481e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86003140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:86e7a400 r7:00000000 r6:83018200 r5:00001000 r4:7f346000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0441000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85ec1b8c r4:86f28280 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ec1b8c r4:86f28280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86e7a400 r8:86f282ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:86f28280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:86f28280 r8:8027ecf4 r7:dfa55e60 r6:861e5f80 r5:86e7a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0481fb0 to 0xe0481ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:869fa600 INFO: task kworker/1:16:14300 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:14307 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:14307 tgid:14307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:dfa75d84 r8:00000002 r7:60010013 r6:dfa75d8c r5:86e73000 r4:86e73000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86e73000 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85850fc0 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:86e73000 r7:00000000 r6:83018200 r5:00001000 r4:7f356000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0711000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85d64b8c r4:85ddae80 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d64b8c r4:85ddae80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86e73000 r8:85ddaeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85ddae80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ddae80 r8:8027ecf4 r7:dfa55e60 r6:861e5480 r5:86e73000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:862d5f80 INFO: task kworker/1:17:14307 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:14308 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:14308 tgid:14308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:e0089d84 r8:00000002 r7:60000113 r6:e0089d8c r5:86e74800 r4:86e74800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86e74800 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0089e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86c433c0 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:86e74800 r7:00000000 r6:83018200 r5:00001000 r4:7f360000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e880d000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85d6778c r4:85ddab00 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d6778c r4:85ddab00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86e74800 r8:85ddab2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85ddab00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ddab00 r8:8027ecf4 r7:dfa75e60 r6:861e5380 r5:86e74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0089fb0 to 0xe0089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85d4c540 INFO: task kworker/1:31:14308 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:14309 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:14309 tgid:14309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:e0491d84 r8:00000002 r7:60000113 r6:e0491d8c r5:86e78000 r4:86e78000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86e78000 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0491e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8606e340 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:86e78000 r7:00000000 r6:83018200 r5:00001000 r4:7f358000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e073d000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85ffe78c r4:85dda600 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ffe78c r4:85dda600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86e78000 r8:85dda62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85dda600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85dda600 r8:8027ecf4 r7:e0089e60 r6:861e5000 r5:86e78000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0491fb0 to 0xe0491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85d4c3c0 INFO: task kworker/1:33:14309 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:14310 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:14310 tgid:14310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:e057dd84 r8:00000002 r7:60000113 r6:e057dd8c r5:8325a400 r4:8325a400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:8325a400 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e057de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86264e80 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8325a400 r7:00000000 r6:83018200 r5:00001000 r4:7f354000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06af000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:85ec078c r4:85dda080 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ec078c r4:85dda080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8325a400 r8:85dda0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85dda080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85dda080 r8:8027ecf4 r7:e0491e60 r6:861e5300 r5:8325a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe057dfb0 to 0xe057dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85d4cd00 INFO: task kworker/1:34:14310 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:14311 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:14311 tgid:14311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:e0581d84 r8:00000002 r7:60000113 r6:e0581d8c r5:86e5ec00 r4:86e5ec00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86e5ec00 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86d5bb40 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:86e5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f34e000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e062f000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:8685bf8c r4:85dda180 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8685bf8c r4:85dda180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86e5ec00 r8:85dda1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85dda180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85dda180 r8:8027ecf4 r7:e057de60 r6:861e5100 r5:86e5ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85d4c800 INFO: task kworker/1:35:14311 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:14312 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:14312 tgid:14312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:e0585d84 r8:00000002 r7:60010113 r6:e0585d8c r5:86e5bc00 r4:86e5bc00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86e5bc00 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0585e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:864e5880 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:86e5bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f350000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0657000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:858cff8c r4:85dda200 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858cff8c r4:85dda200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86e5bc00 r8:85dda22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85dda200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85dda200 r8:8027ecf4 r7:e0581e60 r6:861e5080 r5:86e5bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0585fb0 to 0xe0585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85d4cb00 INFO: task kworker/1:36:14312 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:14364 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:14364 tgid:14364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:e881dd84 r8:00000002 r7:60000113 r6:e881dd8c r5:8571c800 r4:8571c800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:8571c800 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e881de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86f86400 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571c800 r7:00000000 r6:83018200 r5:00001000 r4:7f362000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8835000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:8614638c r4:85dda780 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8614638c r4:85dda780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571c800 r8:85dda7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85dda780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85dda780 r8:8027ecf4 r7:dfa55e60 r6:85c78f80 r5:8571c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe881dfb0 to 0xe881dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:86f86540 INFO: task kworker/1:37:14364 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:14368 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:14368 tgid:14368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:e8859d84 r8:00000002 r7:60000113 r6:e8859d8c r5:8571ec00 r4:8571ec00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:8571ec00 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8859e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86f86f80 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f364000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8855000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86144f8c r4:85ddae00 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86144f8c r4:85ddae00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571ec00 r8:85ddae2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85ddae00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ddae00 r8:8027ecf4 r7:dfa55e60 r6:85c78a00 r5:8571ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8859fb0 to 0xe8859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:86f863c0 INFO: task kworker/1:38:14368 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:14371 blocked for more than 431 seconds. Not tainted 6.16.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:14371 tgid:14371 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82918438 r9:ea885d84 r8:00000002 r7:60000113 r6:ea885d8c r5:8571d400 r4:8571d400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:8571d400 r4:82918434 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea885e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8630c5c0 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571d400 r7:00000000 r6:83018200 r5:00001000 r4:7f366000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8863000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86145b8c r4:85dda900 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86145b8c r4:85dda900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571d400 r8:85dda92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85dda900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85dda900 r8:8027ecf4 r7:dfa55e60 r6:85c78400 r5:8571d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea885fb0 to 0xea885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:864e1c40 INFO: task kworker/1:39:14371 is blocked on a mutex likely owned by task kworker/1:6:5187. task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe051dd20 to 0xe051dd68) dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf064 [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 r4:e051ddc0 [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 r4:00000000 [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150 kernel/bpf/core.c:2891) r5:86b22f8c r4:85d49100 [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85d49100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b32900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:8225b4e0 [<80201ae4>] (show_stack) from [<8021fe10>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021fe1c>] (dump_stack) from [<81a115b8>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a11458>] (nmi_cpu_backtrace) from [<81a11704>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281af40 r4:ffffffff [<81a115d4>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8280c80c r8:82ab3564 r7:8281bb28 r6:00007ccc r5:8281b508 r4:8675660c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fdc0>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fdc0>] (check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fdc0>] (watchdog+0x4a8/0x74c kernel/hung_task.c:470) [<8037f918>] (watchdog) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8037f918 r7:83349780 r6:83349780 r5:83259800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8334c580 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2820 Comm: pr/ttyAMA0 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a30b94>] lr : [<80a6aa04>] psr: 600f0013 sp : eb9c5eb0 ip : eb9c5ec0 fp : eb9c5ebc r10: 8295a34c r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 8295a2b0 r5 : 00000000 r4 : 00000001 r3 : 0000179d r2 : 00000000 r1 : 600f0013 r0 : 84a8ac40 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 8540b0c0 DAC: 00000000 Call trace: [<81a30b6c>] (_raw_spin_unlock_irqrestore) from [<80a6aa04>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a30b6c>] (_raw_spin_unlock_irqrestore) from [<80a6aa04>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a30b6c>] (_raw_spin_unlock_irqrestore) from [<80a6aa04>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a6a9e4>] (pl011_console_device_unlock) from [<802e7e0c>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7d8c>] (nbcon_emit_one) from [<802e802c>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c690 r5:84b4a400 r4:8295a2b0 [<802e7e84>] (nbcon_kthread_func) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295a2b0 r8:802e7e84 r7:847d1080 r6:847d1080 r5:84b4a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c5fb0 to 0xeb9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:832a1a00