INFO: task kworker/1:20:4204 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:4204 tgid:4204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:854e9800 r4:854e9800 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:854e9800 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85722340 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0575000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84daf78c r4:84daf400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84daf78c r4:856b6500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e9800 r8:856b652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856b6500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b6500 r8:8027ecf4 r7:dfad1e60 r6:83aebf80 r5:854e9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84f7e080 INFO: task kworker/1:20:4204 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: cf501000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 INFO: task kworker/1:21:4209 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:4209 tgid:4209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:854e8000 r4:854e8000 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:854e8000 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c42540 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8795000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84efef8c r4:84efec00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84efef8c r4:856b6600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e8000 r8:856b662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856b6600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b6600 r8:8027ecf4 r7:dfad1e60 r6:84ed3e00 r5:854e8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84f7e200 INFO: task kworker/1:21:4209 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: cf501000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 INFO: task kworker/1:182:4929 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:182 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea88dd84 r8:00000002 r7:60000113 r6:ea88dd8c r5:85816c00 r4:85816c00 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85816c00 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea88de08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584afc0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85816c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda7000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588838c r4:85888000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8588838c r4:8584c280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85816c00 r8:8584c2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8584c280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c280 r8:8027ecf4 r7:ea8f5e60 r6:8584c300 r5:85816c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea88dfb0 to 0xea88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584af40 INFO: task kworker/1:182:4929 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: cf501000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 INFO: task kworker/1:183:4931 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:183 state:D stack:0 pid:4931 tgid:4931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea905d84 r8:00000002 r7:60000113 r6:ea905d8c r5:85813c00 r4:85813c00 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85813c00 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea905e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cab300 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85813c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea96d000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588bb8c r4:8588b800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8588bb8c r4:8584c380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85813c00 r8:8584c3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8584c380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c380 r8:8027ecf4 r7:ea88de60 r6:8584c400 r5:85813c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea905fb0 to 0xea905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584a6c0 INFO: task kworker/1:183:4931 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d070a000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 INFO: task kworker/1:184:4934 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:184 state:D stack:0 pid:4934 tgid:4934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea8e9d84 r8:00000002 r7:60000013 r6:ea8e9d8c r5:85814800 r4:85814800 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85814800 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e9e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835400 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85814800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe1000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85895b8c r4:85895800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85895b8c r4:8584c580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85814800 r8:8584c5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8584c580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c580 r8:8027ecf4 r7:ea905e60 r6:8584c600 r5:85814800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e9fb0 to 0xea8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cc1400 INFO: task kworker/1:184:4934 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d070a000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 INFO: task kworker/0:203:4942 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:203 state:D stack:0 pid:4942 tgid:4942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea959d84 r8:00000002 r7:60000013 r6:ea959d8c r5:85819800 r4:85819800 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85819800 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea959e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cd1380 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85819800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7b000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff238c r4:84ff2000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ff238c r4:85845280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85819800 r8:858452ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85845280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845280 r8:8027ecf4 r7:ea975e60 r6:8584c900 r5:85819800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea959fb0 to 0xea959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85848300 INFO: task kworker/0:203:4942 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d070a000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 INFO: task kworker/0:204:4944 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:204 state:D stack:0 pid:4944 tgid:4944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea961d84 r8:00000002 r7:60000013 r6:ea961d8c r5:8581b000 r4:8581b000 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8581b000 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea961e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cd1ac0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8581b000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb1000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588af8c r4:8588ac00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588af8c r4:85845300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581b000 r8:8584532c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845300 r8:8027ecf4 r7:ea975e60 r6:8584c980 r5:8581b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea961fb0 to 0xea961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85848740 INFO: task kworker/0:204:4944 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d070a000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 INFO: task kworker/1:186:4945 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:186 state:D stack:0 pid:4945 tgid:4945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea95dd84 r8:00000002 r7:60000113 r6:ea95dd8c r5:8581bc00 r4:8581bc00 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8581bc00 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea95de08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c9fdc0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8581bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb51000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85888b8c r4:85888800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85888b8c r4:8584ca00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581bc00 r8:8584ca2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8584ca00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584ca00 r8:8027ecf4 r7:ea90de60 r6:8584ca80 r5:8581bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea95dfb0 to 0xea95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85837080 INFO: task kworker/1:186:4945 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d070a000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 INFO: task kworker/1:187:4947 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:187 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea965d84 r8:00000002 r7:60000113 r6:ea965d8c r5:8581d400 r4:8581d400 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8581d400 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c42300 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8581d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4701000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff38c r4:84eff000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84eff38c r4:8584cb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581d400 r8:8584cb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8584cb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584cb00 r8:8027ecf4 r7:ea90de60 r6:8584cb80 r5:8581d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea965fb0 to 0xea965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858494c0 INFO: task kworker/1:187:4947 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d070a000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 INFO: task kworker/0:205:4950 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:205 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea97dd84 r8:00000002 r7:60000013 r6:ea97dd8c r5:8581e000 r4:8581e000 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8581e000 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea97de08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857383c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8581e000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff13000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff078c r4:84ff0400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ff078c r4:85845380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581e000 r8:858453ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85845380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845380 r8:8027ecf4 r7:ea959e60 r6:8584cc80 r5:8581e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea97dfb0 to 0xea97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85848f40 INFO: task kworker/0:205:4950 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d070a000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:4952 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:4952 tgid:4952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea915d84 r8:00000002 r7:60000013 r6:ea915d8c r5:8581ec00 r4:8581ec00 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8581ec00 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea915e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c42400 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8581ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0661000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84effb8c r4:84eff800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84effb8c r4:85845400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581ec00 r8:8584542c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845400 r8:8027ecf4 r7:ea959e60 r6:8584cd00 r5:8581ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea915fb0 to 0xea915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858488c0 INFO: task kworker/0:206:4952 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d070a000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:207:4954 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:207 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea919d84 r8:00000002 r7:60000013 r6:ea919d8c r5:8581c800 r4:8581c800 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8581c800 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea919e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555ec40 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8581c800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea845000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85895f8c r4:85895c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85895f8c r4:85845480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581c800 r8:858454ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85845480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845480 r8:8027ecf4 r7:ea959e60 r6:8584cd80 r5:8581c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea919fb0 to 0xea919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85848440 INFO: task kworker/0:207:4954 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d0d70000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:208:4957 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:208 state:D stack:0 pid:4957 tgid:4957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea91dd84 r8:00000002 r7:60000013 r6:ea91dd8c r5:8581a400 r4:8581a400 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8581a400 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea91de08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc19c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8581a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6d000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff038c r4:84ff0000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ff038c r4:85845500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581a400 r8:8584552c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845500 r8:8027ecf4 r7:ea959e60 r6:8584ce00 r5:8581a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea91dfb0 to 0xea91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85848a00 INFO: task kworker/0:208:4957 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d0d70000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:209:4959 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:209 state:D stack:0 pid:4959 tgid:4959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea931d84 r8:00000002 r7:60000013 r6:ea931d8c r5:85828c00 r4:85828c00 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85828c00 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea931e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fce80 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85828c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df90d000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff338c r4:84ff3000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ff338c r4:85845580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85828c00 r8:858455ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85845580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845580 r8:8027ecf4 r7:ea91de60 r6:8584cf80 r5:85828c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea931fb0 to 0xea931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85838f80 INFO: task kworker/0:209:4959 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d0d70000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:4960 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea991d84 r8:00000002 r7:60000113 r6:ea991d8c r5:85828000 r4:85828000 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85828000 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837240 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85828000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc27000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85894f8c r4:85894c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85894f8c r4:85845600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85828000 r8:8584562c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845600 r8:8027ecf4 r7:ea91de60 r6:8584cc00 r5:85828000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea991fb0 to 0xea991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cc0f00 INFO: task kworker/0:210:4960 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d2420000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:211:4962 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:211 state:D stack:0 pid:4962 tgid:4962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea995d84 r8:00000002 r7:60000013 r6:ea995d8c r5:85829800 r4:85829800 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85829800 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc1c40 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85829800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe0f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff3b8c r4:84ff3800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ff3b8c r4:85845700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85829800 r8:8584572c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845700 r8:8027ecf4 r7:ea991e60 r6:85846000 r5:85829800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea995fb0 to 0xea995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858388c0 INFO: task kworker/0:211:4962 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d4d8f000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:212:4964 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:212 state:D stack:0 pid:4964 tgid:4964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea999d84 r8:00000002 r7:60000013 r6:ea999d8c r5:8582a400 r4:8582a400 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8582a400 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea999e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e238c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582a400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd15000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595e78c r4:8595e400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595e78c r4:85845780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582a400 r8:858457ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85845780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845780 r8:8027ecf4 r7:ea991e60 r6:85846080 r5:8582a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea999fb0 to 0xea999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85837540 INFO: task kworker/0:212:4964 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d4d8f000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:4966 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:213 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea921d84 r8:00000002 r7:60000013 r6:ea921d8c r5:84d76000 r4:84d76000 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84d76000 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea921e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838a80 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84d76000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcc3000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595f38c r4:8595f000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595f38c r4:85845800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d76000 r8:8584582c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845800 r8:8027ecf4 r7:ea991e60 r6:85845880 r5:84d76000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea921fb0 to 0xea921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cb5300 INFO: task kworker/0:213:4966 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d66c8000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:214:4968 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:214 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea945d84 r8:00000002 r7:60000113 r6:ea945d8c r5:84d76c00 r4:84d76c00 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84d76c00 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea945e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835980 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84d76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8fd000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fedf8c r4:84fedc00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84fedf8c r4:85845900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d76c00 r8:8584592c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845900 r8:8027ecf4 r7:ea991e60 r6:85845980 r5:84d76c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea945fb0 to 0xea945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85848a00 INFO: task kworker/0:214:4968 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d6ca6000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:215:4970 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:215 state:D stack:0 pid:4970 tgid:4970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea9a5d84 r8:00000002 r7:60000013 r6:ea9a5d8c r5:84d75400 r4:84d75400 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84d75400 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a5e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835000 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84d75400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6a000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589578c r4:85895400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589578c r4:85845a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d75400 r8:85845a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845a00 r8:8027ecf4 r7:ea991e60 r6:85845a80 r5:84d75400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a5fb0 to 0xea9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8583ae00 INFO: task kworker/0:215:4970 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d7655000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:4972 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea9c9d84 r8:00000002 r7:60000013 r6:ea9c9d8c r5:84d74800 r4:84d74800 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84d74800 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cb90c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84d74800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf9000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588978c r4:85889400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588978c r4:85845b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d74800 r8:85845b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845b00 r8:8027ecf4 r7:ea945e60 r6:85845b80 r5:84d74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c9fb0 to 0xea9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841000 INFO: task kworker/0:216:4972 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d827b000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:4974 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea969d84 r8:00000002 r7:60000113 r6:ea969d8c r5:8582bc00 r4:8582bc00 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8582bc00 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea969e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858357c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fed78c r4:84fed400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84fed78c r4:85845c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582bc00 r8:85845cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85845c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845c80 r8:8027ecf4 r7:ea945e60 r6:85846180 r5:8582bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea969fb0 to 0xea969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841640 INFO: task kworker/0:217:4974 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d855f000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:4976 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea985d84 r8:00000002 r7:60000113 r6:ea985d8c r5:8582d400 r4:8582d400 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8582d400 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835580 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589438c r4:85894000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589438c r4:85845d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582d400 r8:85845d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845d00 r8:8027ecf4 r7:ea969e60 r6:85846200 r5:8582d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea985fb0 to 0xea985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841880 INFO: task kworker/0:218:4976 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d8c67000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:4986 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:4986 tgid:4986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:eaa11d84 r8:00000002 r7:60000113 r6:eaa11d8c r5:8582b000 r4:8582b000 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8582b000 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c42d40 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582b000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa77000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84efeb8c r4:84efe800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84efeb8c r4:85845e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582b000 r8:85845eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e80 r8:8027ecf4 r7:eaa05e60 r6:85846480 r5:8582b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa11fb0 to 0xeaa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841a00 INFO: task kworker/0:221:4986 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d8f16000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:4991 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:4991 tgid:4991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:eaa65d84 r8:00000002 r7:60000013 r6:eaa65d8c r5:85930c00 r4:85930c00 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85930c00 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c42c80 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85930c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84efe78c r4:84efe400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84efe78c r4:85845f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85930c00 r8:85845f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845f00 r8:8027ecf4 r7:eaa05e60 r6:85846680 r5:85930c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa65fb0 to 0xeaa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84f7e400 INFO: task kworker/0:222:4991 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d8f16000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:4994 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:223 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:eaa99d84 r8:00000002 r7:60000013 r6:eaa99d8c r5:85933000 r4:85933000 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85933000 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa99e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841780 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85933000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05eb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84efff8c r4:84effc00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84efff8c r4:85845f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85933000 r8:85845fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85845f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845f80 r8:8027ecf4 r7:eaa05e60 r6:85846880 r5:85933000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa99fb0 to 0xeaa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dbe880 INFO: task kworker/0:223:4994 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d95d3000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:196:5014 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:196 state:D stack:0 pid:5014 tgid:5014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:eaad5d84 r8:00000002 r7:60000113 r6:eaad5d8c r5:85920c00 r4:85920c00 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85920c00 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cab4c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85920c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab3000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85889f8c r4:85889c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85889f8c r4:85846d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85920c00 r8:85846d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85846d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85846d00 r8:8027ecf4 r7:ea9c5e60 r6:85852580 r5:85920c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad5fb0 to 0xeaad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85848ec0 INFO: task kworker/1:196:5014 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d980a000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:197:5034 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:197 state:D stack:0 pid:5034 tgid:5034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea9d9d84 r8:00000002 r7:60000113 r6:ea9d9d8c r5:85926c00 r4:85926c00 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85926c00 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d9e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84caf280 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85926c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e060d000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588938c r4:85889000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8588938c r4:85846c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85926c00 r8:85846c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85846c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85846c00 r8:8027ecf4 r7:eaad5e60 r6:85852d00 r5:85926c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d9fb0 to 0xea9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd1540 INFO: task kworker/1:197:5034 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d9d18000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:198:5037 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:198 state:D stack:0 pid:5037 tgid:5037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a30c40>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2fcb8>] (__schedule) from [<81a30c40>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:ea9e1d84 r8:00000002 r7:60000113 r6:ea9e1d8c r5:85924800 r4:85924800 [<81a30c14>] (schedule) from [<81a31028>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:85924800 r4:829185c0 [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a31010>] (schedule_preempt_disabled) from [<81a3370c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a3340c>] (__mutex_lock.constprop.0) from [<81a33bd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e1e08 r4:00000000 [<81a33bc4>] (__mutex_lock_slowpath) from [<81a33c18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a33bdc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85844000 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85924800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa27000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588b38c r4:8588b000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8588b38c r4:85855000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85924800 r8:8585502c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85855000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85855000 r8:8027ecf4 r7:ea9c5e60 r6:85852e00 r5:85924800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e1fb0 to 0xea9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85848a80 INFO: task kworker/1:198:5037 is blocked on a mutex likely owned by task kworker/0:220:4981. task:kworker/0:220 state:R running task stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2fcb8>] (__schedule) from [<81a31074>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:8582ec00 r8:80200be4 r7:ea9f1d54 r6:ffffffff r5:8582ec00 r4:00000000 [<81a31034>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xea9f1d20 to 0xea9f1d68) 1d20: d9ecb000 eb529000 00000001 80239bb8 7f049000 00000001 82abf1c4 82abe5a0 1d40: 7f049000 eb529000 8280c9b4 ea9f1d9c ea9f1da0 ea9f1d70 80230af0 80239bd0 1d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea9f1dc0 r5:ea9f1e08 r4:ea9f1dc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841080 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8582ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eff78c r4:84eff400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84eff78c r4:85845e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:85845e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85845e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85845e00 r8:8027ecf4 r7:eaa05e60 r6:85846300 r5:8582ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85841580 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc5-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000f0013 r5:600f0093 r4:8225c2b0 [<80201ae4>] (show_stack) from [<8021fe00>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ae4>] (show_stack) from [<8021fe00>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fd90>] (dump_stack_lvl) from [<8021fe24>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021fe0c>] (dump_stack) from [<81a19bd4>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a19a74>] (nmi_cpu_backtrace) from [<81a19d20>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281af40 r4:ffffffff [<81a19bf0>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8280c80c r8:82ab3564 r7:8281bb28 r6:00007b89 r5:8281b508 r4:85c4540c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037ff64>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037ff64>] (check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037ff64>] (watchdog+0x4a8/0x74c kernel/hung_task.c:470) [<8037fabc>] (watchdog) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8037fabc r7:83349780 r6:83349780 r5:83259800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8334c5c0 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2823 Comm: pr/ttyAMA0 Not tainted 6.16.0-rc5-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a391b4>] lr : [<80a70c14>] psr: 60000013 sp : eb84deb0 ip : eb84dec0 fp : eb84debc r10: 8295a38c r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 8295a2f0 r5 : 00000000 r4 : 00000001 r3 : 00000d12 r2 : 00000000 r1 : 60000013 r0 : 83e9b040 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 855a9740 DAC: 00000000 Call trace: [<81a3918c>] (_raw_spin_unlock_irqrestore) from [<80a70c14>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a3918c>] (_raw_spin_unlock_irqrestore) from [<80a70c14>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a3918c>] (_raw_spin_unlock_irqrestore) from [<80a70c14>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a70bf4>] (pl011_console_device_unlock) from [<802e7e24>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7da4>] (nbcon_emit_one) from [<802e8044>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c690 r5:84b66000 r4:8295a2f0 [<802e7e9c>] (nbcon_kthread_func) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295a2f0 r8:802e7e9c r7:846e0080 r6:846e0080 r5:84b66000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb84dfb0 to 0xeb84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84667f80