INFO: task kworker/1:3:463 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:463 tgid:463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:dfdddd84 r8:00000002 r7:60010013 r6:dfdddd8c r5:84c7d400 r4:84c7d400 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84c7d400 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfddde08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:864a5100 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84c7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f3ba000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2eb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb82b8c r4:8bb82800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8bb82b8c r4:8427fa80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c7d400 r8:8427faac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8427fa80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8427fa80 r8:8027ecf4 r7:dfef1e60 r6:8427f380 r5:84c7d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85768880 INFO: task kworker/1:3:463 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: dd1ef000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 INFO: task kworker/0:13:5376 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:5376 tgid:5376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:dfc6dd84 r8:00000002 r7:60000113 r6:dfc6dd8c r5:83aa8000 r4:83aa8000 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:83aa8000 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc6de08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85acf700 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83aa8000 r7:00000000 r6:83018000 r5:00001000 r4:7f29c000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df813000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8708cb8c r4:8708c800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8708cb8c r4:8442de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa8000 r8:8442de2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8442de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8442de00 r8:8027ecf4 r7:e87a9e60 r6:8442d280 r5:83aa8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc6dfb0 to 0xdfc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84186d80 INFO: task kworker/0:13:5376 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: dd1ef000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 INFO: task kworker/0:15:5432 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:5432 tgid:5432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:e0411d84 r8:00000002 r7:60000113 r6:e0411d8c r5:83aaa400 r4:83aaa400 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:83aaa400 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0411e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8709dbc0 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83aaa400 r7:00000000 r6:83018000 r5:00001000 r4:7f39a000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa20000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb81b8c r4:8bb81800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb81b8c r4:838d3c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aaa400 r8:838d3c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:838d3c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838d3c00 r8:8027ecf4 r7:dfe2de60 r6:838d3500 r5:83aaa400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0411fb0 to 0xe0411ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8495c1c0 INFO: task kworker/0:15:5432 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: de61a000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 INFO: task kworker/0:6:9845 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:9845 tgid:9845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:dfe01d84 r8:00000002 r7:60000113 r6:dfe01d8c r5:854cc800 r4:854cc800 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:854cc800 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe01e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd6ec0 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f3b4000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb83b8c r4:8bb83800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb83b8c r4:8553dc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cc800 r8:8553dc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8553dc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553dc00 r8:8027ecf4 r7:dfac1e60 r6:8553d400 r5:854cc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe01fb0 to 0xdfe01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:857e3fc0 INFO: task kworker/0:6:9845 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: df016000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 INFO: task kworker/0:8:18780 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:18780 tgid:18780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:ead11d84 r8:00000002 r7:60010113 r6:ead11d8c r5:84d2a400 r4:84d2a400 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84d2a400 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8b114800 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84d2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f39c000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae39000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8ba0a38c r4:8ba0a000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8ba0a38c r4:89bb0e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d2a400 r8:89bb0e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:89bb0e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:89bb0e00 r8:8027ecf4 r7:eab4de60 r6:89b52900 r5:84d2a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:89b4bf40 INFO: task kworker/0:8:18780 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 INFO: task kworker/1:0:21316 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:21316 tgid:21316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:84d2c800 r4:84d2c800 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84d2c800 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e0280 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84d2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f3aa000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb155000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8ba0ab8c r4:8ba0a800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8ba0ab8c r4:884b0a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d2c800 r8:884b0aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:884b0a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:884b0a80 r8:8027ecf4 r7:dfd41e60 r6:85f89700 r5:84d2c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85580280 INFO: task kworker/1:0:21316 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 INFO: task kworker/0:12:22292 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:22292 tgid:22292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:e069dd84 r8:00000002 r7:60000113 r6:e069dd8c r5:854b8c00 r4:854b8c00 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:854b8c00 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e069de08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d76c0 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3b6000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8ba09f8c r4:8ba09c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8ba09f8c r4:8413ec80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b8c00 r8:8413ecac r7:82804d40 r6:dddced40 r5:dddced60 r4:8413ec80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413ec80 r8:8027ecf4 r7:eab99e60 r6:89b41100 r5:854b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe069dfb0 to 0xe069dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:864871c0 INFO: task kworker/0:12:22292 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 INFO: task kworker/1:6:22350 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:22350 tgid:22350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:dfe75d84 r8:00000002 r7:60010113 r6:dfe75d8c r5:83f7d400 r4:83f7d400 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:83f7d400 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe75e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b4d80 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83f7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f3a8000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb139000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8ba0a78c r4:8ba0a400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8ba0a78c r4:857f4b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83f7d400 r8:857f4bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857f4b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f4b80 r8:8027ecf4 r7:ea841e60 r6:857f4f00 r5:83f7d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe75fb0 to 0xdfe75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:864e9080 INFO: task kworker/1:6:22350 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 INFO: task kworker/1:17:22407 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:22407 tgid:22407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:854e0c00 r4:854e0c00 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:854e0c00 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5d280 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3bc000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30d000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb82f8c r4:8bb82c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8bb82f8c r4:89b41300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e0c00 r8:89b4132c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:89b41300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:89b41300 r8:8027ecf4 r7:dfe75e60 r6:89b41f00 r5:854e0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85c5ae40 INFO: task kworker/1:17:22407 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 INFO: task kworker/0:24:22420 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:22420 tgid:22420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:dfbd1d84 r8:00000002 r7:60000013 r6:dfbd1d8c r5:8631e000 r4:8631e000 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:8631e000 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8441afc0 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8631e000 r7:00000000 r6:83018000 r5:00001000 r4:7f2be000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df815000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85839f8c r4:85839c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85839f8c r4:8441f880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8631e000 r8:8441f8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8441f880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8441f880 r8:8027ecf4 r7:dfd21e60 r6:89b41880 r5:8631e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:857e6980 INFO: task kworker/0:24:22420 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:22444 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:22444 tgid:22444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:86318c00 r4:86318c00 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86318c00 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be6e80 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:86318c00 r7:00000000 r6:83018200 r5:00001000 r4:7f266000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe85000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602db8c r4:8602d800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602db8c r4:85804f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86318c00 r8:85804fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85804f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85804f80 r8:8027ecf4 r7:dfe75e60 r6:85804380 r5:86318c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84984500 INFO: task kworker/1:18:22444 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:23275 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:23275 tgid:23275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:eac71d84 r8:00000002 r7:600f0013 r6:eac71d8c r5:85944800 r4:85944800 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:85944800 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559bcc0 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85944800 r7:00000000 r6:83018200 r5:00001000 r4:7f2a0000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8583bb8c r4:8583b800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8583bb8c r4:84956200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85944800 r8:8495622c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84956200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84956200 r8:8027ecf4 r7:ea865e60 r6:84956500 r5:85944800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85782840 INFO: task kworker/1:21:23275 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:23291 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:23291 tgid:23291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:e052dd84 r8:00000002 r7:60000113 r6:e052dd8c r5:85940000 r4:85940000 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:85940000 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e052de08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640dc0 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85940000 r7:00000000 r6:83018200 r5:00001000 r4:7f258000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfce3000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602d38c r4:8602d000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602d38c r4:84956c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85940000 r8:84956cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84956c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84956c80 r8:8027ecf4 r7:eac71e60 r6:84956d80 r5:85940000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe052dfb0 to 0xe052dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e9c80 INFO: task kworker/1:24:23291 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:23294 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:23294 tgid:23294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:ea821d84 r8:00000002 r7:60010113 r6:ea821d8c r5:85946c00 r4:85946c00 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:85946c00 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea821e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559ba00 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85946c00 r7:00000000 r6:83018200 r5:00001000 r4:7f29e000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa45000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8583838c r4:85838000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8583838c r4:84956f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85946c00 r8:84956fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84956f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84956f80 r8:8027ecf4 r7:e052de60 r6:84956b80 r5:85946c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea821fb0 to 0xea821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84f6da80 INFO: task kworker/1:25:23294 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:23295 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:23295 tgid:23295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:e87f5d84 r8:00000002 r7:60000113 r6:e87f5d8c r5:85941800 r4:85941800 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:85941800 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e87f5e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7c00 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85941800 r7:00000000 r6:83018200 r5:00001000 r4:7f3b8000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb297000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84cfbb8c r4:84cfb800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84cfbb8c r4:84956100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85941800 r8:8495612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84956100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84956100 r8:8027ecf4 r7:e052de60 r6:84956480 r5:85941800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe87f5fb0 to 0xe87f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e9cc0 INFO: task kworker/1:26:23295 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:23365 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:23365 tgid:23365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:dfe8dd84 r8:00000002 r7:60000113 r6:dfe8dd8c r5:85946000 r4:85946000 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:85946000 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe8de08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84efab40 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85946000 r7:00000000 r6:83018200 r5:00001000 r4:7f2c8000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b1000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8ba08b8c r4:8ba08800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8ba08b8c r4:84956a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85946000 r8:84956aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84956a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84956a80 r8:8027ecf4 r7:dfbf5e60 r6:84956380 r5:85946000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe8dfb0 to 0xdfe8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:884a8dc0 INFO: task kworker/1:29:23365 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:23375 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:23375 tgid:23375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:dff15d84 r8:00000002 r7:600f0013 r6:dff15d8c r5:85945400 r4:85945400 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:85945400 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff15e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc7b40 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85945400 r7:00000000 r6:83018200 r5:00001000 r4:7f2ac000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cf000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85838f8c r4:85838c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85838f8c r4:84956400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85945400 r8:8495642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84956400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84956400 r8:8027ecf4 r7:dfbf5e60 r6:84956280 r5:85945400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff15fb0 to 0xdff15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85772b40 INFO: task kworker/1:31:23375 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:23434 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:23434 tgid:23434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:dff75d84 r8:00000002 r7:60000013 r6:dff75d8c r5:86423000 r4:86423000 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:86423000 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff75e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc7f00 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:86423000 r7:00000000 r6:83018200 r5:00001000 r4:7f2aa000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9a3000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8583bf8c r4:8583bc00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8583bf8c r4:856b4480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:86423000 r8:856b44ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856b4480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b4480 r8:8027ecf4 r7:dfbf5e60 r6:856b4500 r5:86423000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff75fb0 to 0xdff75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84b55380 INFO: task kworker/1:35:23434 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:25511 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:25511 tgid:25511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:eaba1d84 r8:00000002 r7:60000113 r6:eaba1d8c r5:84c7b000 r4:84c7b000 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84c7b000 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5ed40 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84c7b000 r7:00000000 r6:83018000 r5:00001000 r4:7f25a000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe05000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb83f8c r4:8bb83c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb83f8c r4:85804980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c7b000 r8:858049ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85804980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85804980 r8:8027ecf4 r7:eae25e60 r6:85804e80 r5:84c7b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba1fb0 to 0xeaba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8492cc80 INFO: task kworker/0:30:25511 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:25648 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:25648 tgid:25648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:eb2cdd84 r8:00000002 r7:60000113 r6:eb2cdd8c r5:854bc800 r4:854bc800 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:854bc800 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546a200 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f2ca000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9cd000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8ba0b78c r4:8ba0b400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8ba0b78c r4:8846d300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bc800 r8:8846d32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8846d300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8846d300 r8:8027ecf4 r7:eb055e60 r6:85847e80 r5:854bc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2cdfb0 to 0xeb2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858785c0 INFO: task kworker/1:44:25648 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:25953 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:25953 tgid:25953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a311e0>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<81a30258>] (__schedule) from [<81a311e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:829185c4 r9:df881d84 r8:00000002 r7:60070113 r6:df881d8c r5:84b10000 r4:84b10000 [<81a311b4>] (schedule) from [<81a315c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84b10000 r4:829185c0 [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a315b0>] (schedule_preempt_disabled) from [<81a33cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a339ac>] (__mutex_lock.constprop.0) from [<81a34178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df881e08 r4:00000000 [<81a34164>] (__mutex_lock_slowpath) from [<81a341b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a3417c>] (mutex_lock) from [<804e4338>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86489140 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84b10000 r7:00000000 r6:83018200 r5:00001000 r4:7f2b4000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87db000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8ba0bf8c r4:8ba0bc00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8ba0bf8c r4:8846d880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b10000 r8:8846d8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8846d880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8846d880 r8:8027ecf4 r7:ea9e9e60 r6:858e4900 r5:84b10000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf881fb0 to 0xdf881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8494d280 INFO: task kworker/1:60:25953 is blocked on a mutex likely owned by task kworker/0:5:1996. task:kworker/0:5 state:R running task stack:0 pid:1996 tgid:1996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a30258>] (__schedule) from [<81a31614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8280c9b4 r9:854ba400 r8:80200be4 r7:e0369d54 r6:ffffffff r5:854ba400 r4:00000000 [<81a315d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0369d20 to 0xe0369d68) 9d20: e0e81000 ead97000 00000001 80239bb8 7f2b4000 00000001 82abf1c4 82abe5a0 9d40: 7f2b4000 ead97000 8280c9b4 e0369d9c e0369da0 e0369d70 80230af0 80239bd0 9d60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e40fc>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82abf1e4 [<804e3e78>] (__purge_vmap_area_lazy) from [<804e44b4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0369dc0 r5:e0369e08 r4:e0369dc0 [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42d0>] (_vm_unmap_aliases) from [<804e8228>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481640 r4:00000000 [<804e80bc>] (vfree) from [<8054ddd4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054dda4>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87b5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8bb80f8c r4:8bb80c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8bb80f8c r4:8492ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8492abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8492ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ab80 r8:8027ecf4 r7:dfe2de60 r6:85ada400 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0369fb0 to 0xe0369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e0640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc6-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00030113 r5:60030193 r4:8225c260 [<80201ae4>] (show_stack) from [<8021fe00>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ae4>] (show_stack) from [<8021fe00>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fd90>] (dump_stack_lvl) from [<8021fe24>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021fe0c>] (dump_stack) from [<81a1a178>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a1a018>] (nmi_cpu_backtrace) from [<81a1a2c4>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281af40 r4:ffffffff [<81a1a194>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8280c80c r8:82ab3564 r7:8281bb28 r6:00007de2 r5:8281b508 r4:8bb8880c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037ff64>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037ff64>] (check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037ff64>] (watchdog+0x4a8/0x74c kernel/hung_task.c:470) [<8037fabc>] (watchdog) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8037fabc r7:83349780 r6:83349780 r5:83259800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8334c5c0 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2823 Comm: pr/ttyAMA0 Not tainted 6.16.0-rc6-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a39754>] lr : [<80a70e8c>] psr: 60000113 sp : eb7e9eb0 ip : eb7e9ec0 fp : eb7e9ebc r10: 8295a38c r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 8295a2f0 r5 : 00000000 r4 : 00000001 r3 : 000022d8 r2 : 00000000 r1 : 60000113 r0 : 841f0440 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 8579fac0 DAC: fffffffd Call trace: [<81a3972c>] (_raw_spin_unlock_irqrestore) from [<80a70e8c>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a3972c>] (_raw_spin_unlock_irqrestore) from [<80a70e8c>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a3972c>] (_raw_spin_unlock_irqrestore) from [<80a70e8c>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a70e6c>] (pl011_console_device_unlock) from [<802e7e24>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7da4>] (nbcon_emit_one) from [<802e8044>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c690 r5:83a88c00 r4:8295a2f0 [<802e7e9c>] (nbcon_kthread_func) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295a2f0 r8:802e7e9c r7:84ac8600 r6:84ac8600 r5:83a88c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e9fb0 to 0xeb7e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:838d4000