INFO: task kworker/1:9:6853 blocked for more than 430 seconds. Not tainted 6.16.0-rc4-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:6853 tgid:6853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27bd8>] (__schedule) from [<81a28b60>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27bd8>] (__schedule) from [<81a28b60>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff25d84 r8:00000002 r7:60000113 r6:dff25d8c r5:850b4800 r4:850b4800 [<81a28b34>] (schedule) from [<81a28f48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850b4800 r4:829185c0 [<81a28f30>] (schedule_preempt_disabled) from [<81a2b62c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28f30>] (schedule_preempt_disabled) from [<81a2b62c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2b32c>] (__mutex_lock.constprop.0) from [<81a2baf8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff25e08 r4:00000000 [<81a2bae4>] (__mutex_lock_slowpath) from [<81a2bb38>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2bafc>] (mutex_lock) from [<804e521c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae0fc0 r4:00000000 [<804e8fa0>] (vfree) from [<8054ec6c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f2b0000 [<8054ec3c>] (execmem_free) from [<803c6c60>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a5000 [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6fd8>] (bpf_jit_free) from [<803c80d0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85dc9b8c r4:85dc9800 [<803c7f84>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85dc9b8c r4:85710580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b4800 r8:857105ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85710580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85710580 r8:8027ed34 r7:df919e60 r6:85710380 r5:850b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff25fb0 to 0xdff25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b91b00 INFO: task kworker/1:9:6853 is blocked on a mutex likely owned by task kworker/1:17:8199. task:kworker/1:17 state:R running task stack:0 pid:8199 tgid:8199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27bd8>] (__schedule) from [<81a28f94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83b02400 r8:80200be4 r7:e0669d54 r6:ffffffff r5:83b02400 r4:00000000 [<81a28f54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0669d20 to 0xe0669d68) 9d20: e50c8000 fc74e000 00000001 80239bb8 df845000 00000001 82abf1c4 82abe5a0 9d40: df845000 fc74e000 8280c9b4 e0669d9c e0669da0 e0669d70 80230af4 80239bd0 9d60: 80010113 ffffffff r5:80010113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4fe0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4d5c>] (__purge_vmap_area_lazy) from [<804e5398>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0669dc0 r5:e0669e08 r4:e0669dc0 [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af8d80 r4:00000000 [<804e8fa0>] (vfree) from [<8054ec6c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83b02400 r7:00000000 r6:83018200 r5:00001000 r4:7f2b4000 [<8054ec3c>] (execmem_free) from [<803c6c60>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f5000 [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6fd8>] (bpf_jit_free) from [<803c80d0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85dc838c r4:85dc8000 [<803c7f84>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85dc838c r4:858e8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b02400 r8:858e83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:858e8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858e8380 r8:8027ed34 r7:e0461e60 r6:85d7f380 r5:83b02400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0669fb0 to 0xe0669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85addbc0 INFO: task kworker/1:15:8197 blocked for more than 430 seconds. Not tainted 6.16.0-rc4-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:8197 tgid:8197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27bd8>] (__schedule) from [<81a28b60>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27bd8>] (__schedule) from [<81a28b60>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05b9d84 r8:00000002 r7:60000113 r6:e05b9d8c r5:83b00c00 r4:83b00c00 [<81a28b34>] (schedule) from [<81a28f48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b00c00 r4:829185c0 [<81a28f30>] (schedule_preempt_disabled) from [<81a2b62c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28f30>] (schedule_preempt_disabled) from [<81a2b62c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2b32c>] (__mutex_lock.constprop.0) from [<81a2baf8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b9e08 r4:00000000 [<81a2bae4>] (__mutex_lock_slowpath) from [<81a2bb38>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2bafc>] (mutex_lock) from [<804e521c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af15c0 r4:00000000 [<804e8fa0>] (vfree) from [<8054ec6c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83b00c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2b6000 [<8054ec3c>] (execmem_free) from [<803c6c60>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0719000 [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6fd8>] (bpf_jit_free) from [<803c80d0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d878c r4:856d8400 [<803c7f84>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d878c r4:858e8100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b00c00 r8:858e812c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:858e8100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858e8100 r8:8027ed34 r7:dfd21e60 r6:85d7f480 r5:83b00c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b9fb0 to 0xe05b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85755080 INFO: task kworker/1:15:8197 is blocked on a mutex likely owned by task kworker/1:17:8199. task:kworker/1:17 state:R running task stack:0 pid:8199 tgid:8199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27bd8>] (__schedule) from [<81a28f94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83b02400 r8:80200be4 r7:e0669d54 r6:ffffffff r5:83b02400 r4:00000000 [<81a28f54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0669d20 to 0xe0669d68) 9d20: e5a9d000 fc74e000 00000001 80239bb8 df845000 00000001 82abf1c4 82abe5a0 9d40: df845000 fc74e000 8280c9b4 e0669d9c e0669da0 e0669d70 80230af4 80239bd0 9d60: 80010113 ffffffff r5:80010113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4fe0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4d5c>] (__purge_vmap_area_lazy) from [<804e5398>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0669dc0 r5:e0669e08 r4:e0669dc0 [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af8d80 r4:00000000 [<804e8fa0>] (vfree) from [<8054ec6c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83b02400 r7:00000000 r6:83018200 r5:00001000 r4:7f2b4000 [<8054ec3c>] (execmem_free) from [<803c6c60>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f5000 [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6fd8>] (bpf_jit_free) from [<803c80d0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85dc838c r4:85dc8000 [<803c7f84>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85dc838c r4:858e8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b02400 r8:858e83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:858e8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858e8380 r8:8027ed34 r7:e0461e60 r6:85d7f380 r5:83b02400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0669fb0 to 0xe0669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85addbc0 INFO: task kworker/1:18:8210 blocked for more than 430 seconds. Not tainted 6.16.0-rc4-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:8210 tgid:8210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27bd8>] (__schedule) from [<81a28b60>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27bd8>] (__schedule) from [<81a28b60>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06d9d84 r8:00000002 r7:60000013 r6:e06d9d8c r5:8486ec00 r4:8486ec00 [<81a28b34>] (schedule) from [<81a28f48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486ec00 r4:829185c0 [<81a28f30>] (schedule_preempt_disabled) from [<81a2b62c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28f30>] (schedule_preempt_disabled) from [<81a2b62c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2b32c>] (__mutex_lock.constprop.0) from [<81a2baf8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08 r4:00000000 [<81a2bae4>] (__mutex_lock_slowpath) from [<81a2bb38>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2bafc>] (mutex_lock) from [<804e521c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9bd40 r4:00000000 [<804e8fa0>] (vfree) from [<8054ec6c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8486ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f2b8000 [<8054ec3c>] (execmem_free) from [<803c6c60>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa05000 [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6fd8>] (bpf_jit_free) from [<803c80d0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579cb8c r4:8579c800 [<803c7f84>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8579cb8c r4:858e8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486ec00 r8:858e852c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:858e8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858e8500 r8:8027ed34 r7:e05b9e60 r6:858e8480 r5:8486ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af88c0 INFO: task kworker/1:18:8210 is blocked on a mutex likely owned by task kworker/1:17:8199. task:kworker/1:17 state:R running task stack:0 pid:8199 tgid:8199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27bd8>] (__schedule) from [<81a28f94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83b02400 r8:80200be4 r7:e0669d54 r6:ffffffff r5:83b02400 r4:00000000 [<81a28f54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0669d20 to 0xe0669d68) 9d20: e5a9d000 fc74e000 00000001 80239bb8 df845000 00000001 82abf1c4 82abe5a0 9d40: df845000 fc74e000 8280c9b4 e0669d9c e0669da0 e0669d70 80230af4 80239bd0 9d60: 80010113 ffffffff r5:80010113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4fe0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4d5c>] (__purge_vmap_area_lazy) from [<804e5398>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0669dc0 r5:e0669e08 r4:e0669dc0 [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af8d80 r4:00000000 [<804e8fa0>] (vfree) from [<8054ec6c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83b02400 r7:00000000 r6:83018200 r5:00001000 r4:7f2b4000 [<8054ec3c>] (execmem_free) from [<803c6c60>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f5000 [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6fd8>] (bpf_jit_free) from [<803c80d0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85dc838c r4:85dc8000 [<803c7f84>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85dc838c r4:858e8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b02400 r8:858e83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:858e8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858e8380 r8:8027ed34 r7:e0461e60 r6:85d7f380 r5:83b02400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0669fb0 to 0xe0669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85addbc0 INFO: task kworker/1:19:8214 blocked for more than 431 seconds. Not tainted 6.16.0-rc4-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:8214 tgid:8214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27bd8>] (__schedule) from [<81a28b60>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27bd8>] (__schedule) from [<81a28b60>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e062dd84 r8:00000002 r7:60000013 r6:e062dd8c r5:84869800 r4:84869800 [<81a28b34>] (schedule) from [<81a28f48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84869800 r4:829185c0 [<81a28f30>] (schedule_preempt_disabled) from [<81a2b62c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28f30>] (schedule_preempt_disabled) from [<81a2b62c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2b32c>] (__mutex_lock.constprop.0) from [<81a2baf8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08 r4:00000000 [<81a2bae4>] (__mutex_lock_slowpath) from [<81a2bb38>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2bafc>] (mutex_lock) from [<804e521c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855365c0 r4:00000000 [<804e8fa0>] (vfree) from [<8054ec6c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84869800 r7:00000000 r6:83018200 r5:00001000 r4:7f22c000 [<8054ec3c>] (execmem_free) from [<803c6c60>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9a2000 [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6fd8>] (bpf_jit_free) from [<803c80d0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85dc878c r4:85dc8400 [<803c7f84>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85dc878c r4:858e8300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84869800 r8:858e832c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:858e8300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858e8300 r8:8027ed34 r7:e06d9e60 r6:858e8200 r5:84869800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe062dfb0 to 0xe062dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85536880 INFO: task kworker/1:19:8214 is blocked on a mutex likely owned by task kworker/1:17:8199. task:kworker/1:17 state:R running task stack:0 pid:8199 tgid:8199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27bd8>] (__schedule) from [<81a28f94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83b02400 r8:80200be4 r7:e0669d54 r6:ffffffff r5:83b02400 r4:00000000 [<81a28f54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0669d20 to 0xe0669d68) 9d20: f394f000 fc74e000 00000001 80239bb8 df845000 00000001 82abf1c4 82abe5a0 9d40: df845000 fc74e000 8280c9b4 e0669d9c e0669da0 e0669d70 80230af4 80239bd0 9d60: 80010113 ffffffff r5:80010113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4fe0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4d5c>] (__purge_vmap_area_lazy) from [<804e5398>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0669dc0 r5:e0669e08 r4:e0669dc0 [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e51b4>] (_vm_unmap_aliases) from [<804e910c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af8d80 r4:00000000 [<804e8fa0>] (vfree) from [<8054ec6c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83b02400 r7:00000000 r6:83018200 r5:00001000 r4:7f2b4000 [<8054ec3c>] (execmem_free) from [<803c6c60>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f5000 [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c50>] (bpf_jit_free_exec) from [<803c7040>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6fd8>] (bpf_jit_free) from [<803c80d0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85dc838c r4:85dc8000 [<803c7f84>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85dc838c r4:858e8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b02400 r8:858e83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:858e8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858e8380 r8:8027ed34 r7:e0461e60 r6:85d7f380 r5:83b02400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0669fb0 to 0xe0669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85addbc0 NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000013 r5:60000093 r4:82259b24 [<80201ae4>] (show_stack) from [<8021fdf4>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fd84>] (dump_stack_lvl) from [<8021fe18>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021fe00>] (dump_stack) from [<81a11af4>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a11994>] (nmi_cpu_backtrace) from [<81a11c40>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281af40 r4:ffffffff [<81a11b10>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8280c80c r8:82ab3564 r7:8281bb28 r6:00007dc9 r5:8281b508 r4:86184b0c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380e04>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380e04>] (check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380e04>] (watchdog+0x4a8/0x74c kernel/hung_task.c:470) [<8038095c>] (watchdog) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8038095c r7:833a9080 r6:833a9080 r5:832f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833a7500 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2804 Comm: pr/ttyAMA0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a310d4>] lr : [<80a71a84>] psr: 60010113 sp : eba2deb0 ip : eba2dec0 fp : eba2debc r10: 8295a1cc r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 8295a130 r5 : 00000000 r4 : 00000001 r3 : 00000b18 r2 : 00000000 r1 : 60010113 r0 : 8401f840 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 846ee200 DAC: 00000000 Call trace: [<81a310ac>] (_raw_spin_unlock_irqrestore) from [<80a71a84>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a310ac>] (_raw_spin_unlock_irqrestore) from [<80a71a84>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a310ac>] (_raw_spin_unlock_irqrestore) from [<80a71a84>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a71a64>] (pl011_console_device_unlock) from [<802e7e64>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7de4>] (nbcon_emit_one) from [<802e8084>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c690 r5:83b05400 r4:8295a130 [<802e7edc>] (nbcon_kthread_func) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295a130 r8:802e7edc r7:8447cf00 r6:8447cf00 r5:83b05400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba2dfb0 to 0xeba2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:843662c0